Skip to main content
Erschienen in: Wireless Networks 3/2018

22.09.2016

Trust evaluation method for clustered wireless sensor networks based on cloud model

verfasst von: Tong Zhang, Lisha Yan, Yuan Yang

Erschienen in: Wireless Networks | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trust Management has been proved to be an effective method to detect malicious nodes and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust management methods are not good at dealing with uncertainty of trust relationship such as randomness, fuzziness in WSNs, which leads to inaccurate trust metric. In this paper, a trust evaluation method for clustered wireless sensor networks based on cloud model is proposed and evaluated, which implements the conversion between qualitative and quantitative of sensor nodes’ trust metrics in order to achieve better trust evaluation. Firstly, the method considers multi-factors including communication factor, message factor and energy factor and builds mathematical model for each trust factor to get factor trust cloud. Secondly, immediate trust cloud is calculated by assigning adjustive weights for each factor trust cloud and combining them. Thirdly, recommendation trust cloud and immediate trust cloud are synthesized according to time sensitive factor in order to get final trust cloud. Furthermore, the final trust cloud of sensor node is converted to trust grade by trust cloud decision-making. Verification Experiments manifest that the proposed method has feasibility and accuracy in the aspect of evaluating sensor nodes’ trust. Moreover, comparison experiments under different attacks show that our method is sensitive to multiple attacks, it outperforms other trust evaluation methods not only in the accuracy of detecting malicious nodes, but also in the tolerance of abnormal conditions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1), 266–282.CrossRef
2.
Zurück zum Zitat He, D. J., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.CrossRef He, D. J., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.CrossRef
3.
Zurück zum Zitat Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRef
4.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef
5.
Zurück zum Zitat Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks”. IET Wireless Senors System, 2(3), 161–169.CrossRef Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks”. IET Wireless Senors System, 2(3), 161–169.CrossRef
6.
Zurück zum Zitat Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.CrossRef Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.CrossRef
7.
Zurück zum Zitat Marzi, H., & Marzi, A. (2014). A security model for wireless sensor networks. In Proceedings of IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (pp. 64–69). Marzi, H., & Marzi, A. (2014). A security model for wireless sensor networks. In Proceedings of IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (pp. 64–69).
8.
Zurück zum Zitat Sun, Y., Han, Z., & Ray Liu, K. J. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRef Sun, Y., Han, Z., & Ray Liu, K. J. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRef
9.
Zurück zum Zitat Geetha, V., & Chandrasekaran, K. (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), 173–183.CrossRef Geetha, V., & Chandrasekaran, K. (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), 173–183.CrossRef
10.
Zurück zum Zitat Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorial, 13(4), 562–583.CrossRef Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorial, 13(4), 562–583.CrossRef
11.
Zurück zum Zitat Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of IEEE symposium on security and privacy (pp. 164–173). Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of IEEE symposium on security and privacy (pp. 164–173).
12.
Zurück zum Zitat Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for internet of things. China Communications, 11(2), 148–156.CrossRef Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for internet of things. China Communications, 11(2), 148–156.CrossRef
13.
Zurück zum Zitat Ganeriwal, S., Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of ACM workshop security of ad hoc and sensor networks (pp. 66–67). Ganeriwal, S., Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of ACM workshop security of ad hoc and sensor networks (pp. 66–67).
14.
Zurück zum Zitat Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRef
15.
Zurück zum Zitat Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.CrossRef Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.CrossRef
16.
