The critical role of structural hole in forming trust for Securing Wireless Sensor Networks

Main Article Content

Ming Xiang
William Liu
Quan Bai
Adnan Al-Anbuky


Wireless sensor networks, Trust and reputation managment, Adaptive networks, Structural hole, Topological metrics


The security issues in wireless sensor networks (WSNs) are crucial and the limitation of computing resources and distributed properties of WSN make the traditional security mechanisms no longer feasible in protecting WSN as in the wired networks. There is an emerging research area i.e., trust and reputation mechanisms, has been developed, as an alternative solution to tackle the security issues in WSNs. While the recent studies on trust are mainly focusing on the trust modelling so as to effectively detect and avoid malicious activities. In this paper, we propose to use adaptive network approach to investigate the interplay between the network entities' trust behaviour and their underlying topological connectivity. We have found that the structural hole has its unique position and efficiency on connecting different regional sub-networks, but on the other side, from the security perspective, it has risks of fragile in the network. The extensive simulation studies have confirmed that structure hole plays a critical role on both for securing WSNs and also enable network routing efficiency.


Download data is not yet available.
Abstract 1180 | PDF Downloads 8


Adams, W. J., & Davis, I. N.J. 2005. ‘Toward a decentralized trust-based access control system for dynamic collaboration’. In Information Assurance Workshop, 2005. IAW ’05. Proceedings from the Sixth Annual IEEE SMC (pp. 317–324). Available from:

Bao, F., Chen, I.-R., Chang, M., & Cho, J.-H. 2012. ‘Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection’. IEEE Transactions on Network and Service Management, 9(2), 169–183. Available from:

Burt, R. S. 2000. ‘The network structure of social capital’. Research in Organizational Behavior, Vol 22, 2000, 22, 345–423. Available from:

Burt, R.S. 2009. ‘Structural holes: The social structure of competition’. Harvard University Press.

Cook, K.S., & Emerson, R.M., 1978. ‘Power, equity, and commitment in exchange networks’. American Sociological Review, vol. 43, 721-739.

Ellens, W., & Kooij, R. E. (2013). ‘Graph measures and network robustness’. arXiv:1311.5064 [physics]. Available from:

Eschenauer, L., Gligor, V. D., & Baras, J. 2002. ‘On Trust Establishment in Mobile Ad-Hoc Networks’. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe (Eds.), Security Protocols (pp. 47–66). Springer Berlin Heidelberg. Available from:

Freeman, L. C. 1978. ‘Centrality in social networks conceptual clarification’. Social Networks, 1(3), 215–239. Available from:

Granovetter, M. S. 1973. The Strength of Weak Ties. American Journal of Sociology, 78(6), 1360–1380.

Gross, T., & Sayama, H. 2009. ‘Adaptive Networks’. In T. Gross & H. Sayama (Eds.), Adaptive Networks (pp. 1–8). Springer Berlin Heidelberg. Available from:

Iera, A., Floerkemeier, C., Mitsugi, J., & Morabito, G. 2010. ‘The Internet of things [Guest Editorial]’. IEEE Wireless Communications, 17(6), 8–9. Available from:

Josang, A. 1996. ‘The Right Type of Trust for Distributed Systems’. Proceedings of the ACM New Security Paradigms Workshop, 119-131.
J-Sim. Available from:

Krackhardt, D. 1999. ‘The ties torture: Simmelian tie analysis in organization’. Research in the Sociology of Organization 16.1, 183-210.

Latora, V., Nicosia, V., & Panzarasa, P. 2013. ‘Social Cohesion, Structural Holes, and a Tale of Two Measures’. Journal of Statistical Physics, 151(3-4), 745–764. Available from:

Liqin, T., Chuang, L., & Tieguo, J. 2006.’ Quantitative Analysis of Trust Evidence in Internet’. In International Conference on Communication Technology, 2006. ICCT ’06 (pp. 1–5). Available from:

Mahalle, P. N., Thakre, P. A., Prasad, N. R., & Prasad, R. 2013. ‘A fuzzy approach to trust based access control in internet of things’. In 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace Electronic Systems (VITAE) (pp. 1–5). Available from:

Marsh, S. (1994). ‘Formalising Trust as a Computational Concept’. PhD Thesis, University of Stirling, UK.

Martin-Hernandez, J., Van Mieghem, P., TU Delft: Electrical Engineering, Mathematics and Computer Science: Intelligent Systems (INSY), & TU Delft, Delft University of Technology. (2013, October 28). ‘Measuring Robustness of Complex Networks’. Available from:

Mayer, R. C., Davis, J. H., & Schoorman, F. D. 1995. ‘An Integrative Model Of Organizational Trust’. Academy of Management Review, 20(3), 709–734. Available from:

McCabe, C., Watson, R. A., Prichard, J., & Hall, W. 2011. ‘The Web As an Adaptive Network: Coevolution of Web Behavior and Web Structure’. In Proceedings of the 3rd International Web Science Conference (pp. 22:1–22:7). New York, NY, USA: ACM. Available from:

Momani, M., & Challa, S. 2010. ‘Survey of trust models in different network domains’. arXiv:1010.0168 [cs]. Available from:

Mu, B., & Yuan, S. 2010. ‘A method for evaluating initial trust value of direct trust and recommender trust’. In 2010 International Conference on Computer Design and Applications (ICCDA) (Vol. 2, pp. V2–185–V2–190). Available from:

Peng, S., He, J., & Meng, Y. 2008. ‘Reputation-based Trust Update in Network Environment’. In 2008 International Symposium on Electronic Commerce and Security (pp. 118–123). Available from:

Sydney, A., Scoglio, C., & Gruenbacher, D. 2013. ‘Optimizing algebraic connectivity by edge rewiring’. Applied Mathematics and Computation, 219(10), 5465–5479. Available from:

Tan, L., & Wang, N. 2010. ‘Future internet: The Internet of Things’. In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE) (Vol. 5, pp. V5–376–V5–380). Available from:

Tchepnda, C., & Riguidel, M. 2006. ‘Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks’. In 20th International Conference on Advanced Information Networking and Applications, 2006. AINA 2006 (Vol. 2, pp. 33–38). Available from:

Xia, H., Jia, Z., Ju, L., Li, X., & Zhu, Y. 2011. ‘A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules’. In 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom) (pp. 124–130). Available from:

Xiang, M., Bai, Q., & Liu, W. 2012. ‘Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems’. In 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT) (Vol. 3, pp. 378–382). Available from:

Yang, M. L., Al-Anbuky, A., & Liu, W. 2014. ‘An Authenticated Scheme for Wireless Sensor Network’. J. Sensor Actuator Network, 3(3), 181-206. Available from:

Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. 2010. ‘A Survey of Trust and Reputation Management Systems in Wireless Communications’. Proceedings of the IEEE, 98(10), 1755–1772. Available from:

Zhang, Y., Wang, L., & Sun, W. 2013. ‘Trust System Design Optimization in Smart Grid Network Infrastructure’. IEEE Transactions on Smart Grid, 4(1), 184–195. Available from: