Abstract
We derive a new representation for the collusive sensor nodes when the underlying fraudulent correlated environment has strong influence on wireless sensor networks performance. We have evaluated collusion effect with respect to static (SW) and dynamic (DW) wireless sensor networks to derive the joint resultant. Moreover accuracy, path length, and energy consumption of sensor node operations are also evaluated. Additionally, we emphasized over the satisfaction evaluation for linguistic fuzzy trust and reputation (LFTM) models in the deployed WSN framework. Finally, simulation analysis has been carried out to prove the validity of our proposal. However, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario.
1. Introduction
Rapid development in the area of communications through wireless sensor networks (WSN) attracted more attention of scientists and researchers over the last few years [1]. Wireless sensors are small-sized devices equipped with radio transceivers and low power batteries. Typical features of sensor node include power, storage, and low cost computational capability hardware [2, 3]. A wireless sensor network is designed to sense, collect, process, and transmit event specific information in order to accomplish a distributed domain task. Moreover wireless sensor networks [4, 5] are the type of networks where the resultant is fully based on the sensor nodes cooperation. The potential of wireless sensor networks can be equally deployed in the wider area of applications such as defense equipment, ecological and habitat monitoring, industrial process control, home automation, weather forecasting, health care system, traffic control, and civilian applications. Usually wireless sensor networks are deployed in an open informant where the probability of an adversary [6] always remains more than in a closed environment. These malicious nodes may spread wrong information on the entire network which results in overall system performance degradation. Therefore, it is quite mandatory to identify the collusive nodes and punish them in an accord manner. There are numerous proposals to detect an adversary node in the wireless sensor networks. Traditional means to protect a network include cryptography specific techniques and methodologies. Complex computations in the cryptography strategies [7] become its major drawbacks and made these policies unsuitable to be deployed in wireless sensor network which constitutes severe power constraints. Some lightweight cryptographic mechanisms are available in the literature, but they are not serving the goal in entirety. Therefore, there remains a dire need to probe for wireless sensor network reliability aspect and search some complementary means to incorporate more faith in the overall scenario. Trust and reputation models are the solution for the given problem to adhere to reliability in the wireless sensor networks. This is the reason why research on trust and reputation models has gained considerable momentum in the last few years. Many trust and reputation models have been proposed in the past. Some of them were centered around secure routing, data aggregation, cluster head selection, and synchronized trust management [8–10] but still there is need to address various issues like collusion, scalability, mobility, and computability in the wireless sensor networks. At present, most of the trust evaluation frameworks belong to an algorithm based methodology, over which entire behavior of nodes depends on accuracy, resource usability, and energy consumption. It is therefore necessary to concentrate on these issues in parallel with their performance and some real time aspects like collusion and fraudulent environment. Collusion can be referred to as a specific level of probability with which every malicious server will assign maximum rating to other malicious servers and minimum rating to the benevolent server. As a result, the most obedient node will become unable to contribute its services to the WSN system for most of the times, which further severely affect the overall system performance. Presence of malicious servers in the wireless sensor networks is the major and real root cause behind the collusion parameter. Therefore the specific issue like collusion must be addressed to enhance the capability of the entire WSN framework. So, we selected five popular trust and reputation models for their comparison and evaluation in terms of accuracy, path length, satisfaction, and energy consumption. This research focuses on the collusion issue and presented our analysis in the extreme fraudulent environment.
Section 2 reported surveys of five trust and reputation models with prior work on wireless sensor networks. Section 3 highlights our motivation for research work. Section 4 presented the problem definition and system model. Section 5 describes the detailed design of our experimental setup. Simulation results and validations are presented and discussed in Section 6. Finally, conclusions are made in Section 7.
2. Trust and Reputation Models with Related Prior Work
This section provides the background and related work on trust and reputation models in wireless sensor network with assumptions required for the designed frameworks for the later sections.
