Wireless Sensor Network, 2010, 2, 373-380
doi:10.4236/wsn.2010.24049 Published Online May 2010 (http://www.SciRP.org/journal/wsn)
Copyright © 2010 SciRes. WSN
Research on Beta Trust Model of Wireless Sensor
Networks Based on Energy Load Balancing
Danwei Chen1, Xizhou Yu1, Xi ang hui Dong2
1College of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China
2ZTE Corporation, Shenzhen, China
E-mail: chendw@njupt.edu.cn, iyu xizhou@yahoo.com.cn
Received February 27, 2010; revised March 18, 2010; accepted March 19, 2010
Abstract
This paper proposed beta trust model based on energy load balancing combines the recent achievements of
the trust models in distributed networks, together with the characteristics of wireless sensor networks. The
inter-node trust relation is established after an overall evaluation of node trust value based on the monitor
results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node en-
ergy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node
survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust
routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that
the beta trust model based on energy load balancing outperforms current schemes in energy consumption.
Keywords: Wireless Sensor Networks, Beta Trust Model, Trust Routing Protocol, Network Security, Trust
Evaluation
1. Introduction
There are various attacking threats in Wireless Sensor
Networks (WSNs) [1], which can be classified into rout-
ing protocol loopholes related attack, such as Sybil attack,
false routing information attack, selective forwarding
attack, Sinkhole attack, Wormhole attacks and fraudulent
confirmation attack; and broadcast authentication loop-
holes related attack, such as HELLO flood attack, DOS
attack and DDOS attack. Donggan Liu et al. proposed
μTESLA [2] and solved the broadcast authentication
loopholes related attack in most application scenario.
The former type of attack, however, remains an open
question for developing a generalized model for common
applications. Center-less topology in WSNs determines
that the nodes can not be authenticated uniformly by a
third party. And the trust management system can be
utilized in distributed network, aiming at establishing a
trust network participated with trust nodes. Therefore, it
is significant to develop a trust management system
suitable for WSNs.
2. Basic Requirements for Trust System in WSNs
Trust nodes in WSNs shall constitute a trust network
which can resist attack from hostile nodes effectively,
and save node energy and network bandwidth to ensure
network existence time and effectiveness. The designed
trust model shall meet the following requirements:
1) Moderate protocol algorithm complexity. The time
and space complexity of the protocol algorithm shall
meet the process speed and storage space requirements.
And digital signature and public key pair system are not
suitable for WSNs.
2) Moderate protocol communication. The energy
consumption from inter-node communication outgrows
that from calculation within the node.
3) Trust evaluation effectiveness. The trust model
shall evaluate the node trust value effectively and reflect
the dynamic node trust value in time by monitoring the
node behavior. Therefore, it is a challenge to reach a
moderate balance between 2) and 3) so as to design an
applicable trust system in WSNs.
4) Security in WSNs. The designed system shall be
able to resist malicious attack, identify attack behavior
from hostile node and take effective resisting actions.
3. Trust Evaluation Model
Blaze M. [3] firstly introduced the trust management for
D. W. CHEN ET AL.
374
the security in distributed system to solve the restriction
using traditional encryption system. The early trust
management engines are KeyNote [4] and RT framework
[5]. Then trust management-based trust systems are ap-
plied in e-commerce, ad hoc network and peer network.
The network nodes in the WSNs are task-oriented, and
functions as 1) transmitting nodes to collect the desig-
nated relevant information and report to the base station,
or 2) forwarding nodes to forward data packet from other
nodes to the base station. Considering encryption and
digests are applied to guarantee the system confidential-
ity and integrity, the node trust values are based on the
inter-node exchange behavior. Unlike the current trust
systems, such as KeyNote, RT framework, eBay [6],
CONFIDANT [7] and peer network, our model com-
bines the direct and the indirect trust value to give an
overall evaluation.
We established the trust model based on the node data
forwarding statistics and the energy conservation. And
the trust value of the routing node is evaluated by 1) the
direct trust value from the lower-lever nodes and 2) the
