The critical role of structural hole in forming trust for Securing Wireless Sensor Networks
AbstractThe security issues in wireless sensor networks (WSNs) are crucial and the limitation of computing resources and distributed properties of WSN make the traditional security mechanisms no longer feasible in protecting WSN as in the wired networks. There is an emerging research area i.e., trust and reputation mechanisms, has been developed, as an alternative solution to tackle the security issues in WSNs. While the recent studies on trust are mainly focusing on the trust modelling so as to effectively detect and avoid malicious activities. In this paper, we propose to use adaptive network approach to investigate the interplay between the network entities' trust behaviour and their underlying topological connectivity. We have found that the structural hole has its unique position and efficiency on connecting different regional sub-networks, but on the other side, from the security perspective, it has risks of fragile in the network. The extensive simulation studies have confirmed that structure hole plays a critical role on both for securing WSNs and also enable network routing efficiency.
Bao, F., Chen, I.-R., Chang, M., & Cho, J.-H. 2012. ‘Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection’. IEEE Transactions on Network and Service Management, 9(2), 169–183. Available from: http://doi.org/10.1109/TCOMM.2012.031912.110179
Burt, R. S. 2000. ‘The network structure of social capital’. Research in Organizational Behavior, Vol 22, 2000, 22, 345–423. Available from: http://doi.org/10.1016/S0191-3085(00)22009-1
Burt, R.S. 2009. ‘Structural holes: The social structure of competition’. Harvard University Press.
Cook, K.S., & Emerson, R.M., 1978. ‘Power, equity, and commitment in exchange networks’. American Sociological Review, vol. 43, 721-739.
Ellens, W., & Kooij, R. E. (2013). ‘Graph measures and network robustness’. arXiv:1311.5064 [physics]. Available from: http://arxiv.org/abs/1311.5064
Eschenauer, L., Gligor, V. D., & Baras, J. 2002. ‘On Trust Establishment in Mobile Ad-Hoc Networks’. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe (Eds.), Security Protocols (pp. 47–66). Springer Berlin Heidelberg. Available from: http://link.springer.com.ezproxy.aut.ac.nz/chapter/10.1007/978-3-540-39871-4_6
Freeman, L. C. 1978. ‘Centrality in social networks conceptual clarification’. Social Networks, 1(3), 215–239. Available from: http://doi.org/10.1016/0378-8733(78)90021-7
Granovetter, M. S. 1973. The Strength of Weak Ties. American Journal of Sociology, 78(6), 1360–1380.
Gross, T., & Sayama, H. 2009. ‘Adaptive Networks’. In T. Gross & H. Sayama (Eds.), Adaptive Networks (pp. 1–8). Springer Berlin Heidelberg. Available from: http://link.springer.com/chapter/10.1007/978-3-642-01284-6_1
Iera, A., Floerkemeier, C., Mitsugi, J., & Morabito, G. 2010. ‘The Internet of things [Guest Editorial]’. IEEE Wireless Communications, 17(6), 8–9. Available from: http://doi.org/10.1109/MWC.2010.5675772
Josang, A. 1996. ‘The Right Type of Trust for Distributed Systems’. Proceedings of the ACM New Security Paradigms Workshop, 119-131.
J-Sim. Available from: https://sites.google.com/site/jsimofficial/
Krackhardt, D. 1999. ‘The ties torture: Simmelian tie analysis in organization’. Research in the Sociology of Organization 16.1, 183-210.
Latora, V., Nicosia, V., & Panzarasa, P. 2013. ‘Social Cohesion, Structural Holes, and a Tale of Two Measures’. Journal of Statistical Physics, 151(3-4), 745–764. Available from: http://doi.org/10.1007/s10955-013-0722-z
Liqin, T., Chuang, L., & Tieguo, J. 2006.’ Quantitative Analysis of Trust Evidence in Internet’. In International Conference on Communication Technology, 2006. ICCT ’06 (pp. 1–5). Available from: http://doi.org/10.1109/ICCT.2006.342023
Mahalle, P. N., Thakre, P. A., Prasad, N. R., & Prasad, R. 2013. ‘A fuzzy approach to trust based access control in internet of things’. In 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE) (pp. 1–5). Available from: http://doi.org/10.1109/VITAE.2013.6617083
Marsh, S. (1994). ‘Formalising Trust as a Computational Concept’. PhD Thesis, University of Stirling, UK.