2.1. Eigen Trust Model
It is one of the most commonly used trust and reputation models in the wireless sensor network domain. Kamvar et al. [11] evaluated this model on the basis of the peer's history of contributions by assigning a unique global trust value in the peer-to-peer file system for each peer [12, 13]. Further into this model, the authors define
It ensures that all the value lies in between 0 and 1. The authors also introduced aggregated local trust value which is defined as
The malicious collectives issue was addressed by the following equation in this model:
2.2. Peer Trust Model
Xiong and Liu [14] in this model combine many aspects related to the trust and reputation management such as the feedback a peer receives from other peers, the total number of transactions of a peer, the credibility of the recommendations given by a peer, the transaction context factor, and the community context factor. The trust value of peer u,
2.3. Bioinspired Trust and Reputation Model (BTRM-WSN)
This model for wireless sensor networks is based on the bioinspired algorithm of ant colony system [15–19]. In this model, most trustworthy path leads to finding the most reputable service provider in a network. WSN launches a set of artificial agents while searching for a most reputable service provider. In order to carry out a decision about next sensor, a probability is given to each arc by the following expression:
The following equation represents modification of the ants [20] pheromone trace:
The distance factor joining the link between sensor r and s is given by the following equation:
2.4. LFTM Model
This linguistic fuzzy trust model [21] uses the concept of fuzzy reasoning. On one hand, it uses the representation power of linguistically labeled as fuzzy sets for the satisfaction of a client or the goodness of a server. On the other hand, it remains affected by the inference power of fuzzy logic, as in the imprecise dependencies between the originally requested service and the actual received one, or the punishment to apply in case of fraud. The expected result will be an easily interpretable system with adequate performance. In this model, a set of linguistic labels describing several levels of a variable or concept could be associated with a fuzzy set. The resultant set constitutes linguistic labels such as “very low,” “low,” “medium,” “high,” and “very high.” These defined fuzzy sets associated with such labels specify the level of client satisfaction.
2.5. Trust and Reputation Infrastructure Based Proposal (TRIP) Models
This model is based on the environment specific issues like infrastructure, area, density, and so forth, within the specified conditions [22]. Every time a node receives a signal from the other node, it assesses the reputation of the node in order to reject or drop the message based on the trustworthiness of that node. Each message depicts its actual level of importance or risk. Even the harmful message will not affect the system because of the fact that each message constitutes its trust level. The higher the trust level, the better the probability for its selection. Additionally, a reputation score calculation for each message is based on three different aspects, namely, (i) information directly from the targets, (ii) information from neighbor nodes, and (iii) information from the central unit. Informational database from all the three sources can be stored in the central unit. Finally, taking into consideration the entire information the best and appropriate decision can be easily taken.
3. Motivation for Current Work
To choose accurate trust and reputation models remains the top priority for the performance assessment of wireless sensor networks. Optimal trust and reputation models enhance the performance of the overall system about information dissemination, but the wireless sensor network system may not be dependent on the same. A simple trust and reputation modeling strategy may give the best result for a single instance but we have to deploy such efficient trust and reputation modeling strategies that provide optimal results in data dissemination. The improper modeling strategy may overload the entire network and consume more resources both in terms of energy and computation which result in the entire system performance degradation. There always remains dire influence of trust and reputation strategy on the entire operating environment when evaluating a specific wireless sensor network. The goal which remains there is to carefully choose and examine the trust and reputation modeling strategies for information dissemination and present an optimal result without compromising any constraints than the expected outcome. Therefore, a typical realization should be required to access the scope of a particular trust and reputation model strategy for the wireless sensor networks.
4. Problem Definition and System Model
In our analysis, we consider ten networks composed of two hundred sensor nodes, each for twenty scenarios in two-dimensional fields. Sensor nodes in a cluster with a specific radio range transmit the data to the cluster head and then to the base station within the entire network. Network deployment focuses on collusion and fraudulent conditions. Although any trust and reputation sensor node strategy can be used in our model, we used LFTM, BTRM, and peer trust model with static and dynamic wireless sensor network for our proposed framework. Static wireless sensor network can be referred to as a mode of communication where the position of all the nodes remains stationary, whereas in case of dynamic wireless sensor network, the nodes can change their positions in an accord manner. Accordingly, for a given network with static and dynamic wireless sensor network and trust and reputation models node strategy described above, we are interested in finding the following two problems: (i) what is the influence of collusion on static and dynamic communication node operations in the wireless sensor networks and (ii) how collusion affects the accuracy, path length, and energy consumption for different trust and reputation models in wireless sensor network.
