{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T14:42:59Z","timestamp":1767451379009,"version":"3.40.3"},"reference-count":95,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2012,7,5]],"date-time":"2012-07-05T00:00:00Z","timestamp":1341446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2013,6]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>Wireless sensor networks (WSNs) are emerging as useful technology for information extraction from the surrounding environment by using numerous small\u2010sized sensor nodes that are mostly deployed in sensitive, unattended, and (sometimes) hostile territories. Traditional cryptographic approaches are widely used to provide security in WSN. However, because of unattended and insecure deployment, a sensor node may be physically captured by an adversary who may acquire the underlying secret keys, or a subset thereof, to access the critical data and\/or other nodes present in the network. Moreover, a node may not properly operate because of insufficient resources or problems in the network link. In recent years, the basic ideas of trust and reputation have been applied to WSNs to monitor the changing behaviors of nodes in a network. Several trust and reputation monitoring (TRM) systems have been proposed, to integrate the concepts of trust in networks as an additional security measure, and various surveys are conducted on the aforementioned system. However, the existing surveys lack a comprehensive discussion on trust application specific to the WSNs. This survey attempts to provide a thorough understanding of trust and reputation as well as their applications in the context of WSNs. The survey discusses the components required to build a TRM and the trust computation phases explained with a study of various security attacks. The study investigates the recent advances in TRMs and includes a concise comparison of various TRMs. Finally, a discussion on open issues and challenges in the implementation of trust\u2010based systems is also presented. Copyright \u00a9 2012 John Wiley &amp; Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.597","type":"journal-article","created":{"date-parts":[[2012,7,5]],"date-time":"2012-07-05T12:50:15Z","timestamp":1341492615000},"page":"669-688","source":"Crossref","is-referenced-by-count":78,"title":["Comparative study of trust and reputation systems for wireless sensor networks"],"prefix":"10.1002","volume":"6","author":[{"given":"Osman","family":"Khalid","sequence":"first","affiliation":[{"name":"North Dakota State University Fargo ND U.S.A."}]},{"given":"Samee U.","family":"Khan","sequence":"additional","affiliation":[{"name":"North Dakota State University Fargo ND U.S.A."}]},{"given":"Sajjad A.","family":"Madani","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology Islamabad Pakistan"}]},{"given":"Khizar","family":"Hayat","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology Islamabad Pakistan"}]},{"given":"Majid I.","family":"Khan","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology Islamabad Pakistan"}]},{"given":"Nasro","family":"Min\u2010Allah","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology Islamabad Pakistan"}]},{"given":"Joanna","family":"Kolodziej","sequence":"additional","affiliation":[{"name":"Cracow University of Technology Cracow Poland"}]},{"given":"Lizhe","family":"Wang","sequence":"additional","affiliation":[{"name":"Center for Earth Observation and Digital Earth Chinese Academy of Sciences Beijing China"}]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[{"name":"University of the District of Columbia Washington DC U.S.A."}]},{"given":"Dan","family":"Chen","sequence":"additional","affiliation":[{"name":"China University of Geosciences Wuhan China"}]}],"member":"311","published-online":{"date-parts":[[2012,7,5]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1280"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"e_1_2_9_5_1","doi-asserted-by":"crossref","unstructured":"KhanSU.Approximate optimal sensor placements in grid sensor fields.65th Semi\u2010annual IEEE Vehicular Technology Conference(VTC) Dublin Ireland April2007;248\u2013251.","DOI":"10.1109\/VETECS.2007.63"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"SrinivasanA LiF WuJ.A novel CDS\u2010based reputation monitoring system for wireless sensor networks.28th International Conference on Distributed Computing Systems(ICDCS '08) Workshop 2008.","DOI":"10.1109\/ICDCS.Workshops.2008.17"},{"issue":"2","key":"e_1_2_9_7_1","first-page":"21","article-title":"Task\u2010based trust management for wireless sensor networks","volume":"3","author":"Chen