Martin-Hernandez, J., Van Mieghem, P., TU Delft: Electrical Engineering, Mathematics and Computer Science: Intelligent Systems (INSY), & TU Delft, Delft University of Technology. (2013, October 28). ‘Measuring Robustness of Complex Networks’. Available from: http://resolver.tudelft.nl/uuid:a19b6938-4379-4717-a0eb-7c17bf921138
Mayer, R. C., Davis, J. H., & Schoorman, F. D. 1995. ‘An Integrative Model Of Organizational Trust’. Academy of Management Review, 20(3), 709–734. Available from: http://doi.org/10.5465/AMR.1995.9508080335
McCabe, C., Watson, R. A., Prichard, J., & Hall, W. 2011. ‘The Web As an Adaptive Network: Coevolution of Web Behavior and Web Structure’. In Proceedings of the 3rd International Web Science Conference (pp. 22:1–22:7). New York, NY, USA: ACM. Available from: http://doi.org/10.1145/2527031.2527044
Momani, M., & Challa, S. 2010. ‘Survey of trust models in different network domains’. arXiv:1010.0168 [cs]. Available from: http://arxiv.org/abs/1010.0168
Mu, B., & Yuan, S. 2010. ‘A method for evaluating initial trust value of direct trust and recommender trust’. In 2010 International Conference on Computer Design and Applications (ICCDA) (Vol. 2, pp. V2–185–V2–190). Available from: http://doi.org/10.1109/ICCDA.2010.5541203
Peng, S., He, J., & Meng, Y. 2008. ‘Reputation-based Trust Update in Network Environment’. In 2008 International Symposium on Electronic Commerce and Security (pp. 118–123). Available from: http://doi.org/10.1109/ISECS.2008.211
Sydney, A., Scoglio, C., & Gruenbacher, D. 2013. ‘Optimizing algebraic connectivity by edge rewiring’. Applied Mathematics and Computation, 219(10), 5465–5479. Available from: http://doi.org/10.1016/j.amc.2012.11.002
Tan, L., & Wang, N. 2010. ‘Future internet: The Internet of Things’. In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) (Vol. 5, pp. V5–376–V5–380). Available from: http://doi.org/10.1109/ICACTE.2010.5579543
Tchepnda, C., & Riguidel, M. 2006. ‘Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks’. In 20th International Conference on Advanced Information Networking and Applications, 2006. AINA 2006 (Vol. 2, pp. 33–38). Available from: http://doi.org/10.1109/AINA.2006.150
Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. 2011. ‘A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules’. In 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom) (pp. 124–130). Available from: http://doi.org/10.1109/GreenCom.2011.30
Xiang, M., Bai, Q., & Liu, W. 2012. ‘Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems’. In 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT) (Vol. 3, pp. 378–382). Available from: http://doi.org/10.1109/WI-IAT.2012.89
Yang, M. L., Al-Anbuky, A., & Liu, W. 2014. ‘An Authenticated Scheme for Wireless Sensor Network’. J. Sensor Actuator Network, 3(3), 181-206. Available from: http://www.mdpi.com/2224-2708/3/3/181/
Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. 2010. ‘A Survey of Trust and Reputation Management Systems in Wireless Communications’. Proceedings of the IEEE, 98(10), 1755–1772. Available from: http://doi.org/10.1109/JPROC.2010.2059690
Zhang, Y., Wang, L., & Sun, W. 2013. ‘Trust System Design Optimization in Smart Grid Network Infrastructure’. IEEE Transactions on Smart Grid, 4(1), 184–195. Available from: http://doi.org/10.1109/TSG.2012.2224390
Copyright © Australasian Association for Information and Communication Technology General permission to republish, but not for profit, all or part of this material is granted, under the Creative Commons Australian Attribution-NonCommercial-NoDerivs 4.0 Licence, provided that the copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges were granted by permission of the Copyright holder.