Trust secure data aggregation in WSN-based IIoT with single mobile sink

被引:10
作者
Liu, Xiaowu [1 ]
Yu, Jiguo [2 ,3 ]
Yu, Kan [1 ]
Wang, Guijuan [2 ,3 ,4 ]
Feng, Xingjian [5 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276826, Peoples R China
[2] Qilu Univ Technol, Big Date Inst, Jinan 250353, Peoples R China
[3] Shandong Fundamental Res Ctr Comp Sci, Jinan 250353, Shandong, Peoples R China
[4] Qilu Univ Technol, Sch Comp & Technol, Jinan 250353, Shandong, Peoples R China
[5] Big Data Ctr Weifang City, Weifang 261000, Shandong, Peoples R China
关键词
Industrial Internet of Things; Secure data aggregation; Trust evaluation; WIRELESS SENSOR NETWORKS; ENERGY-EFFICIENT; MALICIOUS NODES; DATA FUSION; MECHANISM; FUZZY; CONSUMPTION; DESIGN; DELAY;
D O I
10.1016/j.adhoc.2022.102956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks (WSNs), as the fundamental infrastructure, are indispensable for the Industrial Internet of Things (IIoT). In particular, the security and effectiveness of WSNs in IIoT are universal and inevitable issues. In this paper, a WSN-based IIoT Model (WIM) is designed characterized by a single mobile sink. Based on WIM, a high robust aggregation tree algorithm and an outlier elimination scheme are proposed in a virtual grid network with the mobile sink, which can acquire data in a real-time and accurate manner. Moreover, a trust secure data aggregation mechanism is applied in WIM which takes both the direct trust and the indirect trust into consideration to perform the secure data aggregation without losing the effectiveness of network even if the sink moves randomly. The simulation results show that the proposed model and algorithms can promote the performances of WSNs in terms of accuracy, effectiveness and delay.
引用
收藏
页数:18
相关论文
共 61 条
[1]   Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks [J].
Alzaid, Hani ;
Foo, Ernest ;
Nieto, Juan Gonzalez ;
Ahmed, Ejaz .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) :125-144
[2]  
[Anonymous], 2015, INT J DISTRIB SENS N
[3]   Multirate Data Collection Using Mobile Sink in Wireless Sensor Networks [J].
Chang, Chih-Yung ;
Chen, Shi-Yong ;
Chang, I-Hsiung ;
Yu, Gwo-Jong ;
Roy, Diptendu Sinha .
IEEE SENSORS JOURNAL, 2020, 20 (14) :8173-8185
[4]   Path Optimization of Mobile Sink Node in Wireless Sensor Network Water Monitoring System [J].
Chao, Fan ;
He, Zhiqin ;
Pang, Aiping ;
Zhou, Hongbo ;
Ge, Junjie .
COMPLEXITY, 2019, 2019
[5]   PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks [J].
Chen, Honglong ;
Qin, Yuting ;
Lin, Kai ;
Luan, Yingxin ;
Wang, Zhibo ;
Yu, Jiguo ;
Li, Yanjun .
AD HOC NETWORKS, 2020, 107
[6]   A Delay-Aware Network Structure for Wireless Sensor Networks With In-Network Data Fusion [J].
Cheng, Chi-Tsun ;
Leung, Henry ;
Maupin, Patrick .
IEEE SENSORS JOURNAL, 2013, 13 (05) :1622-1631
[7]   TOWARD MASSIVE MACHINE TYPE CELLULAR COMM UNICATIONS [J].
Dawy, Zaher ;
Saad, Walid ;
Ghosh, Arunabha ;
Andrews, Jeffrey G. ;
Yaacoub, Elias .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (01) :120-128
[8]   Node-Level Trust Evaluation in Wireless Sensor Networks [J].
Desai, S. Sundeep ;
Nene, Manisha J. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2139-2152
[9]   Optimizing Sensor Network Coverage and Regional Connectivity in Industrial IoT Systems [J].
Dou, Runliang ;
Nan, Guofang .
IEEE SYSTEMS JOURNAL, 2017, 11 (03) :1351-1360
[10]   A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment [J].
Esfahani, Alireza ;
Mantas, Georgios ;
Matischek, Rainer ;
Saghezchi, Firooz B. ;
Rodriguez, Jonathan ;
Bicaku, Ani ;
Maksuti, Silia ;
Tauber, Markus G. ;
Schmittner, Christoph ;
Bastos, Joaquim .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) :288-296