A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks

被引:0
|
作者
Fu, Shiming [1 ]
Zhang, Ping [2 ]
Shi, Xuehong [2 ]
机构
[1] Chongqing Univ Educ, Sch Artificial Intelligence, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
关键词
Wireless sensor networks; Monitoring; Cloud computing; Security; Wireless communication; Distributed databases; Communication system security; behavior monitoring; cloud; fuzzy; trust; wireless sensor networks; ALGORITHM; TYPE-2;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes. The trust-based security mechanism is usually adopted to solve this problem in WSNs. However, the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes. Moreover, how to efficiently collect behavioral evidences are rarely discussed. To address these issues, in this paper, we present a trust management mechanism based on fuzzy logic and a cloud model. First, a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty. Then, the cloud model is introduced to estimate the trust values for sensor nodes. Finally, a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance. Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
引用
收藏
页码:177 / 189
页数:13
相关论文
共 50 条
  • [21] Light trust management for routing in wireless sensor networks
    Une gestion économe de la confiance pour le routage dans des réseaux de capteurs sans fil
    Vercouter, L. (laurent.vercouter@insa-rouen.fr), 1600, Lavoisier (26): : 548 - 568
  • [22] A Semantic Trust Management Model for Wireless Sensor Networks
    Gangwani, Pranav
    Perez-Pons, Alexander
    Upadhyay, Himanshu
    IEEE SENSORS JOURNAL, 2025, 25 (02) : 3672 - 3681
  • [23] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    N. Karthik
    V. S. Ananthanarayana
    Wireless Personal Communications, 2017, 97 : 5137 - 5170
  • [24] A Hybrid Trust Management Scheme for Wireless Sensor Networks
    Karthik, N.
    Ananthanarayana, V. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (04) : 5137 - 5170
  • [25] Dynamic Update Mechanism in Wireless Sensor Networks
    Pan, Wumin
    MECHANICAL ENGINEERING AND INSTRUMENTATION, 2014, 526 : 267 - 272
  • [26] Research on Trust Sensing Based Secure Routing Mechanism for Wireless Sensor Networks
    Qin, Danyang
    Jia, Shuang
    Ma, Jingya
    Zhang, Yan
    Ding, Qun
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2018, 423 : 329 - 339
  • [27] Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks
    Talbi, Said
    Koudil, Mouloud
    Bouabadallah, Abdelmadjid
    Benatchba, Krima
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [28] Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor
    Song, Jiaojiao
    Li, Xiaohong
    Hu, Jing
    Xu, Guangquan
    Feng, Zhiyong
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 33 - 40
  • [29] An Efficient and Scalable Key Management Mechanism for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    Kim, Daehee
    An, Sunshin
    2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015,
  • [30] An Efficient and Scalable Key Management Mechanism for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    Kim, Daehee
    An, Sunshin
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 687 - 692