The critical role of structural hole in forming trust for Securing Wireless Sensor Networks

  • Ming Xiang Auckland University of Technology
  • William Liu Auckland University of Technology
  • Quan Bai Auckland University of Technology
  • Adnan Al-Anbuky Auckland University of Technology

Abstract

The security issues in wireless sensor networks (WSNs) are crucial and the limitation of computing resources and distributed properties of WSN make the traditional security mechanisms no longer feasible in protecting WSN as in the wired networks. There is an emerging research area i.e., trust and reputation mechanisms, has been developed, as an alternative solution to tackle the security issues in WSNs. While the recent studies on trust are mainly focusing on the trust modelling so as to effectively detect and avoid malicious activities. In this paper, we propose to use adaptive network approach to investigate the interplay between the network entities' trust behaviour and their underlying topological connectivity. We have found that the structural hole has its unique position and efficiency on connecting different regional sub-networks, but on the other side, from the security perspective, it has risks of fragile in the network. The extensive simulation studies have confirmed that structure hole plays a critical role on both for securing WSNs and also enable network routing efficiency.

Author Biography

Ming Xiang, Auckland University of Technology
School of Engineering, Computer and Mathematical Sciences

References

Adams, W. J., & Davis, I. N.J. 2005. ‘Toward a decentralized trust-based access control system for dynamic collaboration’. In Information Assurance Workshop, 2005. IAW ’05. Proceedings from the Sixth Annual IEEE SMC (pp. 317–324). Available from: http://doi.org/10.1109/IAW.2005.1495969

Bao, F., Chen, I.-R., Chang, M., & Cho, J.-H. 2012. ‘Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection’. IEEE Transactions on Network and Service Management, 9(2), 169–183. Available from: http://doi.org/10.1109/TCOMM.2012.031912.110179

Burt, R. S. 2000. ‘The network structure of social capital’. Research in Organizational Behavior, Vol 22, 2000, 22, 345–423. Available from: http://doi.org/10.1016/S0191-3085(00)22009-1

Burt, R.S. 2009. ‘Structural holes: The social structure of competition’. Harvard University Press.

Cook, K.S., & Emerson, R.M., 1978. ‘Power, equity, and commitment in exchange networks’. American Sociological Review, vol. 43, 721-739.

Ellens, W., & Kooij, R. E. (2013). ‘Graph measures and network robustness’. arXiv:1311.5064 [physics]. Available from: http://arxiv.org/abs/1311.5064

Eschenauer, L., Gligor, V. D., & Baras, J. 2002. ‘On Trust Establishment in Mobile Ad-Hoc Networks’. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe (Eds.), Security Protocols (pp. 47–66). Springer Berlin Heidelberg. Available from: http://link.springer.com.ezproxy.aut.ac.nz/chapter/10.1007/978-3-540-39871-4_6

Freeman, L. C. 1978. ‘Centrality in social networks conceptual clarification’. Social Networks, 1(3), 215–239. Available from: http://doi.org/10.1016/0378-8733(78)90021-7

Granovetter, M. S. 1973. The Strength of Weak Ties. American Journal of Sociology, 78(6), 1360–1380.

Gross, T., & Sayama, H. 2009. ‘Adaptive Networks’. In T. Gross & H. Sayama (Eds.), Adaptive Networks (pp. 1–8). Springer Berlin Heidelberg. Available from: http://link.springer.com/chapter/10.1007/978-3-642-01284-6_1

Iera, A., Floerkemeier, C., Mitsugi, J., & Morabito, G. 2010. ‘The Internet of things [Guest Editorial]’. IEEE Wireless Communications, 17(6), 8–9. Available from: http://doi.org/10.1109/MWC.2010.5675772

Josang, A. 1996. ‘The Right Type of Trust for Distributed Systems’. Proceedings of the ACM New Security Paradigms Workshop, 119-131.
J-Sim. Available from: https://sites.google.com/site/jsimofficial/

Krackhardt, D. 1999. ‘The ties torture: Simmelian tie analysis in organization’. Research in the Sociology of Organization 16.1, 183-210.

Latora, V., Nicosia, V., & Panzarasa, P. 2013. ‘Social Cohesion, Structural Holes, and a Tale of Two Measures’. Journal of Statistical Physics, 151(3-4), 745–764. Available from: http://doi.org/10.1007/s10955-013-0722-z

Liqin, T., Chuang, L., & Tieguo, J. 2006.’ Quantitative Analysis of Trust Evidence in Internet’. In International Conference on Communication Technology, 2006. ICCT ’06 (pp. 1–5). Available from: http://doi.org/10.1109/ICCT.2006.342023

Mahalle, P. N., Thakre, P. A., Prasad, N. R., & Prasad, R. 2013. ‘A fuzzy approach to trust based access control in internet of things’. In 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE) (pp. 1–5). Available from: http://doi.org/10.1109/VITAE.2013.6617083

Marsh, S. (1994). ‘Formalising Trust as a Computational Concept’. PhD Thesis, University of Stirling, UK.