indirect trust value from the neighbor nodes.
Node trust value is computed through all the evalua-
tions from other nodes, which avoids computing the ex-
act local trust value and solves the dynamic trust value
problem. It enhances the veracity of the trust mechanism
and reflects the relativity of trust value and time. And
chances are that some reliable nodes with high trust val-
ue would take on more forwarding tasks from neighbor
nodes, which renders them more vulnerable to be trapped
in energy exhaust. Our construction, however, takes this
situation into consideration and achieves energy load
balancing to prolong the network existence and enhance
the effectiveness.
4. Beta Trust Model Based on Energy Load
Balancing
4.1. Basic Description
The goal of the trust model is to choose credible node for
routing information in order to ensure the data to reach
the base station safely without losing packets maliciously.
The evaluation of overall credibility of nodes in trust
model would be involved in direct credibility and rec-
ommended credibility comprehensively (namely indirect
credibility), where the previous is concluded from direct
interaction with evaluated node, while the latter is in-
ferred from others nodes to the evaluated node. While
selecting next hop node in the consideration of energy
load balancing of sensor network, we will take surplus
energy ratio as a standard. The trust model is based on
the following assumptions: 1) WSNs is safe after ini-
tialization and 2) after routing discovery, each node
stores multiple routing paths to base station.
In the process of research, it needs two important
terms derived from trust evaluation areas, namely credi-
bility and reputation, where credibility means subjective
expectations (usually a real number within 0-1) derived
from A to B, and reputation based on the observation of
an individual history behavior is an expectation for fu-
ture behavior. This paper will also introduce a new term,
the node energy surplus ratio, which means a ratio be-
tween the node surplus energy and initial total energy.
For the sake of discussion, we define the expectation
derived from future behaviors of B based on an observa-
tion of B history behaviors as direct credibility from A to
B. The expectation is based on an observation of history
behaviors and evaluation information derived from A to
B, so we define such expectation of future behaviors of B
deduced from the observation information from C to B
achieved by A from C as indirect credibility of A to B,
which is based on an observation of history behaviors
and evaluation information from C to B.
In the stage of data transmission, nodes need to select
routing paths, that is to say next hop node. Trust value
obtained from the evaluation of trust system will be a
basis of selecting routing, and the arbitrary node will try
to choose neighbor nodes with high trust value and high
energy surplus ratio as routing node. As for neighbor
nodes whose trust value is lower than threshold value,
the node will submit mistrust reports to base station. If
base station receives the same mistrust report from dif-
ferent nodes to some node many times, it will exclude
the node from routing table, so as to achieve the goal that
the network consists of trusted nodes.
In the process of routing in WSNs, each node will
generate a neighbors list, which stores other nodes iden-
tification (ID) within its communication region, mean-
while every ID corresponds to credibility. Therefore,
every node has a credibility list, which saves the credi-
bility of other nodes from this node. The credibility of
node can be divided into two parts- direct credibility and
indirect part, in which direct credibility is calculated
from downstream nodes of routing announcement nodes
according to the state of forwarding packets by routing
announcement nodes; indirect credibility is deduced
from neighbor nodes via monitoring the state of for-
warding packets by routing announcement nodes. Com-
bining direct credibility with indirect credibility, the total
credibility of routing announcement nodes can be calcu-
lated so as to judge whether the node is trusted.
4.2. Establ ishme nt an d Calc ulat io n of Node Tr ust
Trust value uses to judge whether monitored nodes are
malicious; it is also an expectation for future behaviors
of monitored nodes and has close relationship with past
behaviors of monitored nodes. As an evaluation of past
behaviors, reputation can use to calculate current trust
Copyright © 2010 SciRes. WSN
D. W. CHEN ET AL.375
value. This paper will adapt reputation model to detect
whether to exist malicious nodes.
Bayesian can calculate posterior probability via prior
probability as shown in Equation (1)

