Trust-Based Anomaly Detection in Emerging Sensor Networks

被引:4
作者
Wu, Renyong [1 ]
Deng, Xue [1 ]
Lu, Rongxing [2 ]
Shen, Xuemin [2 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2015年
关键词
D O I
10.1155/2015/363569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consist of a large number of small-size, energy-constrained nodes and generally are deployed to monitor surrounding situation or relay generated packets in other devices. However, due to the openness of wireless media and the inborn self-organization feature of WSNs, that is, frequent interoperations among neighbouring nodes, network security has been tightly related to data credibility and/or transmission reliability, thus trust evaluation of network nodes is becoming another interesting issue. Obviously, how to describe node's behaviors and how to integrate various characteristics to make the final decision are two major research aspects of trust model. In this paper, a new trust model is proposed to detect anomaly nodes based on fuzzy theory and revised evidence theory. By monitoring the behaviors of the evaluated nodes with multidimensional characteristics and integrating these pieces of information, the malicious nodes in a network can be identified and the normal operation of the whole network can be verified. In addition, to accelerate the detection process, a weighting judgment mechanism is adopted to deal with the uncertain states of evaluated nodes. Finally extensive simulations are conducted, and the results demonstrate that the proposed trust model can achieve higher detection ratio of malicious nodes in comparison with the previously reported results.
引用
收藏
页数:14
相关论文
共 31 条
  • [1] Wireless multimedia sensor networks: A survey
    Akyildiz, Ian F.
    Melodia, Tommaso
    Chowdury, Kaushik R.
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (06) : 32 - 39
  • [2] Barbosa J. R., 2021, Microbial degradation of food products, DOI [10.1007/978-981-16-0518-56, DOI 10.1007/978-981-16-0518-56]
  • [3] Diagnosing anomalies and identifying faulty nodes in sensor networks
    Chatzigiannakis, Vassilis
    Papavassiliou, Symeon
    [J]. IEEE SENSORS JOURNAL, 2007, 7 (5-6) : 637 - 645
  • [4] Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
  • [5] UPPER AND LOWER PROBABILITIES INDUCED BY A MULTIVALUED MAPPING
    DEMPSTER, AP
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1967, 38 (02): : 325 - &
  • [6] Security in wireless sensor networks
    Du, Xiaojiang
    Chen, Hsiao-Hwa
    [J]. IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 60 - 66
  • [7] A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
    Feng, Renjian
    Xu, Xiaofeng
    Zhou, Xiang
    Wan, Jiangwen
    [J]. SENSORS, 2011, 11 (02) : 1345 - 1360
  • [8] Ganesh M., 2006, INTRO FUZZY SET FUZZ
  • [9] Joussleme A.-L., 2001, Information Fusion, V2, P91, DOI 10.1016/S1566-2535(01)00026-4
  • [10] Insider attacker detection in wireless sensor networks
    Liu, Fang
    Cheng, Xluzhen
    Chen, Dechang
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1937 - +