A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network

被引:34
作者
Pang, Baohe [1 ]
Teng, Zhijun [2 ]
Sun, Huiyang [3 ]
Du, Chunqiu [1 ]
Li, Meng [1 ]
Zhu, Weihua [4 ]
机构
[1] Northeast Elect Power Univ, Sch Elect Engn, Jilin 132000, Jilin, Peoples R China
[2] Northeast Elect Power Univ, Key Lab Modern Power Syst Simulat & Control & Ren, Minist Educ, Jilin 132000, Jilin, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Cryptog Sci & Technol, Beijing 100000, Peoples R China
[4] Jilin Technol Coll Elect Informat, Sch Informat Technol, Jilin 132000, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Indexes; Bayes methods; Artificial intelligence; Time series analysis; Stochastic processes; Simulation; Wireless sensor network; dishonest recommendation attacks; fuzzy trust; ABC algorithm;
D O I
10.1109/LWC.2021.3070630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several threats, one of which is dishonest recommendation attacks providing false trust values that favor the attacker. In this letter, a malicious node detection strategy is proposed based on a fuzzy trust model and artificial bee colony algorithm (ABC) (FTM-ABC). The fuzzy trust model (FTM) is introduced to calculate the indirect trust, and the ABC algorithm is applied to optimize the trust model for detecting dishonest recommendation attacks. Besides, fitness function includes recommended deviation and interaction index deviation to enhance the effectiveness. Simulation results reveal the improved FTM-ABC maintains a high recognition rate and a low false-positive rate, even if the number of dishonest nodes reaches 50%.
引用
收藏
页码:1613 / 1617
页数:5
相关论文
共 10 条
[1]   BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks [J].
Anwar, Raja Waseem ;
Zainal, Anazida ;
Outay, Fatma ;
Yasar, Ansar ;
Iqbal, Saleem .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :605-616
[2]   Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures [J].
Butun, Ismail ;
Osterberg, Patrik ;
Song, Houbing .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :616-644
[3]   Trust-based secure clustering in WSN-based intelligent transportation systems [J].
Gaber, Tarek ;
Abdelwahab, Sarah ;
Elhoseny, Mohamed ;
Hassanien, Aboul Ella .
COMPUTER NETWORKS, 2018, 146 :151-158
[4]   A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm [J].
Karaboga, Dervis ;
Basturk, Bahriye .
JOURNAL OF GLOBAL OPTIMIZATION, 2007, 39 (03) :459-471
[5]   A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks [J].
Khedim, Farah ;
Labraoui, Nabila ;
Ari, Ado Adamou Abba .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 :42-56
[6]   Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism [J].
Rizwan, Ramsha ;
Khan, Farrukh Aslam ;
Abbas, Haider ;
Chauhdary, Sajjad Hussain .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
[7]   Approximation Theory for Connectivity of Ad Hoc Wireless Networks With Node Faults [J].
Takabe, Satoshi ;
Wadayama, Tadashi .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (04) :1240-1243
[8]   基于时序信息分析的WSN贝叶斯信誉评价模型 [J].
滕志军 ;
郭力文 ;
吕金玲 ;
侯艳权 .
郑州大学学报(工学版), 2019, (01) :38-43
[9]  
Yang J., 2017, J SYST ENG, V39, P2571
[10]  
[姚雷 Yao Lei], 2014, [仪器仪表学报, Chinese Journal of Scientific Instrument], V35, P1606