H","year":"2009","journal-title":"International Journal of Security and its Applications"},{"key":"e_1_2_9_8_1","doi-asserted-by":"crossref","unstructured":"LiuS PangL PeiQ MaH PengQ.Distributed event\u2010triggered trust management for wireless sensor networks.Fifth International Conference on Information Assurance and Security 2009.","DOI":"10.1109\/IAS.2009.69"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.146"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.252"},{"issue":"3","key":"e_1_2_9_11_1","article-title":"A lightweight secure trust\u2010based localization scheme for wireless sensor networks","volume":"8","author":"Pandarinath P","year":"2010","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.147"},{"key":"e_1_2_9_13_1","unstructured":"YadavK SrinivasanA.iTrust: an integrated trust framework for wireless sensor networks.25th ACM Symposium on Applied Computing(SAC'10) Switzerland March 22\u201326 2010."},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2010.2304"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.355"},{"issue":"2","key":"e_1_2_9_16_1","first-page":"71","article-title":"Trust key management scheme for wireless body area networks","volume":"12","author":"Mana M","year":"2011","journal-title":"International Journal of Network Security"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.165"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_2_9_19_1","first-page":"1","article-title":"Trust computations and trust dynamics in mobile adhoc networks: a survey","volume":"99","author":"Govindan K","year":"2011","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"e_1_2_9_20_1","first-page":"181","article-title":"Survey of security issues in cognitive radio networks","volume":"12","author":"El\u2010Hajj W","year":"2011","journal-title":"Journal of Internet Technology"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2060252"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2010.1301"},{"issue":"4","key":"e_1_2_9_24_1","first-page":"562","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Ramana KS","year":"2010","journal-title":"International Journal of Network Security and Its Applications (IJNSA)"},{"issue":"10","key":"e_1_2_9_25_1","first-page":"1755","article-title":"A survey of trust and reputation management systems in wireless communications","volume":"98","author":"Yu H","year":"2010","journal-title":"Proceedings of the IEEE, School of Computer Engineering, Nanyang Technology University, Singapore"},{"volume-title":"Encyclopedia of Wireless and Mobile Communications","year":"2007","author":"Srinivasan A","key":"e_1_2_9_26_1"},{"key":"e_1_2_9_27_1","doi-asserted-by":"crossref","unstructured":"Fernandez\u2010GagoC RomanR LopezJ.A survey on the applicability of trust management systems for wireless sensor networks.3rd International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing(SecPerU'07) 2007;25\u201330.","DOI":"10.1109\/SECPERU.2007.3"},{"volume-title":"Data Communications and Networking","year":"2007","author":"Forouzan BA","key":"e_1_2_9_28_1"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_9_30_1","unstructured":"DutertreB CheungS LevyJ.Lightweight key management in wireless sensor networks by leveraging initial trust.System Design Laboratory SRI International Technical Report 2004;1\u201318."},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5772059"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.022"},{"issue":"11","key":"e_1_2_9_34_1","first-page":"2304","article-title":"Study on intrusion detection for wireless sensor network","volume":"25","author":"Yang L","year":"2008","journal-title":"Journal of Application Research of Computers"},{"volume-title":"Algorithms and Protocols for Wireless Ad\u2010Hoc and Sensor Networks","year":"2008","author":"Srinivasan A","key":"e_1_2_9_35_1"},{"key":"e_1_2_9_36_1","unstructured":"BucheggerS BoudecJYL.A robust reputation system for peer\u2010to\u2010peer and mobile ad\u2010hoc networks.Proceedings of P2PEcon June2004."