A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks

被引:0
|
作者
Fu, Shiming [1 ]
Zhang, Ping [2 ]
Shi, Xuehong [2 ]
机构
[1] Chongqing Univ Educ, Sch Artificial Intelligence, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
关键词
Wireless sensor networks; Monitoring; Cloud computing; Security; Wireless communication; Distributed databases; Communication system security; behavior monitoring; cloud; fuzzy; trust; wireless sensor networks; ALGORITHM; TYPE-2;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes. The trust-based security mechanism is usually adopted to solve this problem in WSNs. However, the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes. Moreover, how to efficiently collect behavioral evidences are rarely discussed. To address these issues, in this paper, we present a trust management mechanism based on fuzzy logic and a cloud model. First, a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty. Then, the cloud model is introduced to estimate the trust values for sensor nodes. Finally, a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance. Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
引用
收藏
页码:177 / 189
页数:13
相关论文
共 50 条
  • [41] Trust and Location-Aware Routing Protocol for Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    IETE JOURNAL OF RESEARCH, 2016, 62 (05) : 634 - 644
  • [42] A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks
    Basan, Alexander
    Basan, Elena
    Makarevich, Oleg
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 369 - 372
  • [43] A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
    Labraoui, Nabila
    Gueroui, Mourad
    Sekhri, Larbi
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 1037 - 1055
  • [44] Trust-Aware In-Network Aggregation for Wireless Sensor Networks
    Deng, Hongmei
    Jin, Guang
    Sun, Kun
    Xu, Roger
    Lyell, Margaret
    Luke, Jahn A.
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5888 - 5895
  • [45] Trust security mechanism for maritime wireless sensor networks
    Walid, Elgenaidi
    Thomas, Newe
    Eoin, O'Connell
    Gerard, Dooly
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [46] Secure Data Aggregation Algorithm Based on Trust in Wireless Sensor Networks
    Guo, Rui
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 809 - 813
  • [47] Monitoring Connectivity in Wireless Sensor Networks
    Khelifa, Benahmed
    Haffaf, H.
    Madjid, Merabti
    Llewellyn-Jones, David
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2009, 2 (02): : 1 - 10
  • [48] A Fuzzy Trust Evaluation of Cloud Collaboration Outlier Detection in Wireless Sensor Networks
    Sabitha, R.
    Shukla, Anand Prakash
    Mehbodniya, Abolfazl
    Shakkeera, L.
    Reddy, Punduru Chandra Shaker
    AD HOC & SENSOR WIRELESS NETWORKS, 2022, 53 (3-4) : 165 - 188
  • [49] Comparative Evaluation of Trust Mechanisms for Wireless Sensor Networks
    Vasilache, Razvan-Andrei
    Gavrila, Ioan-Claudiu
    Grigorescu, Alin-Ciprian
    Gheorghe, Laura
    2013 ROEDUNET INTERNATIONAL CONFERENCE (ROEDUNET): NETWORKING IN EDUCATION, 11TH EDITION, 2013,
  • [50] A novel stereoscopic security architecture with Trust Management for wireless sensor networks
    Ma, Bin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 797 - 800