A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks

被引:20
作者
Khedim, Farah [1 ]
Labraoui, Nabila [1 ]
Ari, Ado Adamou Abba [2 ,3 ]
机构
[1] Univ Tlemcen, STIC, Tilimsen, Algeria
[2] Univ Maroua, LaRI, Maroua, Cameroon
[3] Univ Versailles St Quentin En Yvelines, Univ Paris Saclay, LI PaRAD, Versailles, France
关键词
Trust and reputation systems; Security; WSN; Bad mouthing; Ballot stuffing; Cloud model; ABC; AD HOC; FORAGING BEHAVIOR; TRUST MANAGEMENT; ALGORITHM; OPTIMIZATION; SECURITY; SCHEME;
D O I
10.1016/j.jnca.2018.09.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) face many security issues. When external attacks can be prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be eliminated. Trust and reputation have been recently suggested by many researches as a powerful tool for guaranteeing an effective security mechanism. They enable the detection and the isolation of both faulty and malicious nodes. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies especially in the case of dishonest recommendations attacks, i.e. badmouthing, ballot-stuffing and collusion attacks. In this paper, we propose a novel bio inspired trust model for WSNs namely Bee-Trust Scheme (BTS) based on the use of both a modified cloud model and a cognitive chronometry parameter. The objective of the scheme is to achieve both a higher detection rate and a lower false positive rate of dishonest recommendations attacks by allowing the distinction between erroneous recommendations and dishonest ones which has thus far been overlooked by most research work. Simulation results demonstrate that the proposed scheme is both effective and lightweight even when the number of dishonest recommenders is large.
引用
收藏
页码:42 / 56
页数:15
相关论文
共 56 条
  • [21] Buchegger S., 2004, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, P1
  • [22] Agent-based trust model in Wireless Sensor Networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 119 - +
  • [23] Dealing with dishonest recommendation: The trials in reputation management court
    Chen, Shenlong
    Zhang, Yuqing
    Liu, Qixu
    Feng, Jingyu
    [J]. AD HOC NETWORKS, 2012, 10 (08) : 1603 - 1618
  • [24] Crane E., 1980, A Book of Honey
  • [25] Deterministic secure positioning in wireless sensor networks
    Delaet, Sylvie
    Mandal, Partha Sarathi
    Rokicki, Mariusz A.
    Tixeuil, Sebastien
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (35) : 4471 - 4481
  • [26] Dellarocas C., 2000, EC'00. Proceedings of the 2nd ACM Conference on Electronic Commerce, P150, DOI 10.1145/352871.352889
  • [27] BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks
    Fang, Weidong
    Zhang, Chuanlei
    Shi, Zhidong
    Zhao, Qing
    Shan, Lianhai
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 88 - 94
  • [28] A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks
    Feng, Renjian
    Han, Xiaona
    Liu, Qiang
    Yu, Ning
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [29] A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
    Feng, Renjian
    Xu, Xiaofeng
    Zhou, Xiang
    Wan, Jiangwen
    [J]. SENSORS, 2011, 11 (02) : 1345 - 1360
  • [30] Fox C.W., 2001, Evolutionary ecology : concepts and case studies