Martin-Hernandez, J., Van Mieghem, P., TU Delft: Electrical Engineering, Mathematics and Computer Science: Intelligent Systems (INSY), & TU Delft, Delft University of Technology. (2013, October 28). ‘Measuring Robustness of Complex Networks’. Available from: http://resolver.tudelft.nl/uuid:a19b6938-4379-4717-a0eb-7c17bf921138

Mayer, R. C., Davis, J. H., & Schoorman, F. D. 1995. ‘An Integrative Model Of Organizational Trust’. Academy of Management Review, 20(3), 709–734. Available from: http://doi.org/10.5465/AMR.1995.9508080335

McCabe, C., Watson, R. A., Prichard, J., & Hall, W. 2011. ‘The Web As an Adaptive Network: Coevolution of Web Behavior and Web Structure’. In Proceedings of the 3rd International Web Science Conference (pp. 22:1–22:7). New York, NY, USA: ACM. Available from: http://doi.org/10.1145/2527031.2527044

Momani, M., & Challa, S. 2010. ‘Survey of trust models in different network domains’. arXiv:1010.0168 [cs]. Available from: http://arxiv.org/abs/1010.0168

Mu, B., & Yuan, S. 2010. ‘A method for evaluating initial trust value of direct trust and recommender trust’. In 2010 International Conference on Computer Design and Applications (ICCDA) (Vol. 2, pp. V2–185–V2–190). Available from: http://doi.org/10.1109/ICCDA.2010.5541203

Peng, S., He, J., & Meng, Y. 2008. ‘Reputation-based Trust Update in Network Environment’. In 2008 International Symposium on Electronic Commerce and Security (pp. 118–123). Available from: http://doi.org/10.1109/ISECS.2008.211

Sydney, A., Scoglio, C., & Gruenbacher, D. 2013. ‘Optimizing algebraic connectivity by edge rewiring’. Applied Mathematics and Computation, 219(10), 5465–5479. Available from: http://doi.org/10.1016/j.amc.2012.11.002

Tan, L., & Wang, N. 2010. ‘Future internet: The Internet of Things’. In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) (Vol. 5, pp. V5–376–V5–380). Available from: http://doi.org/10.1109/ICACTE.2010.5579543

Tchepnda, C., & Riguidel, M. 2006. ‘Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks’. In 20th International Conference on Advanced Information Networking and Applications, 2006. AINA 2006 (Vol. 2, pp. 33–38). Available from: http://doi.org/10.1109/AINA.2006.150

Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. 2011. ‘A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules’. In 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom) (pp. 124–130). Available from: http://doi.org/10.1109/GreenCom.2011.30

Xiang, M., Bai, Q., & Liu, W. 2012. ‘Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems’. In 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT) (Vol. 3, pp. 378–382). Available from: http://doi.org/10.1109/WI-IAT.2012.89

Yang, M. L., Al-Anbuky, A., & Liu, W. 2014. ‘An Authenticated Scheme for Wireless Sensor Network’. J. Sensor Actuator Network, 3(3), 181-206. Available from: http://www.mdpi.com/2224-2708/3/3/181/

Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. 2010. ‘A Survey of Trust and Reputation Management Systems in Wireless Communications’. Proceedings of the IEEE, 98(10), 1755–1772. Available from: http://doi.org/10.1109/JPROC.2010.2059690

Zhang, Y., Wang, L., & Sun, W. 2013. ‘Trust System Design Optimization in Smart Grid Network Infrastructure’. IEEE Transactions on Smart Grid, 4(1), 184–195. Available from: http://doi.org/10.1109/TSG.2012.2224390
Published
2016-04-18
How to Cite
XIANG, Ming et al. The critical role of structural hole in forming trust for Securing Wireless Sensor Networks. International Journal of Information, Communication Technology and Applications, [S.l.], v. 2, n. 1, p. 66-84, apr. 2016. ISSN 2205-0930. Available at: <https://www.ijicta.org/index.php/ijicta/article/view/27>. Date accessed: 23 aug. 2017. doi: https://doi.org/10.17972/ijicta20162127.
Section
Articles

Keywords

Wireless sensor networks; Trust and reputation managment; Adaptive networks; Structural hole; Topological metrics