},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029115"},{"key":"e_1_2_9_38_1","doi-asserted-by":"crossref","unstructured":"AlmenarezF MarinA DiazD SanchezJ.Developing a model for trust management in pervasive devices.4th Annual IEEE International Conference on Pervasive Computation Communication Washington DC 2006;267\u2013271.","DOI":"10.1109\/PERCOMW.2006.41"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e89-d.9.2502"},{"issue":"1","key":"e_1_2_9_40_1","first-page":"1","article-title":"Advances in wireless, mobile and P2P based internet protocols, applications, and architectures","volume":"6","author":"Khan SU","year":"2011","journal-title":"International Journal of Internet Protocol Technology"},{"key":"e_1_2_9_41_1","doi-asserted-by":"crossref","unstructured":"AbererK DespotovicZ.Managing trust in a peer\u20102\u2010peer information system.Proceedings of the 10th international conference on Information and knowledge management ACM New York 2001.","DOI":"10.1145\/502585.502638"},{"issue":"1","key":"e_1_2_9_42_1","first-page":"1","article-title":"Energy\u2010efficient communications for high\u2010performance distributed systems","volume":"6","author":"Khan SU","year":"2011","journal-title":"International Journal of Communication Networks and Distributed Systems"},{"key":"e_1_2_9_43_1","first-page":"27","article-title":"Managing behavior trust in grid computing environments","volume":"1","author":"Papalilo E","year":"2008","journal-title":"Journal of Information Assurance and Security"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.19"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.070711.110999"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0330-6"},{"key":"e_1_2_9_48_1","doi-asserted-by":"crossref","unstructured":"SkopikF TruongH DustdarS.Trust and reputation mining in professional virtual communities.International Conference on Web Engineering(ICWE '9) 2009;76\u201390.","DOI":"10.1007\/978-3-642-02818-2_6"},{"key":"e_1_2_9_49_1","unstructured":"SrinivasanA.Reputation and trust\u2010based security in wireless sensor networks.PhD Thesis Florida Atlantic University 2008."},{"key":"e_1_2_9_50_1","first-page":"568","volume-title":"Proceedings of International Conference on Information Technology: Coding and Computing","author":"Hadjichristofi GC","year":"2005"},{"key":"e_1_2_9_51_1","doi-asserted-by":"crossref","unstructured":"BucheggerS BoudecL.Performance analysis of the CONFIDANT protocol (cooperation of nodes\u2014fairness in dynamic ad\u2010hoc networks).3rd ACM International Symposium on MobiHoc Lausanne June2002.","DOI":"10.1145\/513800.513828"},{"key":"e_1_2_9_52_1","doi-asserted-by":"crossref","unstructured":"MichiardiP MolvaR.CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.Communication and Multimedia Security September 2002.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"e_1_2_9_53_1","unstructured":"BansalS BakerM.Observation\u2010based cooperation enforcement in ad hoc networks.Proceedings of Computing Research Repository(CoRR) 2003."},{"key":"e_1_2_9_54_1","doi-asserted-by":"crossref","unstructured":"MartiS GiuliTJ LaiK BakerM.Mitigating routing misbehaviour in mobile ad hoc networks.Proceedings of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom) 2000.","DOI":"10.1145\/345910.345955"},{"key":"e_1_2_9_55_1","first-page":"139","volume-title":"Ad Hoc Networking","author":"Johnson DB","year":"2001"},{"key":"e_1_2_9_56_1","doi-asserted-by":"crossref","unstructured":"BoukercheA LiX.An agent\u2010based trust and reputation management scheme\u2009.IEEE Global Telecommunications Conference 2005; pp. 5.","DOI":"10.1109\/GLOCOM.2005.1577970"},{"key":"e_1_2_9_57_1","doi-asserted-by":"crossref","unstructured":"KarpB KungHT.GPSR: greedy perimeter stateless routing for wireless networks.Proceedings of the 6th Annual International Conference on Mobile Computing and Networking(MobiCom'00) 2000.","DOI":"10.1145\/345910.345953"},{"key":"e_1_2_9_58_1","doi-asserted-by":"crossref","unstructured":"SrinivasanA WuJ TeitelbaumJ.DRBTS: distributed reputation based beacon trust system.2nd IEEE International Symposium on Dependable Autonomic and Secure Computing(DASC'06) 2006;277\u2013283.","DOI":"10.1109\/DASC.2006.28"},{"key":"e_1_2_9_59_1","first-page":"197","volume-title":"Proceedings of Symposium on Security and Privacy","author":"Chan H","year":"2003"},{"key":"e_1_2_9_60_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"e_1_2_9_61_1","doi-asserted-by":"crossref","unstructured":"KarlofC SastryN WagnerD.TinySec: link layer encryption for tiny devices.Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems(SenSys) 2004.","DOI":"10.1145\/1031495.1031515"},{"key":"e_1_2_9_62_1","unstructured":"GaneriwalS KumarR HanC LeeS SrivastavaMB.Location and identity based secure event report generation for sensor networks.Nested Data\u2010Parallel Language (NESL) Technical Report May2004."},{"key":"e_1_2_9_63_1","doi-asserted-by":"crossref","unstructured":"WatroR KongD CutiSF GardinerC LynnC KruusP.TinyPK: securing sensor networks with public key technology. Second workshop on Security in Sensor and Ad\u2010hoc Networks 2004.","DOI":"10.1145\/1029102.1029113"},{"key":"e_1_2_9_64_1","unstructured":"YeF LuoH LuS ZhangL.Statistical en\u2010route detection and filtering of injected false data in sensor networks. InProceedings of IEEE Infocom 2004."