A Fuzzy Trust Evaluation of Cloud Collaboration Outlier Detection in Wireless Sensor Networks

被引:7
|
作者
Sabitha, R. [1 ]
Shukla, Anand Prakash [2 ]
Mehbodniya, Abolfazl [3 ]
Shakkeera, L. [4 ]
Reddy, Punduru Chandra Shaker [5 ]
机构
[1] Hindustan Coll Engn & Technol, Dept Elect & Commun Engn, Coimbatore 641050, Tamil Nadu, India
[2] KIET Grp Inst, Dept Comp Sci, Ghaziabad 201206, Delhi, India
[3] Kuwait Coll Sci & Technol KCST, Dept Elect & Commun Engn, Doha Area,7th Ring Rd, Doha, Kuwait
[4] VIT Bhopal Univ, Sch Comp Sci & Engn, Bhopal 466114, Madhya Pradesh, India
[5] CMR Coll Engn & Technol, Dept Comp Sci & Engn, Hyderabad, TS, India
关键词
WSN; cloud; fuzzy; trust evaluation; outlier detection; ROUTING ALGORITHM; ENERGY-AWARE; SECURE; PROTOCOL; INTERNET; SCHEME; MODEL;
D O I
10.32908/ahswn.v53.8447
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the primary challenges in Wireless Sensor Networks (WSNs) is security. This research proposes an efficient fuzzy trust evaluation of cloud collaboration outlier detection (FTCO) in WSNs to ensure security in clustered WSNs. In the beginning, an interval type-2 fuzzy logic con-troller is used for trusts estimation in an open wireless medium to deal with transmission uncertainty. Then, to prevent fraudulent nodes from becoming cluster heads (CHs), an outlier detection based on density approach is employed to obtain an adaptive trust threshold. Furthermore, a fuzzy-based CHs election mechanism is proposed to strike a balance among security assurance and energy conservation, with a normal sensor node with greater residual energy or lower trust in various nodes having a higher possibility of being the CH. Experimental tests show that our fuzzy-based clustering technique can highly defend the network against assaults from hostile or the compromised nodes within the network and the network lifetime is found to be 40 % higher than other systems.
引用
收藏
页码:165 / 188
页数:24
相关论文
共 50 条
  • [21] Statistics-based outlier detection for wireless sensor networks
    Zhang, Y.
    Hamm, N. A. S.
    Meratnia, N.
    Stein, A.
    van de Voort, M.
    Havinga, P. J. M.
    INTERNATIONAL JOURNAL OF GEOGRAPHICAL INFORMATION SCIENCE, 2012, 26 (08) : 1373 - 1392
  • [22] A Systematic Literature Review on Outlier Detection in Wireless Sensor Networks
    Safaei, Mahmood
    Asadi, Shahla
    Driss, Maha
    Boulila, Wadii
    Alsaeedi, Abdullah
    Chizari, Hassan
    Abdullah, Rusli
    Safaei, Mitra
    SYMMETRY-BASEL, 2020, 12 (03):
  • [23] Fast and Efficient Outlier Detection Method in Wireless Sensor Networks
    Ghorbel, Oussama
    Ayedi, Walid
    Snoussi, Hichem
    Abid, Mohamed
    IEEE SENSORS JOURNAL, 2015, 15 (06) : 3403 - 3411
  • [24] An Overview of Outlier Detection Technique developed for Wireless Sensor Networks
    Ghorbel, Oussama
    Jmal, Mohamed Wassim
    Ayedi, Walid
    Snoussi, Hichem
    Abid, Mohamed
    2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,
  • [25] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks
    Yin, Xueqiang
    Li, Shining
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [26] A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks
    Fu, Shiming
    Zhang, Ping
    Shi, Xuehong
    CHINA COMMUNICATIONS, 2024, 21 (05) : 177 - 189
  • [27] Sensor Cloud: Integrating Wireless Sensor Networks with Cloud Computing
    Dwivedi, Rajendra Kumar
    Kumar, Rakesh
    2018 5TH IEEE UTTAR PRADESH SECTION INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (UPCON), 2018, : 820 - 825
  • [28] A Data-Centric Trust Evaluation Mechanism in Wireless Sensor Networks
    Li, Mingming
    Hu, Jianbin
    Du, Jiang
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 466 - 470
  • [29] Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system
    Zhang, Guangxue
    Wang, Tian
    Wang, Guojun
    Liu, Anfeng
    Jia, Weijia
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (07)
  • [30] Outlier Detection in Wireless Sensor Networks Based on OPTICS Method for Events and Errors Identification
    Aymen Abid
    Atef Masmoudi
    Abdennaceur Kachouri
    Adel Mahfoudhi
    Wireless Personal Communications, 2017, 97 : 1503 - 1515