Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

05.10.2016

An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Medaglia, C. M., & Serbanati, A. (2010). An overview of privacy and security issues in the internet of things. In D. Giusto (Ed.), The internet of things: 20th tyrrhenian workshop on digital communications (pp. 389–395). New York: Springer.CrossRef Medaglia, C. M., & Serbanati, A. (2010). An overview of privacy and security issues in the internet of things. In D. Giusto (Ed.), The internet of things: 20th tyrrhenian workshop on digital communications (pp. 389–395). New York: Springer.CrossRef
2.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Retrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Retrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
3.
Zurück zum Zitat Galuba, W., Papadimitratos, P., Poturalski, M., & Aberer, K. (2010). Castor: Scalable secure routing for ad hoc networks. In International conference on computer communications, IEEE, pp. 2829–2837. Galuba, W., Papadimitratos, P., Poturalski, M., & Aberer, K. (2010). Castor: Scalable secure routing for ad hoc networks. In International conference on computer communications, IEEE, pp. 2829–2837.
4.
Zurück zum Zitat Aivaloglou, E., & Gritzalis, S. (2010). Hybrid trust and reputation management for sensor networks. Wireless Networks, 16(5), 1493–1510.CrossRef Aivaloglou, E., & Gritzalis, S. (2010). Hybrid trust and reputation management for sensor networks. Wireless Networks, 16(5), 1493–1510.CrossRef
5.
Zurück zum Zitat Hodges, S., Taylor, S., Villar, N., Scott, J., Bial, D., & Fischer, P. T. (2013). Prototyping connected devices for the internet of things. Computer, 46(2), 26–34.CrossRef Hodges, S., Taylor, S., Villar, N., Scott, J., Bial, D., & Fischer, P. T. (2013). Prototyping connected devices for the internet of things. Computer, 46(2), 26–34.CrossRef
6.
Zurück zum Zitat Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.CrossRef Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.CrossRef
7.
Zurück zum Zitat Siaterlis, C., & Maglaris, B. (2004). Towards multisensor data fusion for dos detection. In Proceedings of the ACM symposium on applied computing, ACM, pp. 439–446. Siaterlis, C., & Maglaris, B. (2004). Towards multisensor data fusion for dos detection. In Proceedings of the ACM symposium on applied computing, ACM, pp. 439–446.
8.
Zurück zum Zitat Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.CrossRefMATH Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.CrossRefMATH
9.
Zurück zum Zitat Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2009). A novel flexible trust management system for heterogeneous wireless sensor networks. In International symposium on autonomous decentralized systems, IEEE, pp. 1–6. Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2009). A novel flexible trust management system for heterogeneous wireless sensor networks. In International symposium on autonomous decentralized systems, IEEE, pp. 1–6.
10.
Zurück zum Zitat Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks. Journal of Software, 19(7), 1716–1730.CrossRef Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks. Journal of Software, 19(7), 1716–1730.CrossRef
11.
Zurück zum Zitat Hu, X., Wei, Q., & Tang, H. (2010). Model and simulation of creditability-based data aggregation for the internet of things. Chinese Journal of Scientific Instrument, 31(11), 2636–2640. Hu, X., Wei, Q., & Tang, H. (2010). Model and simulation of creditability-based data aggregation for the internet of things. Chinese Journal of Scientific Instrument, 31(11), 2636–2640.
12.
Zurück zum Zitat Xiang-Dong, H. U., Peng-Qin, Y. U., & Wei, Q. F. (2012). Detection of selective forwarding attack in the internet of things. Journal of Chongqing University of Posts & Telecommunications, 24(2), 148–152. Xiang-Dong, H. U., Peng-Qin, Y. U., & Wei, Q. F. (2012). Detection of selective forwarding attack in the internet of things. Journal of Chongqing University of Posts & Telecommunications, 24(2), 148–152.
13.
Zurück zum Zitat Reddy, Y., Durand, J., & Kafle, S. (2010). Detection of packet dropping in wireless sensor networks. In International conference on information technology: New generations, IEEE, pp. 879–884. Reddy, Y., Durand, J., & Kafle, S. (2010). Detection of packet dropping in wireless sensor networks. In International conference on information technology: New generations, IEEE, pp. 879–884.
14.
Zurück zum Zitat Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. In International colloquium on computing, communication, control, and management, IEEE, Vol. 3, pp. 109–113. Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. In International colloquium on computing, communication, control, and management, IEEE, Vol. 3, pp. 109–113.
15.
Zurück zum Zitat Man-Fu, M. A., & Zhang, L. (2013). Inter-domain trust model based on gateway of Iot. Computer Engineering & Design, 34(11), 3829–3834. Man-Fu, M. A., & Zhang, L. (2013). Inter-domain trust model based on gateway of Iot. Computer Engineering & Design, 34(11), 3829–3834.
