Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

被引:27
|
作者
Prabha, V. Ram [1 ]
Latha, P. [2 ]
机构
[1] VV Coll Engn, CSE Dept, Tisaiyanvilai, Tamil Nadu, India
[2] Govt Coll Engn, Comp Sci & Engn Dept, Tirunelveli, Tamil Nadu, India
关键词
Wireless sensor networks (WSNs); Security; Trust model; Multi-attribute trust model (MATM); Fuzzy logic; MODEL;
D O I
10.1007/s11277-016-3666-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To secure WSN, trust management plays a pertinent role. In trust based security model, decision is taken based on some specific behavior, and so it has uncertainty. Fuzzy logic deals with uncertainty and has tolerance of imprecise data with high power of precision. In this study, fuzzy logic based multi-attribute trust model is suggested. The proposed trust model has message success rate, elapsed time at node, correctness and fairness as trust metrics. Once the four trust values are calculated, fuzzy computational theory is applied to compute the final trust value of every node that can be anyone of low (l), medium (m) and high (h). Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation based multi-attribute trust evaluation.
引用
收藏
页码:2549 / 2559
页数:11
相关论文
共 50 条
  • [1] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [2] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    Prabha, V. Ram
    Latha, P.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (02): : 143 - 151
  • [3] A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Yang, Simon X.
    Guo, Tan
    Liang, Zhifang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 4837 - 4847
  • [4] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
    Ramasamy, Lakshmana Kumar
    Khan, Firoz K. P.
    Imoize, Agbotiname Lucky
    Ogbebor, Joshua O.
    Kadry, Seifedine
    Rho, Seungmin
    IEEE ACCESS, 2021, 9 : 128765 - 128785
  • [5] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks
    Yin, Xueqiang
    Li, Shining
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [6] Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
    Xueqiang Yin
    Shining Li
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [7] An Evolutionary Game-Based Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Yang, Simon X.
    Zhong, Yuanchang
    Guo, Tan
    Liang, Zhifang
    IEEE SENSORS JOURNAL, 2021, 21 (12) : 13935 - 13947
  • [8] DMHCET: Detection of Malicious Node for Hierarchical Clustering based on Energy Trust in Wireless Sensor Network
    Manasa, P.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 688 - 692
  • [9] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [10] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    V. Gomathy
    Neelamadhab Padhy
    Debabrata Samanta
    M. Sivaram
    Vishal Jain
    Iraj Sadegh Amiri
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4995 - 5001