Zurück zum Zitat He, D., Chen, C., Chan, S., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef He, D., Chen, C., Chan, S., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRef
17.
Zurück zum Zitat Han, G., Jiang, J., Lei, L., & Guizani, M. (2015). An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447–2458.CrossRef Han, G., Jiang, J., Lei, L., & Guizani, M. (2015). An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447–2458.CrossRef
18.
Zurück zum Zitat Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 14(9), 2396–2407.CrossRefMATH Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 14(9), 2396–2407.CrossRefMATH
19.
Zurück zum Zitat Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.CrossRef Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.CrossRef
20.
Zurück zum Zitat Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A security trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.CrossRef Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A security trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.CrossRef
21.
Zurück zum Zitat Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d–s evidence theory. Sensors, 11(2), 1345–1360.CrossRef Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d–s evidence theory. Sensors, 11(2), 1345–1360.CrossRef
22.
Zurück zum Zitat Yang, K., Liu, S., & Li, X. (2015). A novel detection scheme based on D–S evidence theory in wireless sensor networks. In International conference on intelligent networking and collaborative systems (pp. 398–401). Yang, K., Liu, S., & Li, X. (2015). A novel detection scheme based on D–S evidence theory in wireless sensor networks. In International conference on intelligent networking and collaborative systems (pp. 398–401).
23.
Zurück zum Zitat Li, D. (2000). Uncertainty in knowledge representation. Engineering Science, 2(10), 73–79. Li, D. (2000). Uncertainty in knowledge representation. Engineering Science, 2(10), 73–79.
24.
Zurück zum Zitat Li, D., & Du, Y. (2008). Artificial intelligence with uncertainty (pp. 107–150). Boca Raton: Chapman & Hall/CRC Press.MATH Li, D., & Du, Y. (2008). Artificial intelligence with uncertainty (pp. 107–150). Boca Raton: Chapman & Hall/CRC Press.MATH
25.
Zurück zum Zitat Li, D., Liu, C., & Gan, W. (2009). A new cognitive model: Cloud model. International Journal of Intelligent Systems, 24(3), 257–375.CrossRefMATH Li, D., Liu, C., & Gan, W. (2009). A new cognitive model: Cloud model. International Journal of Intelligent Systems, 24(3), 257–375.CrossRefMATH
26.
Zurück zum Zitat Huang, H., & Wang, R. (2008). A subjective trust evaluation model based on membership cloud theory. Journal on Communications, 29(4), 13–19. Huang, H., & Wang, R. (2008). A subjective trust evaluation model based on membership cloud theory. Journal on Communications, 29(4), 13–19.
27.
Zurück zum Zitat Cai, H., Li, Z., & Tian, J. (2011). A new trust evaluation model based on cloud theory in E-commerence environment. In Proceedings of 2011 international symposium on intelligence information processing and trusted computing (pp. 139–142). Cai, H., Li, Z., & Tian, J. (2011). A new trust evaluation model based on cloud theory in E-commerence environment. In Proceedings of 2011 international symposium on intelligence information processing and trusted computing (pp. 139–142).
28.
Zurück zum Zitat Jin, B., Wang, Y., Liu, Z., & Xue, J. (2011). A trust model based on cloud model and bayesian network. Procedia Environmental Sciences, 11, 452–459.CrossRef Jin, B., Wang, Y., Liu, Z., & Xue, J. (2011). A trust model based on cloud model and bayesian network. Procedia Environmental Sciences, 11, 452–459.CrossRef
29.
Zurück zum Zitat Cai, S., Han, Q., Gao, Z., Yand, D., & Zhao, J. (2012). Research on cloud trust model for malicious node detection in wireless sensor network. Acta Electronica Sinica, 40(11), 2232–2238. Cai, S., Han, Q., Gao, Z., Yand, D., & Zhao, J. (2012). Research on cloud trust model for malicious node detection in wireless sensor network. Acta Electronica Sinica, 40(11), 2232–2238.
30.
Zurück zum Zitat Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceeding of the 33rd annual Hawaii international conference on system sciences (pp. 3005–3014). Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceeding of the 33rd annual Hawaii international conference on system sciences (pp. 3005–3014).
Metadaten
Titel
Trust evaluation method for clustered wireless sensor networks based on cloud model
verfasst von
Tong Zhang
Lisha Yan
Yuan Yang
Publikationsdatum
22.09.2016
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 3/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-016-1368-y

Weitere Artikel der Ausgabe 3/2018

Wireless Networks 3/2018 Zur Ausgabe

Neuer Inhalt