5. Detailed Setup
We focused on three parametric aspects, namely: accuracy, path length, and energy consumption for information dissemination in wireless sensor networks. For this, we have developed the unmitigated scenario pinpointing two main targets. Firstly, we are interested in finding the value of three above-mentioned parameters for static wireless sensor network with and without collusion aspect. We want to know the summation of all the node operations with respect to collusion parameter. Lesser path length of node operation always gives due attention as it consumes fewer resources and exhibits more efficiency. Secondly, we want to make an estimation of the mobility effects on communication performance in correlation with the collusion for different trust and reputation models. Finally, we made the comprehensive evaluation of energy consumption with static and dynamic wireless sensor networks in our proposed framework. We designed a wireless sensor network template using the following parameters: 20% of all nodes in a randomly created WSN acted as clients where and the rest 80% of nodes acted as servers. Client nodes refers to the percentage of nodes which want to have or ask for services in a WSN. 5% of the nodes acted as relay servers which do not offer any services and act as relay nodes. The radio range of the nodes set at 10 hops to its neighbors. We consider a scenario where the percentage of fraudulent servers remained 70% which specifies the indispensable condition for our WSN framework evaluation. Fraudulent servers depict the percentage of adversaries in a wireless sensor network. We set the minimum and maximum numbers of nodes that can create a WSN equal to 200. Sensor nodes belonging to our developed networks spread over the area of
Scenario parameters.
Figure 1 shows the setup of the simulation. In the simulation window, yellow dots denote client nodes, green dots represent the benevolent nodes, red dots denote malicious node, blue dots represent relay nodes, and black dot denotes idle nodes respectively.

Simulation scenario.
6. Analytical Results and Validations
This section enables us to implement and evaluate trust and reputation models for different wireless sensor network modes. We used Java based event driven TRMSim-WSN simulator [23] version 0.5 forwireless sensor network allowing the researchers to simulate and represent random network distributions and provides statistics of different data dissemination policies including the provision to test the different trust and reputation models' strategies. Many decisions, like static or dynamic or oscillating networks, a combination of dynamic and oscillatory networks, the percentage of fraudulent nodes, the percentage of nodes acting as clients or servers, and so forth, can be implemented and tested over it. The proposed model is tested on five different trust and reputation models with extreme fraudulent conditions. We reported a comprehensive analysis based on collusion with static and dynamic wireless sensor networks. We collected data for four metrics, namely, accuracy, path length, satisfaction, and energy consumption. We investigated the comparative analysis of trust and reputation models with static WSN and dynamic in contrast with and without collusion parameter. Static node refers to the type of nodes whose position remains fixed and whereas the dynamic node can be mobile in the network. We considered four WSN modes, namely, (i) static WSN (SW), (ii) static WSN with collusion (SWC), (iii) dynamic WSN (DW), and (iv) dynamic WSN with collusion (DWC). We denote Eigen trust model with value 1, peer trust model with 2, BTRM-WSN model with value 3, LFTM with value 4, and TRIP model with value 5. The outcome of the simulations will be subject to the following subsections.
6.1. Accuracy
The term accuracy in the trust and reputation systems may be defined as the selected percentage of trustworthy nodes. We calculated accuracy parameter in terms of their current and average values. Current accuracy denotes the trustworthiness value calculated for the last node, whereas average accuracy presents the value of all nodes available in the mentioned framework. Initially, we calculated average accuracy correspond to different trust and reputation models as reported in Figure 2. The value of current accuracy remains highest in case of static WSN as compared to the rest of the WSN modes because of the fact that static nodes are less prone to failure than the dynamic as well as the combination of static and dynamic WSN with collusion aspect.

Current accuracy of different WSN modes with trust and reputation models.
