L-RTAM: Logarithm based reliable trust assessment model for WBSNs

被引:21
作者
Kumar, Anand [1 ]
Singh, Karan [1 ]
Khan, Tayyab [1 ]
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi 110067, India
关键词
Trust; Wireless body sensor network; Trust estimation; Security; Internal attacks; ENERGY-EFFICIENT; WIRELESS; MANAGEMENT; SCHEME; SECURE; HEALTH;
D O I
10.1080/09720529.2021.1880145
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In has been considered that the sensor network's safety measures have been built upon a non-realistic, trusted environment. After analyzing the trust models for wireless body sensor networks (WBSNs), it has been found that trust models should be distributed, lightweight, and robust against various vulnerabilities. They are also facing issues regarding computation overhead. Moreover, there is a threat of internal attacks over WBSNs. These attacks may be an on-off attack, data modification, message disclosure, collusion attack, bad-mouthing, brute force, and denial of service attack. Thus, this research paper considers three issues: network internal security, resource management, and spiteful node detection. The Proposed dynamic and trustworthy lightweight trust assessment scheme (RTAM) for WBSNs would play a significant role in the appropriate usage of resources and minimize the computational overhead. RTAM is a scalable trust model that incorporates logarithm based direct trust, indirect trust, and success ratio based data trust. It would be safe from a different type of attacks. To check the malicious activities that have been performed in nodes, some malicious nodes from the total nodes have been managed by the proposed network.
引用
收藏
页码:1701 / 1716
页数:16
相关论文
共 34 条
[1]  
Ali SS, 2017, J STAT MANAG SYST, V20, P543, DOI 10.1080/09720510.2017.1395174
[2]   Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks [J].
Anguraj, Dinesh Kumar ;
Smys, S. .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) :1-20
[3]   Lightweight Security Scheme for Internet of Things [J].
Aziz, Ahmed ;
Singh, Karan .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (02) :577-593
[4]   Using deep learning to improve recommendation with direct and indirect social trust [J].
Bathla, Gourav ;
Aggarwal, Himanshu ;
Rani, Rinkle .
JOURNAL OF STATISTICS AND MANAGEMENT SYSTEMS, 2019, 22 (04) :665-677
[5]   Trust and Thermal Aware Routing Protocol (TTRP) for Wireless Body Area Networks [J].
Bhangwar, Ali Raza ;
Kumar, Pardeep ;
Ahmed, Adnan ;
Channa, Muhammad Ibrahim .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) :349-364
[6]  
Chitra A., 2018, Proceedings of First International Conference on Smart System, Innovations and Computing. SSIC 2017. Smart Innovation, Systems and Technologies (SIST 79), P469, DOI 10.1007/978-981-10-5828-8_44
[7]  
Crosby G. V., 2006, DSSNS 2006. Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
[8]  
Fenye Bao, 2012, IEEE Transactions on Network and Service Management, V9, P169, DOI 10.1109/TCOMM.2012.031912.110179
[9]  
FenyeBao Ing-RayChen., 2012, IEEE TRANS NETW SERV, V9
[10]   A survey on the trust and security models of mobile agent platforms [J].
Fragkakis, Michail ;
Alexandris, Nikolaos ;
Georgiakodis, Fotis .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (01) :31-47