j
PB means the
prior probability, and means the posterior
probability. The priori probability is probability accord-
ing to random events calculated from past experience.
The posterior probability, after random experience,
means an amendment for priori probability
|
j
PB A
j
P
B un-
der conditions of
A
resulted from random experience.
Therefore, via combination the prior probability with the
posterior probability, it can calculate probability of fu-
ture possible completed tasks according to situation of
past data forwarding completed by node.
 
 
1
|
|, 1,2,...,
|
jj
jn
ii
i
PB PAB
PB Ajn
PB PAB

(1)
where presents a combination of
events, which means that a particular detecting node gets
a special reputation value and .
1, 2,...,
j
Bj n

0
j
PB
A
means a
specific observed event.
In order to reflect dynamic changes of node trust val-
ues as time goes by, we need to improve accuracy of
node trust evaluation. This paper will adopt a method of
sending detected packets regularly to update reputation
value. The event that packets forwarded by from i
is expressed as
j
ij t
at the time . The behavior that
observes the behaviors of from to is
expressed as . So it comes to the following for-
mula:
t
ij1tt

ij t
D
 
 
 
11
1
0
|
|
ijij ij
tt
ij t
t
ijij ij
lt
l
PPD
P
PPD






 

t
l
(2)

ij t
P
not only is the probability of an event that
completes tasks derived from , but also is the prior
probability of reputation derived from to , where
this reputation is denoted as
j
ii j
t
ij
R. We can see that,
is not only the posterior probability of node repu-
tation at the time , but also the priori probability at
the time .

ij t
R
t1t
On the assumption that has assigned tasks to
for times, has completed tasks for times
with the probability
i j
mnjm
x
, so the past reputation derived
from to is belonged to binomial distribution
ij
,Bm xn. The priori probability of next task com-
pleted is belonged to homogeneous distribution
0,1U
on (0, 1) under no previous knowledge. As for individual
monitored node, the monitored node has only two types
of behavior: forwarding data or not forwarding data.
Therefore, the binomial distribution can be used to model
for the monitored nodes. The probability of completing
next task
by obeys that j
1
0
(0,1)(, )
()
[()][()| ()]
t
ij lij tij l
l
UBmnx
PPD

P
(3)
So the posterior probability of completing next event
by will be as follows j
 
1! 1
!!
n
m
mn xx
P

mn
 
(4)
This paper draws on the experience of beta reputation
system of e-commerce, and introduces establishment for
node’s trust model, because beta distribution expresses
node's reputation. The probability density function of
beta distribution can be described as follows
 
1
1
1
,Bp
|,p1,0 1,
q
p
xxxp
q
0, 0qfx q
 
0
0,q
(5)
where

q
 
1
,1,01,
q
xx dxxp
1
0
1p
Bp

(6)
The beta-family of probability density functions is a
continuous family of functions indexed by the two pa-
rameters and . The beta distribution
p q
|,
f
xpq
can be expressed using the gamma function as

 
1
1
|,
p1,
01
, 0, 0
q
p
pqx x
pq
xp q



 
fx q (7)
with the restriction that the probability variable 0x
if
1p
, and 1x
if 1q
. The probability expectation
value of the beta distribution is given by

p
Ex pq
(8)
Considering the property of gamma function,
1!mm
, Equation (4) can be changed into:
 

21
11
n
m
mn xx
mn
 

P
(9)
So
P
is subject to distribution
1, 1mn

Copyright © 2010 SciRes. WSN
D. W. CHEN ET AL.
376
compared Equation (7) with Equation (9) The reputation
derived from to is that
i
j
1, 1
ij
Rmn
 (10)
The expectation of completing next task derived from
to can be calculated by the previous formula, namely
the credibility of to . Let the direct credibility de-
note as
i
j
ij
ij
D
R, so the credibility of routing announce-
ment node is calculated by its downstream nodes. Equa-
tion (12) can be deduced by the expectation of beta dis-
tribution Equation (11):

m
Emnmn


(11)


