Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

被引:27
|
作者
Prabha, V. Ram [1 ]
Latha, P. [2 ]
机构
[1] VV Coll Engn, CSE Dept, Tisaiyanvilai, Tamil Nadu, India
[2] Govt Coll Engn, Comp Sci & Engn Dept, Tirunelveli, Tamil Nadu, India
关键词
Wireless sensor networks (WSNs); Security; Trust model; Multi-attribute trust model (MATM); Fuzzy logic; MODEL;
D O I
10.1007/s11277-016-3666-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To secure WSN, trust management plays a pertinent role. In trust based security model, decision is taken based on some specific behavior, and so it has uncertainty. Fuzzy logic deals with uncertainty and has tolerance of imprecise data with high power of precision. In this study, fuzzy logic based multi-attribute trust model is suggested. The proposed trust model has message success rate, elapsed time at node, correctness and fairness as trust metrics. Once the four trust values are calculated, fuzzy computational theory is applied to compute the final trust value of every node that can be anyone of low (l), medium (m) and high (h). Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation based multi-attribute trust evaluation.
引用
收藏
页码:2549 / 2559
页数:11
相关论文
共 50 条
  • [21] Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 177 - 181
  • [22] On the Node Clone Detection in Wireless Sensor Networks
    Li, Zhijun
    Gong, Guang
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (06) : 1799 - 1811
  • [23] Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks
    Singh, Rupinder
    Singh, Jatinder
    Singh, Ravinder
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2017, : 1 - 14
  • [24] Node-Level Trust Evaluation in Wireless Sensor Networks
    Desai, S. Sundeep
    Nene, Manisha J.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2139 - 2152
  • [25] Detection and Trust Evaluation of the SGN Malicious node
    Al Yahmadi, Faisal
    Ahmed, R. Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 89 - 100
  • [26] A User Authentication Protocol Combined With Trust Model and ECC for Wireless Sensor Networks
    Liu, Tao
    Huang, Gan
    Xu, Zheng
    2016 IEEE 15TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC), 2016, : 451 - 458
  • [27] Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks
    Sultan, Shahid
    Javaid, Qaisar
    Malik, Arif Jamal
    Al-Turjman, Fadi
    Attique, Muhammad
    ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY, 2022, 24 (06) : 7532 - 7550
  • [28] An Energy and Trust-aware Routing Protocol for Large Wireless Sensor Networks
    Zahariadis, Theodore
    Leligou, Helen C.
    Voliotis, Stamatis
    Maniatis, Sotiris
    Trakadas, Panagiotis
    Karkazis, Panagiotis
    AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 216 - +
  • [29] A Novel Sensor Node Selection Method Based on Trust for Wireless Sensor Networks
    Han, Guangjie
    Choi, Deokjai
    Lim, Wontaek
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2397 - 2400
  • [30] SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks
    Simpson S.V.
    Ravi Raju Y.
    Bhanu Rajesh Naidu K.
    Venu G.
    International Journal of Information Technology, 2023, 15 (8) : 4323 - 4336