A hybrid malicious node detection approach based on fuzzy trust model and Bayesian belief in wireless sensor networks

被引:0
作者
Shi W. [1 ]
机构
[1] Centre of Modern Educational Technology, Xi’an Aeronautical Polytechnic Institute, Shaanxi, Xi’an
关键词
Bayesian belief; dishonest recommendation attacks; fuzzy trust model; wireless sensor network; WSN;
D O I
10.1504/IJWMC.2024.139665
中图分类号
学科分类号
摘要
With the wide range of Wireless Sensor Network (WSN) applications including environmental monitoring and healthcare, the sensor nodes in WSN are susceptible to security threats including dishonest recommendation attacks from malicious nodes, which could disrupt communication’s integrity. Thus, malicious node detection in WSN is essential. In recent years, several malicious node detection approaches based on trust management were proposed to protect the WSN against dishonest recommendation attacks. However, the existing approaches ignore data consistency and re-evaluation of participating nodes in trust evaluation, which seriously undermine their effectiveness. To address these limitations, we propose a hybrid malicious node detection technique for WSN based on the Fuzzy Trust Model (FTM) algorithm and the Bayesian Belief Estimation (BBE) approach. The key idea in the proposed approach is to determine direct trust values through the FTM algorithm using the correlation of data collected over time, and to ascertain the trustworthiness of indirect trust values from recommendation nodes via the BBE approach. The results of simulations conducted to evaluate the effectiveness of our approach show that our model can effectively detect malicious nodes in WSN better than the previous approaches. Copyright © 2024 Inderscience Enterprises Ltd.
引用
收藏
页码:56 / 63
页数:7
相关论文
共 23 条
[1]  
Anwar R.W., Zainal A., Outay F., Yasar A., Iqbal S., Belief based trust evaluation mechanism for wireless sensor networks, Future Generation Computer Systems, 96, pp. 605-616, (2019)
[2]  
Desai S.S., Nene M.J., Mite: Memory integrity based trust evaluation in wireless sensor networks, International Conference on Communication Networks (ICCN), pp. 202-208, (2015)
[3]  
Desai S.S., Nene M.J., Node-level trust evaluation in wireless sensor networks, IEEE Transactions on Information Forensics and Security, 14, 8, pp. 2139-2152, (2019)
[4]  
Feng R, Xu X., Zhou X., Wan J, A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory, Sensors, 11, 2, pp. 1345-1360, (2011)
[5]  
Gautam A.K., Kumar R., A robust trust model for wireless sensor networks, Proceedings of the 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), pp. 1-5, (2018)
[6]  
Ishmanov F., Kim S.W., Nam S.Y., A robust trust establishment scheme for wireless sensor networks, Sensors, 15, 3, pp. 7040-7061, (2015)
[7]  
Khan T., Singh K., Son L.H., Abdel-Basset M., Long H.V., Singh S.P., Manjul M., A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks, IEEE Access, 7, pp. 58221-58240, (2019)
[8]  
Kim T-H., Goyat R., Rai M.K., Kumar G., Buchanan W.J., Saha R., Thomas R., A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks, IEEE Access, 7, pp. 184133-184144, (2019)
[9]  
Labraoui N., Gueroui M., Sekhri L., A risk-aware reputation-based trust management in wireless sensor networks, Wireless Personal Communications, 87, 3, pp. 1037-1055, (2016)
[10]  
Li F., Guo Z., Zhang C., Li W., Wang Y., ATM: an active-detection trust mechanism for vanets based on blockchain, IEEE Transactions on Vehicular Technology, 70, 5, pp. 4011-4021, (2021)