1
1, 12
ij D
m
REmn mn




m
(12)
We suppose that equals to kn , where is set
as 9, 5, 1, 1/5 and 1/9 respectively, so the relationship
between the credibility and can be described as
Figure 1.
k
mn
We can see from Figure 1 that node’s credibility will
increase as the number of tasks completed by node that
the number of forwarding packets successfully increases;
on the contrary, nodes credibility will be decrease as the
number of uncompleted tasks that the number of for-
warding packets unsuccessfully is larger. The behaviors
of forwarding packets as a judge basis can reflect true
situation of node.
4.3. The Initialization of Node Trust Value
For the sake of description, we introduce two concepts:
routing node and non-routing node. Routing node is a
type of next hop neighbor node selected to forward
packets to the base station. Non-routing node means one
of neighbor nodes except routing nodes. The credibility
system mainly uses to ensure route security, therefore in
order to save unnecessary expenses, the trust evaluation
is only for routing nodes, however half trust attitude is
adopted for non-routing nodes (that is to say that the cre-
dibility of non-routing nodes is set as 0.5). Note that
non-routing node is not fixed, it is possible to become a
routing node at some time, and when a non-routing node
has been changed into a routing node, the system will
re-evaluate the node's credibility.
We have detailed the ideas and methods of node’s
trust assessment in Section 4.2. This section will describe
initialization of node trust value in beta credibility sys-
tem based on energy load balancing. The node trust val-
ue of the system is between 0 and 1, which can evaluate
comprehensively direct trust value and indirect trust
Figure 1. Impact on the credibility derived from the ratio
between m and n.
value. The initialization of node trust values will start
after establishment of WSNs and route discovery. Trust
values of routing nodes will be initialized by trust detect
mechanism, while trust values of non-routing nodes will
be set as 0.5 initially. On the assumption that is
routing node of i, means the number of packets
forwarded by successfully, and represents the
number of packets forwarded by unsuccessfully, the
direct trust value of to is that
j
m
i
jn
j
j


1
1, 12
ij D
m
REmn mn


 (13)
Suppose is a common neighbor node of and ,
ki j
k
j
mmeans the number of packets forwarded by suc-
cessfully in the process of trust detection by ,
j
kk
j
n
ik
R
means the number of packets forwarded by unsuc-
cessfully in the process of trust detection by k,
represents general trusted assessment of on , then
the indirect trust value of to is that
j
i k
i j

1
2
k
j
ijik kk
ID kjj
m
RR
mn

(14)
In the credibility system, one node has absolutely be-
lieved in its direct assessment for other nodes, while has
reservedly trust in recommended assessment derived
from other nodes for evaluated nodes. In order to prevent
malicious slander or have a common conspiracy to en-
hance trust value of a malicious node, it should make a
consideration of its trust of recommended nodes while
combined with recommended credibility own. The over-
all credibility of to is that
i j
Copyright © 2010 SciRes. WSN
D. W. CHEN ET AL.
Copyright © 2010 SciRes. WSN
377
value of to can be updated to Equation (19).
ij

0.5, is a non-routing node,
1
2, is a routing node
1
k
j
ijik kk
D
ij kjj
ik
k
j
m
RR
Rmn j
R

(15)
In the course of updating credibility system, we not
only take reputation accumulated by history behaviors of
nodes into account, but also need consider sensitivity of
trust changes dynamically, so that it needs to reflect be-
havior changes of nodes in order to minimize the impact
on network after some nodes being captured.
It can be seen from Equation (15) that directly
depends on the ratio between and n. The more this
ratio is, the higher the trust value of node will be gotten;
vice versa. It is in accord with the design of evaluating
trust value of node via forwarding packets, and has a
finer defensive effect for malicious loss packets of nodes.
ij
R
m4.5. Trust Decision
The main objective of the credibility system is to select
trust routing nodes and network topology excluding ma-
licious nodes to ensure security of data transmission. At
the same time, taken limitation of sensor node’s power
into account, neighbor nodes will regard the node as a
routing node for a long time, and then the node’s power
may be run out quickly so that it may lead to partial fail-
ure of sensor network. In order to prevent above situation,
it need consider energy load balancing. Therefore, trust
decision is very important.
4.4. The Update of Node Credibility Value
The behavior of node may change as time goes by, so the
credibility system must update the trust values of nodes
dynamically. The credibility system adopts a method of
opening detection mechanism regularly to monitor
changes of routing node’s behaviors and update routing
node trust value dynamically, so that reflect the changes
of the sensor network in time and ensure the security of
data transmission, as for non-routing node without updating.
We suppose that
j
E is residual energy rate of ,
and
j
r
, e
mean trust weights and energy weights
respectively. The trust decision value, , is defined as
ij
T
ijr ijej
TRE
 (20)
Suppose that is a routing node of with and
obtained in a new round of trust detection, we define
the aging parameters
ji m
n
age
as the impact on current trust
evaluation derived from past detected data, then
We define as the trust threshold of system. When
makes a decision to select next hop routing node ,
it obeys the following decision-making principles:
t
R
i j
1) Select routing node with ;
ij t
RR
newold age
mm m
 (16)
2) If many trust values are all higher than , select
one of nodes with the greatest ;
t
R
ij
T
new old age
nn n
  (17)
Therefore the direct trust value of to can be
updated that
i j3) If many are same, choose one of routing nodes
with the highest ;
ij
T
ij
R