},{"key":"e_1_2_9_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.05.018"},{"key":"e_1_2_9_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.141"},{"key":"e_1_2_9_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2009.2023111"},{"key":"e_1_2_9_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2003969"},{"key":"e_1_2_9_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.84"},{"key":"e_1_2_9_70_1","unstructured":"JosangA IsmailR.The beta reputation system.The 15th Bled Electronic Commerce Conference Slovenia 2002."},{"key":"e_1_2_9_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_9_72_1","doi-asserted-by":"crossref","unstructured":"BlazeM FeigenbaumJ IoannidisJ KeromytisA.The keynote trust management system.University of Pennsylvania 1999.","DOI":"10.17487\/rfc2704"},{"key":"e_1_2_9_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2093521"},{"key":"e_1_2_9_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621979"},{"key":"e_1_2_9_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"e_1_2_9_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.44"},{"key":"e_1_2_9_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923723"},{"key":"e_1_2_9_78_1","unstructured":"Abdul\u2010RahmanA HailesS.Supporting trust in virtual communities.33rd Hawaii International Conference on System Sciences Hawaii 2000."},{"key":"e_1_2_9_79_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0619"},{"key":"e_1_2_9_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.60"},{"issue":"10","key":"e_1_2_9_81_1","first-page":"1","article-title":"Pseudo trust: zero\u2010knowledge authentication in anonymous P2Ps","volume":"19","author":"Lu L","year":"2008","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"e_1_2_9_82_1","first-page":"1","article-title":"PowerTrust: a robust and scalable reputation system for trusted peer\u2010to\u2010peer computing","volume":"18","author":"Zhou R","year":"2007","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_2_9_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871795"},{"key":"e_1_2_9_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_2_9_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2118240"},{"key":"e_1_2_9_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2008.2011312"},{"key":"e_1_2_9_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.2003369"},{"key":"e_1_2_9_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.89"},{"key":"e_1_2_9_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-005-5465-x"},{"key":"e_1_2_9_90_1","unstructured":"DasA IslamMM SorwarG.Dynamic trust model for reliable transactions in multi\u2010agent systems.13th International Conference on Advanced Communication Technology(ICACT) 2011;1101\u20131106."},{"key":"e_1_2_9_91_1","doi-asserted-by":"crossref","unstructured":"WangB HuangC YangW WangT.Trust opportunistic routing protocol in multi\u2010hop wireless networks.IEEE International Conference on Wireless Communications Networking and Information Security(WCNIS) 2010;563\u2013567.","DOI":"10.1109\/WCINS.2010.5541842"},{"key":"e_1_2_9_92_1","doi-asserted-by":"crossref","unstructured":"GoncalvesMRP MoreiraEDS MartimianoLAF.Trust management in opportunistic networks.9th International Conference on Networks(ICN) 2010;209\u2013214.","DOI":"10.1109\/ICN.2010.41"},{"key":"e_1_2_9_93_1","doi-asserted-by":"crossref","unstructured":"DenkoMK WoungangI ObaidatMS.Trust management in opportunistic pervasive healthcare systems.16th IEEE International Conference on Electronics Circuits and Systems(ICECS) 2009;832\u2013835.","DOI":"10.1109\/ICECS.2009.5410752"},{"key":"e_1_2_9_94_1","doi-asserted-by":"crossref","unstructured":"ChenH ZhouX GaoC.Agent\u2010based trust model in wireless sensor networks.8th ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel\/Distributed Computing 2007;119\u2013124.","DOI":"10.1109\/SNPD.2007.122"},{"key":"e_1_2_9_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621076.1621085"},{"key":"e_1_2_9_96_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.354"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.597","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.597","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T07:48:07Z","timestamp":1743666487000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.597"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,5]]},"references-count":95,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1002\/sec.597"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1002\/sec.597","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2012,7,5]]}}}