BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks

被引:65
作者
Anwar, Raja Waseem [1 ]
Zainal, Anazida [1 ]
Outay, Fatma [2 ]
Yasar, Ansar [3 ]
Iqbal, Saleem [4 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Skudai 81310, Johor Bahru, Malaysia
[2] Zayed Univ, Coll Technol Innovat CIT, Dubai, U Arab Emirates
[3] Hasselt Univ, UHasselt, Transportat Res Inst IMOB, B-3590 Diepenbeek, Belgium
[4] PMAS Univ, Univ Inst Informat Technol, Rawalpindi, Pakistan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 96卷
关键词
Wireless Sensor Networks; Malicious nodes; Trust; Security; Bayesian estimation; SECURITY; PERFORMANCE; FRAMEWORK; ALGORITHM; PROTOCOL;
D O I
10.1016/j.future.2019.02.004
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the emergence of WSNs in the recent times, providing trustworthy and reliable data delivery is challenging task due to unique characteristics and constraints of nodes. Malicious node can easily disrupt the integrity of network through the inclusion of false and malicious data and initiate internal attacks. Detection of malicious nodes using trust-based security is an effective and lightweight countermeasure as compared to key based security schemes which incurs higher overhead costs. The WSNs will play greater role in the next-generation loT systems and a compromised node can jeopardize the availability and authenticity of sensory layer. In this paper, an efficient Belief based trust evaluation mechanism (BTEM) is proposed which isolates the malicious node from trust-worthy nodes and defend against Bad-mouth, On-Off and Denial of Service (DoS) attacks. Bayesian estimation approach is used in gathering direct and In-direct trust values of the sensor nodes which further considers the correlation of the data collected over the time and then estimate imprecise knowledge in decision making for secure delivery of data thus avoiding the malicious nodes. Compared with existing approaches, the proposed BTEM performs better in the detection of malicious node (MN), with lesser delay and improved network throughput. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:605 / 616
页数:12
相关论文
共 37 条
  • [1] AlFarraj O., 2018, J AMB INTEL HUM COMP, P1, DOI [10.1007/s12652-018-0885-1, DOI 10.1007/S12652-018-0885-1]
  • [2] [Anonymous], THESIS
  • [3] [Anonymous], P 2006 WORKSH OP ASS
  • [4] [Anonymous], 2010, ARXIV10100168
  • [5] Chakrabarti A, 2012, ADV COMPUTER SCI INF, P159
  • [6] Cloud computing adoption framework: A security framework for business clouds
    Chang, Victor
    Kuo, Yen -Hung
    Ramachandran, Muthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 : 24 - 41
  • [7] Energy, Traffic Load, and Link Quality Aware Ad Hoc Routing Protocol for Wireless Sensor Network Based Smart Metering Infrastructure
    Farooq, Hasan
    Jung, Low Tang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [8] Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks
    Feng, Renjian
    Che, Shenyun
    Wang, Xiao
    Yu, Ning
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [9] A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
    Feng, Renjian
    Xu, Xiaofeng
    Zhou, Xiang
    Wan, Jiangwen
    [J]. SENSORS, 2011, 11 (02) : 1345 - 1360
  • [10] Reputation-based framework for high integrity sensor networks
    Ganeriwal, Saurabh
    Balzano, Laura K.
    Srivastava, Mani B.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)