1
2
new
ij Dnew new new
m
Rmn

(18) 4) If many are same, then choose one of routing
nodes with the shortest routing path.
ij
R
In the credibility system, when considers historical
behaviors of nodes, it should also take sensitivity of up-
dating trust values into account and needs reflect the be-
havior changes of nodes in time. Therefore, we consider
historical behaviors in direct trust while consider current
behaviors in indirect trust. On the assumption that
,
kk
After above decision-making, the routing node has
higher credibility with more remaining energy. The en-
ergy surplus ratio used in system also prevents the use of
high-power devices from attacking via using energy de-
fects of WSNs. As for one routing node with trust value
lower than , it will send a warning report to base sta-
tion. If base station recesives the same of warning report
from many nodes to a certain node, base station will
t
R
j
new jnew
mn is derived from monitoring of k on
in a new round of trust detection, then the overall trust
j
0.5, is a non-routing node,
1
() 2, is a routing node
1
k
jnew
ij Dnewiknewkk
ijnew kjnew jnew
iknew
k
j
m
RR
Rmn j
R

(19)
D. W. CHEN ET AL.
378
exclude this node from network topology, so that the
network consists of trust nodes.
5. Performance Analysis and Simulations of
Trust Routing Protocol
5.1. Performance Analysis of TRP and INSENS
INSENS (INtrusion-tolerant routing protocol for wireless
Sensor NetworkS) is a well-designed secure routing pro-
tocol, which achieve data efficient transmission by mak-
ing use of redundant routing [9]. In WSNs, it is essential
to save energy for the protocol designation; however,
INSENS cannot overcome more waste of energy from
sending packets multiply. We will introduce beta trust
model into INSENS to set up the trust detection mecha-
nism, evaluate routing node credibility, and make deci-
sion to choose some routing nodes to forward packets.
We will analyze security of our protocol based on the
beta trust model, called trust routing protocol (TRP) after
introduction of trust management model and resist
against current different typical attacks in WSNs.
In order to ensure packets to be forwarded to base sta-
tion safely, the way of sending packets of INSENS is
shown in Figure 2 (redundant routing mode). A data
packet is copied into a number of ectypes. The transmis-
sion path takes on a tree structure in network. Suppose
that a certain node with
H
hops to base station has
() routing paths, and each intermediate forwarding
node has all routing paths, and then including the
number of packets sent by source nodes and intermediate
forwarding nodes, the quantity of packets generated by
sending a data packet is that
N
1NN
1
21
H
iH iH H
i
NN
SNNNN