Next, we considered the second evaluation for average accuracy with the same WSN framework. According to Figure 3, again average accuracy shows the similar behavior with the current accuracy in Figure 2 above as the value of average accuracy remains highest in case of static WSN than the rest of the WSN modes. For static WSN (SW) and dynamic WSN (DW) modes, the value of current and average accuracy remains highest in LFTM model than other models in most fraudulent conditions, whereas TRIP model depicts the minimum value. In case of static WSN with collusion (SWC) and dynamic WSN with collusion (DWC) mode, the Eigen trust model outperforms the rest of the models in current and average accuracy values, whereas peer trust model shows minimum accuracy value. We have also presented the scalability impact on the wireless sensor network [24]. We enhanced this evaluation towards a bit of an intricate assessment by incorporating collusion, malicious servers, resource utilization, satisfaction, and energy evaluation aspect on a single platform. One common point we have noticed is that there is severe effect of collusion and mobility of nodes on the accuracy of WSN system, as the accuracy declines to a bit of an intricate level when a node changes its state from static to dynamic.

Average accuracy of different WSN modes with trust and reputation models.
6.2. Path Length
The next parameter of our concern is path length which can be defined as the number of resources a particular network utilizes with a particular trust and reputation model. In the consistent pattern of accuracy evaluation types, we evaluated the current and average path length on the similar pattern of accuracy for all the WSN modes. Current path length depicts the resource utilization value calculated for the last node, whereas average path length exhibits the value of all nodes present in the scenario. Figures 4 and 5 represent the value of current and average path length which remains quiet in case of TRIP model for both the current and average case viewpoints than other models. This is due to the fact that the TRIP model constitutes the fixed infrastructure for its functionality resulting in lesser path length as compared to other models. Among the rest of the models, LFTM model consumes lesser path length than the rest of the models in the case of SW mode and DW mode, whereas the SWC and DWC modes of BTRM utilize the minimum path length.

Path length of different WSN modes with trust and reputation models.

Average path length of different WSN modes with trust and reputation models.
We also observed that BTRM utilizes the maximum path length of all the SW, SWC, DW, and DWC WSN modes. This shows the excellent agreement with the results reported in reference [25]. An initiative towards the description of energy consumption analysis for different trust and reputation models was proposed in reference [25]. We enhanced this evolution towards a bit of a complex assessment by incorporating collusion, satisfaction, and energy evaluation aspect in our scenario. Moreover in the later energy consumption subsection we proposed a mathematical equation for overall energy consumption which adds more robustness in our evaluation.
We proposed a more robust framework subsuming different WSN versus collusion scalability on a single platform. Xiong and Liu [14] reported peer-to-peer trust and reputation based model for structured peer-to-peer networks including strategies for their implementation and evaluation in decentralized environmental conditions. Also, Xiong and Liu [14] emphasized over trust metric in order to assess trustworthiness, feedback, and credibility of peer-to-peer networks. Specifically, unstructured peer-to-peer networks based on parameters were proposed by Chen et al. [26]. We enhanced the contribution to a certain extent by incorporating collusion, satisfaction, and energy consumption parameters for wireless sensor network evaluation making our investigation more robust and real time.
6.3. Satisfaction
Additionally, we calculated the satisfaction level of different WSN modes for LFTM model as shown in Figure 6. In the context of trust and reputation models, satisfaction can be defined as a particular level of subjectivity up to a specific degree in which the system can behave as per desired goal for mentioned probability. The observation shows that in the static mode satisfaction level is very high as compared to the rest of WSN modes, whereas incorporation of collusion to SW and DW modes decreases its value.

Satisfaction analysis of different WSN modes with LFTM trust and reputation model.
6.4. Energy Concerns
One of the major issues, when dealing with the wireless sensor network, is energy consumption. So, lastly we emphasized on the average energy consumption by SW, SWC, DW, and DWC modes of five trust and reputation models in wireless sensor networks. The power requirement of a sensor node can be analyzed as a function of distance as per the references [27, 28]. For most of the models, energy consumption E by a message at a distance d is given by [16, 29]
Table 2 compares the five trust and reputation models from the energy consumption aspect as shown below. Reference [30] reported a comparative analysis of the energy consumption with respect to sensors value increment.
Energy consumption for trust and reputation models with WSN modes.