16.
Zurück zum Zitat Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.CrossRefMATH Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.CrossRefMATH
17.
Zurück zum Zitat Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trUst management scheme for sensor networks security. In IEEE international conference on mobile adhoc and sensor systems, IEEE, pp. 437–446. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trUst management scheme for sensor networks security. In IEEE international conference on mobile adhoc and sensor systems, IEEE, pp. 437–446.
18.
Zurück zum Zitat Liu, T., Xiong, Y., Huang, W., Qiwei, L. U., & Gong, X. (2013). Node behavior and identity-based trusted authentication in wireless sensor networks. Journal of Computer Applications, 33(7), 1842–1845.CrossRef Liu, T., Xiong, Y., Huang, W., Qiwei, L. U., & Gong, X. (2013). Node behavior and identity-based trusted authentication in wireless sensor networks. Journal of Computer Applications, 33(7), 1842–1845.CrossRef
19.
Zurück zum Zitat Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. In Proceedings of world academy of science engineering & technolog, pp. 2070–3740. Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. In Proceedings of world academy of science engineering & technolog, pp. 2070–3740.
20.
Zurück zum Zitat Pissinou, N., & Crosby, G. V. (2007). Cluster-based reputation and trust for wireless sensor networks. In 4th IEEE consumer communications and networking conference, IEEE, pp. 604–608. Pissinou, N., & Crosby, G. V. (2007). Cluster-based reputation and trust for wireless sensor networks. In 4th IEEE consumer communications and networking conference, IEEE, pp. 604–608.
21.
Zurück zum Zitat Chow, C. Y., Mokbel, M. F., & Leong, H. V. (2011). On efficient and scalable support of continuous queries in mobile peer-to-peer environments. IEEE Transactions on Mobile Computing, 10(10), 1473–1487.CrossRef Chow, C. Y., Mokbel, M. F., & Leong, H. V. (2011). On efficient and scalable support of continuous queries in mobile peer-to-peer environments. IEEE Transactions on Mobile Computing, 10(10), 1473–1487.CrossRef
22.
Zurück zum Zitat Denko, M. K., Sun, T., & Woungang, I. (2011). Trust management in ubiquitous computing: A bayesian approach. Computer Communications, 34(3), 398–406.CrossRef Denko, M. K., Sun, T., & Woungang, I. (2011). Trust management in ubiquitous computing: A bayesian approach. Computer Communications, 34(3), 398–406.CrossRef
23.
Zurück zum Zitat Cabrerizo, F. J., Alonso, S., & Herreraviedma, E. (2009). A consensus model for group decision making problems with unbalanced fuzzy linguistic information. International Journal of Information Technology & Decision Making, 08(1), 109–131.CrossRefMATH Cabrerizo, F. J., Alonso, S., & Herreraviedma, E. (2009). A consensus model for group decision making problems with unbalanced fuzzy linguistic information. International Journal of Information Technology & Decision Making, 08(1), 109–131.CrossRefMATH
24.
Zurück zum Zitat Chiclana, F., Mata, F., Martnez, L., Herreraviedma, E., & Alonso, S. (2008). Integration of a consistency control module within a consensus model. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 16(1), 35–53.MathSciNetCrossRef Chiclana, F., Mata, F., Martnez, L., Herreraviedma, E., & Alonso, S. (2008). Integration of a consistency control module within a consensus model. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 16(1), 35–53.MathSciNetCrossRef
25.
Zurück zum Zitat Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.MATH Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.MATH
26.
Zurück zum Zitat Momani, M., Challa, S., & Alhmouz, R. (2010). Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Networks, 5(7), 815–822.CrossRef Momani, M., Challa, S., & Alhmouz, R. (2010). Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Networks, 5(7), 815–822.CrossRef
27.
Zurück zum Zitat Ji, S., Xue, Y., & Carin, L. (2008). Bayesian compressive sensing. IEEE Transactions on Signal Processing, 56(6), 2346–2356.MathSciNetCrossRef Ji, S., Xue, Y., & Carin, L. (2008). Bayesian compressive sensing. IEEE Transactions on Signal Processing, 56(6), 2346–2356.MathSciNetCrossRef
28.
Zurück zum Zitat Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2008). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.CrossRef Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2008). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.CrossRef
29.
Zurück zum Zitat Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In IEEE 23rd international symposium on personal indoor and mobile radio communications, IEEE, pp. 18–23. Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In IEEE 23rd international symposium on personal indoor and mobile radio communications, IEEE, pp. 18–23.
Metadaten
Titel
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things
Publikationsdatum
05.10.2016
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3802-y

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt