{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:54:21Z","timestamp":1740149661815,"version":"3.37.3"},"reference-count":34,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T00:00:00Z","timestamp":1714435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Griffiss Institute for the VICEROY program","award":["SA10012022020481"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system, to identify and isolate malicious or faulty sensor nodes. This information can be leveraged by neighboring nodes, to prevent collaboration in tasks like data aggregation and forwarding. While numerous trust frameworks have been suggested in the literature to assess trust scores and examine the reliability of sensors through direct and indirect communications, implementing these trust evaluation criteria is challenging due to the intricate nature of the trust evaluation process and the limited availability of datasets. This research conducts a novel comparative analysis of three trust management models: \u201cLightweight Trust Management based on Bayesian and Entropy (LTMBE)\u201d, \u201cBeta-based Trust and Reputation Evaluation System (BTRES)\u201d, and \u201cLightweight and Dependable Trust System (LDTS)\u201d. To assess the practicality of these trust management models, we compare and examine their performance in multiple scenarios. Additionally, we assess and compare how well the trust management approaches perform in response to two significant cyber-attacks. Based on the experimental comparative analysis, it can be inferred that the LTMBE model is optimal for WSN applications emphasizing high energy efficiency, while the BTRES model is most suitable for WSN applications prioritizing critical security measures. The conducted empirical comparative analysis can act as a benchmark for upcoming research on trust evaluation frameworks for WSNs.<\/jats:p>","DOI":"10.3390\/s24092852","type":"journal-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T12:14:31Z","timestamp":1714479271000},"page":"2852","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Trust Management Frameworks for Wireless Sensor Networks"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5922-6002","authenticated-orcid":false,"given":"Pranav","family":"Gangwani","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"given":"Alexander","family":"Perez-Pons","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2958-0526","authenticated-orcid":false,"given":"Himanshu","family":"Upadhyay","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Kandris, D., Nakas, C., Vomvas, D., and Koulouras, G. (2020). Applications of Wireless Sensor Networks: An Up-to-Date Survey. Appl. Syst. Innov., 3.","DOI":"10.3390\/asi3010014"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gangwani, D., and Gangwani, P. (2021). Applications of Artificial Intelligence and Machine Learning, Springer. Lecture Notes in Electrical Engineering.","DOI":"10.1007\/978-981-16-3067-5_16"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.comcom.2020.03.016","article-title":"Logistics industry monitoring system based on wireless sensor network platform","volume":"155","author":"Jiang","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_4","unstructured":"Gangwani, D. (2023). Artificial Intelligence in Cyber-Physical Systems, CRC Press."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Gangwani, P., Perez-Pons, A., and Upadhyay, H. (2023, January 13\u201316). A Comparative Analysis of Trust Management Models for Wireless Sensor Networks. Proceedings of the 2023 IEEE International Flexible Electronics Technology Conference (IFETC), San Jose, USA, CA, USA.","DOI":"10.1109\/IFETC57334.2023.10254921"},{"key":"ref_6","unstructured":"Namasudra, S., Devi, D., Choudhary, S., Patan, R., and Kallam, S. (2018). Advances of DNA Computing in Cryptography, Chapman and Hall\/CRC."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Das, S., Gangwani, P., and Upadhyay, H. (2023). Integration of Machine Learning with Cybersecurity: Applications and Challenges, Springer.","DOI":"10.1007\/978-3-031-28581-3_7"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.procs.2021.02.088","article-title":"Security and application of wireless sensor network","volume":"183","author":"Huanan","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2643546","DOI":"10.1155\/2020\/2643546","article-title":"Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey","volume":"2020","author":"Fang","year":"2020","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"18486","DOI":"10.1109\/JIOT.2023.3283347","article-title":"Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme","volume":"10","author":"Das","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","article-title":"A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ghehioueche, A.A., Chikouche, N., and Mezrag, F. (2019, January 18\u201319). Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks. Proceedings of the 2019 International Conference on Digitization (ICD), Sharjah, United Arab Emirates.","DOI":"10.1109\/ICD47981.2019.9105883"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bhardwaj, T., Upadhyay, H., Sharma, T.K., and Fernandes, S.L. (2023). Artificial Intelligence in Cyber Security: Theories and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-031-28581-3"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cheng, X., Luo, Y., and Gui, Q. (2018, January 12\u201314). Research on Trust Management Model of Wireless Sensor Networks. Proceedings of the 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China.","DOI":"10.1109\/IAEAC.2018.8577648"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1002\/sec.969","article-title":"A lightweight trust management based on Bayesian and Entropy for wireless sensor networks","volume":"8","author":"Che","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","article-title":"BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks","volume":"59","author":"Fang","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","article-title":"LDTS: A lightweight and dependable trust system for clustered wireless sensor networks","volume":"8","author":"Li","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Karthik, N., and Dhulipala, V.R.S. (2011, January 8\u201310). Trust calculation in wireless sensor networks. Proceedings of the 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, India.","DOI":"10.1109\/ICECTECH.2011.5941924"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1016\/j.future.2019.02.004","article-title":"BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks","volume":"96","author":"Anwar","year":"2019","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1475","DOI":"10.1007\/s11277-019-06155-x","article-title":"An Energy Aware Trust Based Secure Routing Algorithm for Effective Communication in Wireless Sensor Networks","volume":"105","author":"Selvi","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"58221","DOI":"10.1109\/ACCESS.2019.2914769","article-title":"A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks","volume":"7","author":"Khan","year":"2019","journal-title":"IEEE Access"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"33859","DOI":"10.1109\/ACCESS.2019.2904544","article-title":"An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks","volume":"7","author":"Zhao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"6667100","DOI":"10.1155\/2021\/6667100","article-title":"Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks","volume":"2021","author":"Zheng","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7234","DOI":"10.1109\/ACCESS.2017.2772294","article-title":"Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data","volume":"6","author":"Meng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hajar, M.S., Al-Kadri, M.O., and Kalutarage, H. (2020\u20131, January 29). LTMS: A Lightweight Trust Management System for Wireless Medical Sensor Networks. Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China.","DOI":"10.1109\/TrustCom50675.2020.00245"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1453","DOI":"10.1080\/09720529.2019.1695897","article-title":"Resource management based secure trust model for WSN","volume":"22","author":"Khan","year":"2019","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1037","DOI":"10.1007\/s11277-015-2636-3","article-title":"A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks","volume":"87","author":"Labraoui","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3169","DOI":"10.1007\/s11276-019-02129-w","article-title":"TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing","volume":"26","author":"Fang","year":"2020","journal-title":"Wirel. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"e4248","DOI":"10.1002\/ett.4248","article-title":"DEIT: Dempster Shafer Theory-based edge-centric Internet of Things-specific trust model","volume":"32","author":"Bhargava","year":"2021","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/sec.1384","article-title":"A dynamic trust management system for wireless sensor networks","volume":"9","author":"Luo","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","article-title":"A novel trust management scheme based on Dempster\u2013Shafer evidence theory for malicious nodes detection in wireless sensor networks","volume":"74","author":"Zhang","year":"2018","journal-title":"J. Supercomput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Parmar, V., Sanghvi, H.A., Patel, R.H., and Pandya, A.S. (2022, January 7\u20139). A Comprehensive Study on Passwordless Authentication. Proceedings of the 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India.","DOI":"10.1109\/ICSCDS53736.2022.9760934"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TMC.2004.41","article-title":"HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks","volume":"3","author":"Younis","year":"2004","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_34","first-page":"9160516","article-title":"An Efficient Routing Approach to Maximize the Lifetime of IoT-Based Wireless Sensor Networks in 5G and Beyond","volume":"2021","author":"Jothikumar","year":"2021","journal-title":"Mob. Inf. Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/9\/2852\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T12:20:38Z","timestamp":1714479638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/9\/2852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,30]]},"references-count":34,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["s24092852"],"URL":"https:\/\/doi.org\/10.3390\/s24092852","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2024,4,30]]}}}