Abstract
Compared with the encryption and the authentication which can prevent the external attacks, the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network (WSN). The reputation time-varying (RTV) attacks are internal attacks. In the reputation time-varying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Time-window-based Resilient Trust Management Scheme (TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor F c and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
Similar content being viewed by others
References
Guo M J, Liu Y H, Yu H B, et al. An overview of smart city in China. China Commun, 2016, 13: 203–211
Xiong Z, Sheng H, Rong W G, et al. Intelligent transportation systems for smart cities: a progress review. Sci China Inf Sci, 2012, 55: 2908–2914
Mois G, Sanislav T, Folea S C. A cyber-physical system for environmental monitoring. IEEE Trans Instrum Meas, 2016, 65: 1463–1471
Yang Y, Zhao C, Yao S, et al. Delay performance of network-coding-based epidemic routing. IEEE Trans Veh Technol, 2016, 65: 3676–3684
Chen W, Jiang X R, Tang Z B, et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks. Artif Intell Rev, 2015, 43: 579–591
Tao X F, Xu X D, Cui Q M. An overview of cooperative communications. IEEE Commun Mag, 2012, 50: 65–71
Yang Y, Zhang W X, Wei K, et al. Power reduction for mobile devices by deploying low-power base stations. IET Commun, 2014, 8: 3372–3380
Saurabh G, Mani B S. Reputation-based framework for high integrity sensor network. In: Proceedings of ACM Workshop on Security of ad hoc and Sensor Network. New York: ACM, 2004. 66–77
Yang G, Yin G S, Yang W, et al. A reputation-based model for malicious node detection in WSNs (in Chinese). J Harbin Inst Technol, 2009, 41: 158–162
Jiang J F, Han G J, Wang F, et al. An efficient distributed trust model for wireless sensor network. IEEE Trans Parall Distrib Syst, 2015, 26: 1228–1337
He D J, Chen C, Chan S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inform Technol Biomed, 2012, 16: 1164–1175
Meghanathan N. A distributed trust evaluation model for wireless mobile sensor networks. In: Proceedings of International Conference on Information Technology: New Generations (ITNG), Las Vegas, 2014. 186–191
UmaRani V, Sundaram K S, Jayashree D. Enhanced beta trust model in wireless sensor networks. In: Proceedings of International Conference on Information Communication and Embedded Systems (ICICES), Tamil Nadu, 2016. 1–5
Wang N, Liu D Q. Trust model based on changeable sampling frequency for wireless sensor network. In: Proceedings of IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, 2016. 1–4
Xia H, Jia Z P, Sha E H-M. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 2014, 8: 88–103
Gheorghe L, Rughinis R, Tataroiu R. Adaptive trust management protocol based on intrusion detection for wireless sensor network. In: Proceedings of RoEduNet International Conference on Networking in Education and Research, Constanta, 2013. 1–7
Fang F, Li J F, Li J. A reputation management scheme based on multi-factor in WSN. In: Proceeding of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). Shenyang, 2013. 3843–3848
Labraoui N. A reliable trust management scheme in wireless sensor networks. In: Proceedings of IEEE International Symposium on Programming and Systems (ISPS), Algiers, 2015. 1–6
Su W G, Liao Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun, 2015, 12: 119–126
Ren Y, Zadorozhny V I, Oleshchuk V A, et al. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans Mob Comput, 2014, 13: 1409–1423
Reshmi V, Sajitha M. Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks. In: Proceeding of IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015. 1–6
Zhu C S, Nicanfar H, Leung V C M, et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur, 2015, 10: 118–131
Fang W D, Zhang C L, Shi Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl, 2016, 59: 88–94
Shafer G. A Mathematical Theory of Evidence. Princeton: Princeton University, 1976
Jøsang A. A logic for uncertain probabilities. Int J Uncertain Fuzz Knowl-Based Syst, 2011, 9: 279–311
Acknowledgements
This work was partially supported by National Natural Science Foundation of China (Grant No. 61471346), Shanghai Natural Science Foundation (Grant No. 17ZR1429100), International Science and Technology Cooperation Program of China (Grant No. 2014DFA11640), National Program of Internation- al Science and Technology Cooperation (Grant No. 2014DFE10160), National Science and Technology Major Project (Grant No. 2014ZX03005001), and National Natural Science Foundation and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fang, W., Zhang, W., Yang, Y. et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60, 040305 (2017). https://doi.org/10.1007/s11432-016-9028-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-016-9028-0