{"title":"Dishonest recommendation attacks in wireless sensor networks: A survey","authors":"Farah Khedim, Nabila Labraoui, M. Lehsaini","doi":"10.1109/ISPS.2015.7244964","DOIUrl":null,"url":null,"abstract":"Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.","PeriodicalId":165465,"journal":{"name":"2015 12th International Symposium on Programming and Systems (ISPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 12th International Symposium on Programming and Systems (ISPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPS.2015.7244964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Trust and reputation models in wireless sensor networks (WSN) have been recently proposed by many researches as an innovative solution for guaranteeing an effective security mechanism. They play an important role in defending WSNs such as securing routing and data forwarding protocols, against insider attacks. However, despite of the advantages, reputation models face with several security issues, especially in the case of dishonest recommendation attacks, i.e. slandering, self-promoting and collusion where participants might give recommendations deviated from their real experience. In this paper we survey the current research related to dishonest recommendation attacks in WSNs. We have classified the schemes studied in two main categories: avoiding dishonest recommendations and dealing with dishonest recommendations. We provide an overview and a comparative study of these schemes and highlight the future research directions to address the drawbacks of existing protocols.