Detecting compromised sensor node with subjective logic in wireless sensor network

被引:0
作者
Zhou, Hongwei [1 ]
Yuan, Jinhui [1 ]
Zhang, Laishun [1 ]
Xiao, Rui [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
来源
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS | 2016年 / 71卷
基金
中国国家自然科学基金;
关键词
Sensor network; subjective logic; anomaly detection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To detect anomaly sensing data, in some existing methods, a sensor node first checks its sensing data. Only the node finds its data may be anomalous, it turns to other nodes for further detection. This reduces the energy consume, but it introduces the risk of cheat. Since sensor nodes are often physically captured, a compromised sensor node is able to stop checking its data. To cover it, in this paper, we propose the method that every neighbor node checks directly the node's sensing data and sink node fuses all neighbor node's detection to obtain the final conclusion. More importantly, neighbor node's detection is quantified as subjective logic opinion, and these opinions are fused with fusing operator of subjective logic. When only few nodes are compromised, our solution is capable of exposing compromised node.
引用
收藏
页码:719 / 724
页数:6
相关论文
共 10 条
[1]  
Cruller D., 2004, OVERVIEW SENSOR NETW
[2]  
DING M, 2007, EURASIP J WIREL COMM, V2007, P1
[3]  
Josang A., 2007, P 13 AUSTRALASIAN S, P101
[4]  
Josang A, 2006, LECT NOTES COMPUT SC, V3986, P179
[5]  
Kahn JM, 1999, P 5 ANN ACM IEEE INT
[6]  
Krasniewski M., 2005, P INT C DEP SYST NET
[7]  
Krishnamachari B., 2004, IEEE T COMPUTERS
[8]   A Lightweight Collaborative Fault Tolerant Target Localization System for Wireless Sensor Networks [J].
Merhi, Zaher M. ;
Elgamel, Mohamed A. ;
Bayoumi, Magdy A. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (12) :1690-1704
[9]   A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks [J].
Sun, Yan ;
Luo, Hong ;
Das, Sajal K. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) :785-797
[10]  
Yuan J., 2012, INT J DISTRIBUTED SE, V2012