A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks

被引:20
作者
Khedim, Farah [1 ]
Labraoui, Nabila [1 ]
Ari, Ado Adamou Abba [2 ,3 ]
机构
[1] Univ Tlemcen, STIC, Tilimsen, Algeria
[2] Univ Maroua, LaRI, Maroua, Cameroon
[3] Univ Versailles St Quentin En Yvelines, Univ Paris Saclay, LI PaRAD, Versailles, France
关键词
Trust and reputation systems; Security; WSN; Bad mouthing; Ballot stuffing; Cloud model; ABC; AD HOC; FORAGING BEHAVIOR; TRUST MANAGEMENT; ALGORITHM; OPTIMIZATION; SECURITY; SCHEME;
D O I
10.1016/j.jnca.2018.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) face many security issues. When external attacks can be prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be eliminated. Trust and reputation have been recently suggested by many researches as a powerful tool for guaranteeing an effective security mechanism. They enable the detection and the isolation of both faulty and malicious nodes. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies especially in the case of dishonest recommendations attacks, i.e. badmouthing, ballot-stuffing and collusion attacks. In this paper, we propose a novel bio inspired trust model for WSNs namely Bee-Trust Scheme (BTS) based on the use of both a modified cloud model and a cognitive chronometry parameter. The objective of the scheme is to achieve both a higher detection rate and a lower false positive rate of dishonest recommendations attacks by allowing the distinction between erroneous recommendations and dishonest ones which has thus far been overlooked by most research work. Simulation results demonstrate that the proposed scheme is both effective and lightweight even when the number of dishonest recommenders is large.
引用
收藏
页码:42 / 56
页数:15
相关论文
共 56 条
  • [1] Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks
    Abdou, Wahabou
    Henriet, Adrien
    Bloch, Christelle
    Dhoutaut, Dominique
    Charlet, Damien
    Spies, Francois
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (06) : 1794 - 1804
  • [2] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [3] Reducing power consumption of non-preemptive real-time systems
    Alrashed, Saleh
    [J]. JOURNAL OF SUPERCOMPUTING, 2017, 73 (12) : 5402 - 5413
  • [4] Alzaid H, 2013, IFIP Advances in Information and Communication Technology, DOI [10.1007/978-3-642-38323-6_5, DOI 10.1007/978-3-642-38323-6_5]
  • [5] [Anonymous], 2004, P 7 INT WORKSH TRUST
  • [6] [Anonymous], INT J SCI ENG RES
  • [7] [Anonymous], MAPPING BIOL SYSTEMS
  • [8] [Anonymous], J COMPUT RES DEV
  • [9] [Anonymous], 2001, P 15 INT PARALLEL DI
  • [10] [Anonymous], P 1 INT C WIR TECHN