In our proposal, we extended this concept towards the different WSN modes and simultaneously clubbing these modes with different trust and reputation models. We observed that the Eigen trust model consumes maximum power in all the SW, SWC, DW, and DWC modes, whereas TRIP model reported minimum energy consumption. We observed that more complexity involvement in the Eigen trust model is the reason for utmost energy consumption and in case of TRIP model energy consumption being the minimum because of the simpler computation involved in trust value computation. We also extended the mathematical relation as reported in references [27, 28] for the energy consumption for trust and reputation models in our framework
Overall, we investigated the entire framework twenty times for different WSN modes and corresponding five trust and reputation models. One common thing we observed is that more complexity in any trust and reputation model attracts more resources utilization and power consumption. We added a variety of evaluation strategies based on accuracy, path length, satisfaction, and power consumption for sensor node operations in our proposed framework which make over a scenario more robust as compared to the approach reported by Pan et al. [31]. A new trust and reputation model by adding additional constraints to BTRM-WSN adopting an interactive multiple ant colony algorithm was also suggested in reference [31]. We extended the concept by adding more robust constraints like static, dynamic, collusive, and a combination of all these aspects on a single platform for the trust and reputation models investigations in wireless sensor networks. Qureshi et al. [20] presented FIRE trust and reputation model extension to detect and prevent direct interaction and validate interaction collusion attacks in wireless networks. We enhanced this concept of reference [20] for wireless sensor networks with collusion and satisfaction aspect evaluation with five trust and reputation models over wireless sensor networks. Our analysis shows that there remains always significant impact of collusion over static and dynamic mode of WSN, resulting in the performance degradation of the overall system.
7. Conclusions
This paper concluded the impact of collusion on different trust and reputation models in wireless sensor networks. We have observed the effect of collusion for static, dynamic, and collusive sensor nodes in a WSN framework. It is evident from the simulation that there is a strong relationship between collusion and WSN modes in trust and reputation model evaluation. We evaluated a wireless sensor network framework for collusion aspect with reference to four performance metrics, namely: accuracy, path length, satisfaction, and energy consumption viewpoint. We estimated accuracy and path length in terms of overall percentage of the functionality, whereas energy consumption in terms of millijoule specifically for sensor node operations. The performance of the WSN system changes along with the different WSN modes and collusion present in the scenario. We mainly concentrated toward the comparative evaluation of static, dynamic, and collusive WSN modes deployed in our designed model. Our research work presented a comprehensive investigation over collusion parameters with five trust and reputation models. We stressed on three major directions. Firstly, we evaluated accuracy, path length, satisfaction, and energy consumption for collusive and noncollusive modes of wireless sensor networks. Secondly, we investigated the entire framework for comparative evaluation of above-discussed trust and reputation models, and lastly the same model is deployed for the mathematical derivation of the energy equation of a wireless sensor network. We observed that with the collusion adoption in the WSN modes, the result becomes much steeper, that is, performance degradation. In case of static nodes, the collusion affects less to WSN when it is incorporated in dynamic mode. Also, node operations remain more in case of collusion than without it. From this investigation, we can predict that the lesser the collusive nodes the more the probability of accuracy, the better resource utilization, the adequate satisfaction level, and the lesser the energy consumption of the entire WSN will be exhibited by the wireless sensor network system. In the future, we would like to develop further trust and reputation models in our evaluation as well as work towards additions on newer distribution strategies for the wireless sensor network domain. Finally, this work allows us to analytically formulate investigative strategies under specified scenarios and therefore provides insight for directing the designated model for wireless sensor network evolution.
Footnotes
Conflict of Interests
The authors declare that they have no conflict of interests regarding the publication of this paper.
Acknowledgments
The authors would like to thank the Department of Information and Communication Engineering, University of Murcia (Spain) [
], for TRMSim-WSN simulator for wireless sensor network which greatly supports them for their research work. Authors are also thankful to NetSim simulator developers. Additionally, they would like to thank the Department of Electronics and Communication engineering, Sant Longowal Institute of Engineering & Technology, Longowal, India, for providing them with Wireless SignalPro software which helps them in the final result preparation. Last but not least, the authors would like to thank the reviewers for their valuable suggestions which bring the paper in present form.
