Trust Model Based on D-S Evidence Theory in Wireless Sensor Networks

被引:0
作者
Yang, Kai [1 ]
Liu, Shuguang [1 ]
Shen, Junwei [1 ]
机构
[1] Engn Univ CAPF, Dept Elect Technol, Xian, Shaanxi, Peoples R China
来源
ADVANCES IN WIRELESS SENSOR NETWORKS | 2015年 / 501卷
关键词
Trust model; Dempster-Shafer evidence theory; Evidence variance; Trust evaluation; AD-HOC;
D O I
10.1007/978-3-662-46981-1_28
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The existing trust model cannot solve malicious nodes in wireless sensor networks quickly and effectively, and counter-intuitive results may appear when combining evidence, so a trust model based on improved D-S evidence theory is proposed. According to Jousselme's distance, this trust model defines evidence variance to modify the evidence before combination, and then combines these evidences according to Dempster combination rule. Simulation results show that this model can find and isolate malicious nodes quickly and accurately, suppress nodes collusion and improve network performance. Compared with other existing trust models, this model has more security, robustness and accuracy.
引用
收藏
页码:293 / 301
页数:9
相关论文
共 13 条
  • [1] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427
  • [2] Buchegger Buchegger S. S., 2002, Proceedings of ACM International Symposium on Mobile Ad Hoc Net-working and Computing (MobiHoc), P226
  • [3] Agent-based trust model in Wireless Sensor Networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 119 - +
  • [4] Providing trust in wireless sensor networks using a bio-inspired technique
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    [J]. TELECOMMUNICATION SYSTEMS, 2011, 46 (02) : 163 - 180
  • [5] Han D., 2011, ACTA ELECT SINICA, V39, P153
  • [6] SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    He, Q
    Wu, DP
    Khosla, P
    [J]. 2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 825 - 830
  • [7] Joussleme A.-L., 2001, Information Fusion, V2, P91, DOI 10.1016/S1566-2535(01)00026-4
  • [8] PERKINS C, 2003, 3591 IETF RFC
  • [9] Shafer G., 1976, MATH THEORY EVIDENCE, V42, DOI DOI 10.1080/00401706.1978.10489628
  • [10] Srinivasan A, 2006, DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, P277