Dishonest recommendation attacks in wireless sensor networks: A survey

Farah Khedim, Nabila Labraoui, M. Lehsaini
{"title":"Dishonest recommendation attacks in wireless sensor networks: A survey","authors":"Farah Khedim, Nabila Labraoui, M. Lehsaini","doi":"10.1109/ISPS.2015.7244964","DOIUrl":null,"url":null,"abstract":"Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 12th International Symposium on Programming and Systems (ISPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPS.2015.7244964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.
无线传感器网络中的不诚实推荐攻击研究
无线传感器网络(WSN)中的信任和声誉模型作为一种保证有效安全机制的创新解决方案,近年来被许多研究提出。它们在保护wsn免受内部攻击方面发挥着重要作用,例如保护路由和数据转发协议。然而,尽管声誉模型具有这些优势,但也面临着一些安全问题,特别是在不诚实的推荐攻击下,即诽谤、自我推销和串通,参与者可能会给出偏离其真实经验的推荐。本文综述了无线传感器网络中不诚实推荐攻击的研究现状。我们将研究的方案分为两大类:避免不诚实的推荐和处理不诚实的推荐。我们对这些方案进行了概述和比较研究,并强调了未来的研究方向,以解决现有协议的缺点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信