Malicious Node Detection in Wireless Weak-Link Sensor Networks Using Dynamic Trust Management

被引:4
作者
Wang, Chenlong [1 ]
Liu, Guanghua [1 ]
Jiang, Tao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Res Ctr 6G Mobile Commun, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Trust management; Wireless sensor networks; Adaptation models; Peer-to-peer computing; Wireless communication; Fuzzy sets; Fuzzy control; Malicious node detection; wireless weak-link sensor networks (WWSNs); trust management; dynamic; ROUTING PROTOCOL; DATA-COLLECTION;
D O I
10.1109/TMC.2024.3418826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of Wireless Sensor Networks (WSNs) in extreme environments is becoming increasingly widespread. Within these extreme environments, communication links between WSN nodes become more fragile. We refer to such WSNs as Wireless Weak-link Sensor Networks (WWSNs). The characteristics of WWSNs make them more vulnerable to internal attacks. During the data transmission process from source nodes to destination nodes, intermediary nodes could act as malicious entities capable of intercepting or manipulating data. Therefore, detecting malicious nodes is of utmost importance. This paper proposes a malicious node detection strategy based on dynamic trust management to address these challenges. The dynamic trust management algorithm integrates type-2 fuzzy logic and considers various trust factors to comprehensively evaluate node trust within WWSNs. Additionally, a dynamic trust value updating mechanism is proposed to accommodate the dynamic environmental changes inherent to WWSNs. Experimental results emphasize the effectiveness of the proposed approach in dynamically adapting to the network environment while achieving a high level of performance in detecting malicious nodes.
引用
收藏
页码:12866 / 12877
页数:12
相关论文
共 35 条
[1]   Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks [J].
Alhussain, Alanoud ;
Kurdi, Heba ;
Altoaimy, Lina .
SENSORS, 2021, 21 (13)
[2]  
Boano C. A., 2010, P INT C COMP COMM NE, P1
[3]  
Castillo O, 2007, GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, P145
[4]   Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges [J].
Chaudhary, Monika ;
Goyal, Nitin ;
Benslimane, Abderrahim ;
Awasthi, Lalit Kumar ;
Alwadain, Ayed ;
Singh, Aman .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) :3500-3524
[5]   LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things [J].
Din, Ikram Ud ;
Bano, Aniqa ;
Awan, Kamran Ahmad ;
Almogren, Ahmad ;
Altameem, Ayman ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) :2776-2783
[6]   A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA [J].
Guo, Yongan ;
Tang, Xinyu ;
Sun, Hongbo .
2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, :860-865
[7]   Underwater Networked Wireless Sensor Data Collection for Computational Intelligence Techniques: Issues, Challenges, and Approaches [J].
Gupta, Osho ;
Goyal, Nitin ;
Anand, Divya ;
Kadry, Seifedine ;
Nam, Yunyoung ;
Singh, Aman .
IEEE ACCESS, 2020, 8 :122959-122974
[8]   A Trust Update Mechanism Based on Reinforcement Learning in Underwater Acoustic Sensor Networks [J].
He, Yu ;
Han, Guangjie ;
Jiang, Jinfang ;
Wang, Hao ;
Martinez-Garcia, Miguel .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (03) :811-821
[9]   A secure routing protocol with regional partitioned clustering and Beta trust management in smart home [J].
Hong, Zhen ;
Shao, Qian ;
Liao, Xiaojing ;
Beyah, Raheem .
WIRELESS NETWORKS, 2019, 25 (07) :3805-3823
[10]   A Dynamic Trust Evaluation and Update Mechanism Based on C4.5 Decision Tree in Underwater Wireless Sensor Networks [J].
Jiang, Jinfang ;
Zhu, Xinyu ;
Han, Guangjie ;
Guizani, Mohsen ;
Shu, Lei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :9031-9040