(21)
Whereas the quantity generated under TRP is that
1SH (22)
Figure 2. INSENS: redundant routing protocol mode.
As the expansion of network scale, INSENS will make
network load increase exponentially, while the consump-
tion of TRP for network resource will almost increase
linearly. Thus, as long as proper control of communica-
tion consumption in the process of trust detection, the
communication consumption of TRP is much smaller
than INSENS. It can reduce node's energy consumption
and save network resources greatly, and be conducive to
network expansion. But the computing expense derived
from introduction of trust evaluation system relative to
communication expense is almost negligible.
5.2. Emulation of TRP and INSENS
The main goal of introducing beta trust model into IN-
SENS is to give up the way of sending packets multiply
via redundant routing path, and to adopt a way of trust
routing paths to send packets, which reduces energy con-
sumption of nodes and prolongs the survival time of
network, meanwhile alleviates network load and saves
communication resources.
In order to verify TRP described in this paper with an
introduction of energy load balancing beta trust model
whether satisfy the goal of this paper, this subsection will
make simulations for TRP and INSENS, and compare
the performance of two protocols according to simula-
tions. The weights used in the simulation are set as fol-
lows: weight_old = 0.6, weight_trust = 0.8, weigth_en-
ergy = 0.2, Rt = 0.6.
The paper will adopt two following evaluation indexes
to compare and analyze the performance of TRP and
INSENS.
1) The number of transmitted packets
Under the same conditions of sending the same pack-
ets, compare the total quantity of packets sent by all
nodes in the course of sending packets from source node
to destination node, including packets sent by source
node and forwarded by intermediate node. Because the
energy consumption of network is mainly embodied in
sending packets, this performance index can reflect not
only the difference of energy consumption in the process
of communication, but also the situation of network re-
sources usage.
2) Packet loss
It means a ratio of the number of packets not received
by destination node to the number of packets sent by
source node. This performance index can reflect the im-
pact on the protocol to network communication and
whether it is applicable to WSNs. The protocol with
higher packet loss is not obviously suitable to network
communications.
This paper also includes simulation of dynamic
changes of routing node trust value in order to verify two
additional problems: first, the ability of TRP resisting
malicious attacks; second, whether the node could dis-
Copyright © 2010 SciRes. WSN
D. W. CHEN ET AL.379
cover malicious routing nodes on upstream then exclude
them and select trust nodes. According to simulations,
we design two following scenarios.
Scenario 1: Suppose that there is a coordinate system
with base station at (0, 0). 100 nodes are distributed ran-
domly within the range of 1000*1000m2 in coordinate
system, and node’s communication distance is 250m.
INSENS and TRP will generate redundant routing paths.
For the sake of simplicity, the simulation will generate
two routing paths for each node as possible, however
some nodes may have a routing path because of topo-
logical structure. The system will select four nodes ran-
domly to generate 4 cbr data streams, where each cbr
data stream sends two packets per second, the length of
one data packet is 512 bytes, and the simulation time is
30 seconds. In trust routing, it can be seen from Figure 1,
when the number of packets detected by the system
reaches 30, it is more accurate for evaluation of node
trust value. Therefore, we select 30 packets sent by trust
detection at a time in simulation. In this scenario, it will
make a statistics about the number of transmitted packets
as shown in Figure 3 and packet loss as shown in Figure
4 in INSENS and TRP respectively.
Figure 3 shows that although the number of packets
sent by TRP is much more than INSENS in the initial
stage, after 12 seconds the later surpassed the former and
the gap between the two protocols becomes larger and
larger as time goes by. Because TRP starts trust routing
detection at the beginning and consume a certain amount
of network resources, once completes trust detection,
packets are forwarded in accordance with trust routing.
However INSENS always forwards packets according to
redundant routing. On the assumption that there are h
hops between the node and base station, and each
node has two routing paths, then the total quantity of
transmitted packets reaches about (3 * 2h-2) (2 + 22 + 23
+ ... + 2 * 2h). Obviously, according to INSENS, middle
nodes may discard duplicated packets, meanwhile be-
cause of signal conflict, network congestion and so on, it
also drops some packets, and in fact the quantity of a
packet transmitted in network may not reach (3 * 2h-2).
Figure 2 shows the network consumption of INSENS is
much more than that of TRP when sending the same
source packets, so the improvement derived from intro-
duction of trust evaluation system indeed saves a lot of
energy and network resources, extending survival time of
WSNs and improving effectiveness of completing tasks.
a
N
It can be seen from Figure 4, the average packet loss
of TRP is about 2.5%, which is higher than INSENS,
because of WSNs with higher packet loss. In TRP,
