Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
Danwei Chen, Xizhou Yu, Xianghui Dong
DOI: 10.4236/wsn.2010.24049   PDF    HTML     5,521 Downloads   9,794 Views   Citations


This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption.

Share and Cite:

Chen, D. , Yu, X. and Dong, X. (2010) Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing. Wireless Sensor Network, 2, 373-380. doi: 10.4236/wsn.2010.24049.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] C. Karlof and D. Wanger, “Secure Routing in Wireless Sensor Networks: Attacks and Counter-Measures,” First IEEE International Workshop on Sensor Network Protocols and Applications, IEEE Computer Society, Anchorage, May 2003, pp. 113-127.
[2] D. Liu and P. Ning, “Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks,” Technical Report: North Carolina State University at Raleigh, September 2002.
[3] M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized Trust Management,” Proceedings of the 17th Symposium on Security and Privacy, 1996.
[4] M. Blaze, J. Feigenbaum and J. Ioannidis, “The KeyNote Trust Management System,” Version 2, Internet Engineering Task Force, September 1999.
[5] N. H. Li, J. C. Mitchell, W. H. Winsborough, “Design of a Role-Based Trust Management Framework,” In Header, H. Ed., Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington, 2002, pp. 114-130.
[6] P. Resnick and R. Zeckhauser, “Trust among Strangers in Internet Transactions: Empirical Analysis of eBya’s Reputation System,” National Bureau of Economic Research Workshop on Empirical Studies of Electronic Commerce, 2000.
[7] S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol,” Proceedings of ACM Mobihoc, 2002.
[8] L. Xiong and L. Liu, “A reputation-Based Trust Model for Peer to Peer Ecommerce Communities,” IEEE Conference on E-Commerce, 2003.
[9] J. Deng, R. Han and S. Mishra, “INSENS: Intrusion- Tolerant Routing in Wireless Sensor Networks,” Department of Computer Science Technical Report CU-CS- 939-02, University of Colorado, Boulder, 2006.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.