A Robust Trust Model for Wireless Sensor Networks

被引:0
作者
Gautam, Amit Kumar [1 ]
Kumar, Rakesh [1 ]
机构
[1] Madan Mohan Malaviya Univ Technol, Comp Sci & Engn, Gorakhpur, Uttar Pradesh, India
来源
2018 5TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (UPCON) | 2018年
关键词
WSNs; trust management; direct trust; indirect trust; time decay function; MANAGEMENT;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Wireless Sensor Networks (WSNs) are vulnerable to various security attacks due to its broadcast nature. Trust management is one of the effective methods to defend against threats posed to WSN. The trust management system helps to mitigate many insider attacks and malicious behaviour of nodes. In this paper, we proposed a robust trust model that prevents various attacks viz; bad mouthing, self-promoting and collusion attacks. It uses the time lapses function based on forgetting curve to calculate direct trust and reputation function for indirect trust. Our proposed trust model is scalable. When the trust value is above the threshold value, then we consider a communication link as active and node is trusted, otherwise we remove the communication link and mark the node as malicious. The simulation results indicate the effectiveness of proposed method and maximizes the defence against the internal attacks.
引用
收藏
页码:777 / 781
页数:5
相关论文
共 50 条
  • [31] Design Guidelines on Trust Management for Underwater Wireless Sensor Networks
    Zhu, Rongxin
    Boukerche, Azzedine
    Long, Libo
    Yang, Qiuling
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2547 - 2576
  • [32] Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks
    Zia, Tanveer A.
    Islam, Md Zahidul
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 347 - 352
  • [33] Comparative study of trust and reputation systems for wireless sensor networks
    Khalid, Osman
    Khan, Samee U.
    Madani, Sajjad A.
    Hayat, Khizar
    Khan, Majid I.
    Min-Allah, Nasro
    Kolodziej, Joanna
    Wang, Lizhe
    Zeadally, Sherali
    Chen, Dan
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (06) : 669 - 688
  • [34] Secure and Trust-Aware Routing in Wireless Sensor Networks
    Konstantopoulos, Charalampos
    Mamalis, Basilis
    Pantziou, Grammati
    22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, : 312 - 317
  • [35] Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    Yu, Yanli
    Li, Keqiu
    Zhou, Wanlei
    Li, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 867 - 880
  • [36] Ensuring Data Integrity through Trust in Wireless Sensor Networks
    Deng, Hongmei
    Jin, Guang
    Xu, Roger
    Shi, Weisong
    Harlow, Felicia
    WIRELESS SENSING, LOCALIZATION, AND PROCESSING V, 2010, 7706
  • [37] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [38] Towards Robust Data Storage in Wireless Sensor Networks
    Siegmund, Norbert
    Rosenmueller, Marko
    Moritz, Guido
    Saake, Gunter
    Timmermann, Dirk
    IETE TECHNICAL REVIEW, 2009, 26 (05) : 335 - 340
  • [39] A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
    Ren, Yi
    Zadorozhny, Vladimir I.
    Oleshchuk, Vladimir A.
    Li, Frank Y.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1409 - 1423
  • [40] Trust Management in Cloud-Integrated Wireless Sensor Networks
    Savas, Onur
    Jin, Guang
    Deng, Julia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2013, : 334 - 341