source packets are forwarded to base station only along a
routing path, while in INSENS, source packets are
spread over the network via redundant routing paths.
There are many copies of packets sent to base station
through multiple paths. Thus, INSENS has a slightly
05 10 1520 2530
0
1000
2000
3000
4000
5000
6000
7000
Time (s)
The number of transmmited packets
TRP
INSENS
Figure 3. The number of transmitted packets.
05 10 15 20 25 30
0
0.5
1
1.5
2
2.5
3
3.5
4
Time (s)
Packet loss (%)
TRP
INSENS
Figure 4. Packet loss.
lower packet loss. However, as expansion of network
scale and frequency of sending packets raises, the con-
sumption of INSENS for network resources will increase
exponentially, also it will result in more serious network
congestion and channel conflict, and its packet loss will
increase greatly. Whereas the consumption of TRP for
network resources under above mentioned situation will
almost increase linearly, it is much better than INSENS
in terms of network congestion and channel conflict.
Scenario 2: Suppose that there is a coordinate system
with base station at (0, 0). 100 nodes are distributed ran-
domly within the range of 1000*1000m2 in coordinate
system, and node’s communication distance is 250m.
The interval time of trust update is 30 seconds, and si-
mulation time is 60 seconds. In TRP, base station gener-
ates three routing paths for , of which the next hop
nodes are ,
V
N
A
N
B
N and . In the initial stage, ,
C
NA
N
B
N and are all healthy nodes, while
C
N
B
N will be
captured within 0 ~ 30 seconds, which will discard all
packets without forwarding. In this simulation scenario,
trust values of to ,
V
NA
N
B
N and can be
shown in Figure 5.
C
N
Copyright © 2010 SciRes. WSN
D. W. CHEN ET AL.
Copyright © 2010 SciRes. WSN
380
7. Acknowledgements
010 20 30 40 50 60
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Time (s)
Trust value
A
B
C
This work was sponsored by the National Natural Sci-
ence Foundation of P.R. China (No. 60973139, 60773041,
60905040), the Natural Science Foundation of Jiangsu
Province (BK2008451), Postdoctoral Foundation of Ji-
angsu Province (0801019C), Science & Technology In-
novation Fund for Higher Education Institutions of Ji-
angsu Province (CX08B-085Z, CX08B-086Z), and the
Six Kinds of Top Talent of Jiangsu Province (2008118).
8. References
[1] C. Karlof and D. Wanger, “Secure Routing in Wireless
Sensor Networks: Attacks and Counter-Measures,” First
IEEE International Workshop on Sensor Network Proto-
cols and Applications, IEEE Computer Society, Anchor-
age, May 2003, pp. 113-127.
Figure 5. Trust values of V
N
to
A
N
,
B
N
and C
N
.
It can be seen from Figure 5, the healthy node has rel-
ative higher trust value at 0s, namely at the time of ini-
tialization. When updating trust at 30s and 60s, its trust
value descends quickly due to that
B
N
A
N
is captured and
discards packets maliciously, while and have
still higher trust values. So we can see that trust value of
this paper can evaluate node behaviors accurately, and
detect malicious behaviors in time. The network may
select trust nodes to cooperate and minimize harm re-
sulted from malicious nodes as possible by trust assess-
ment.
C
N
[2] D. Liu and P. Ning, “Efficient Distribution of Key Chain
Commitments for Broadcast Authentication in Distrib-
uted Sensor Networks,” Technical Report: North Caro-
lina State University at Raleigh, September 2002.
[3] M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized
Trust Management,” Proceedings of the 17th Symposium
on Security and Privacy, 1996.
[4] M. Blaze, J. Feigenbaum and J. Ioannidis, “The KeyNote
Trust Management System,” Version 2, Internet Engi-
neering Task Force, September 1999.
[5] N. H. Li, J. C. Mitchell, W. H. Winsborough, “Design of
a Role-Based Trust Management Framework,” In Header,
H. Ed., Proceedings of the IEEE Symposium on Security
and Privacy, IEEE Computer Society Press, Washington,
2002, pp. 114-130.
6. Conclusions
Nowadays it proves to be difficult to authenticate the
network entity in distributed network environment, espe-
cially in resource-constrained WSNs. Dynamic trust
management provides a novel solution of the security in
distributed environment. Due to own features of WSNs,
however, the traditional trust model fails to be applied in
the WSNs.
[6] P. Resnick and R. Zeckhauser, “Trust among Strangers in
Internet Transactions: Empirical Analysis of eBya’s
Reputation System,” National Bureau of Economic Re-
search Workshop on Empirical Studies of Electronic
Commerce, 2000.
[7] S. Buchegger and J. L. Boudec, “Performance Analysis of
the CONFIDANT Protocol,” Proceedings of ACM Mobi-
hoc, 2002.
This paper proposes the beta trust model based on en-
ergy load balancing, which is remarkable in computation,
communication consumption and energy load balancing,
combining with the trust system model and beta trust
model in the e-commerce. The simulation results indicate
that the evaluated node trust value reflects the node be-
haviors effectively. And our model achieves the expected
security goal with low energy and network consumption
in WSNs.
[8] L. Xiong and L. Liu, “A reputation-Based Trust Model
for Peer to Peer Ecommerce Communities,” IEEE Con-
ference on E-Commerce, 2003.
[9] J. Deng, R. Han and S. Mishra, “INSENS: Intrusion-
Tolerant Routing in Wireless Sensor Networks,” De-
partment of Computer Science Technical Report CU-CS-
939-02, University of Colorado, Boulder, 2006.