A dynamic trust management system for wireless sensor networks

被引:23
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
Gao, Qiang [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
美国国家科学基金会;
关键词
trust management; trust evaluation; wireless sensor networks; network security;
D O I
10.1002/sec.1384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have been widely used in different fields, such as battle field, environment monitoring, and intrusion detection, where amount of nodes are deployed. There are many factors make sensor nodes being more vulnerable to be attacked and compromised. In order to address the issue, many different schemes and methods are proposed. Trust evaluation and trust management play an important role in detecting the malicious nodes. In this paper, we propose a trust management system for clustered WSNs monitoring the sensor nodes' behaviors and evaluating their trust values. This system employs a hash algorithm for generating identify labels for sensor nodes to distinguish external attackers from normal nodes and dynamically manages the trust value of each node to detect the compromised nodes based on the trust evaluating model, which is based on beta density function. The simulation results show that our scheme can detect the malicious nodes quickly, which prevents clustered WSNs from external attacks and internal compromised nodes' attacks. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:613 / 621
页数:9
相关论文
共 22 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2005, Proceedings 1st ACM International Workshop on Quality of service Security in Wireless and Mobile Networks
[3]  
[Anonymous], 2003, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, DOI [10.1145/986858.986869, DOI 10.1145/986858.986869]
[4]  
Bao F, 2012, IEEE WOWMOM, P1, DOI DOI 10.1145/2378023.2378025
[5]  
BUCHMANN J.A., 2013, Introduction to public key infrastructures
[6]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[7]   On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas [J].
Dai, Hong-Ning ;
Wang, Qiu ;
Li, Dong ;
Wong, Raymond Chi-Wing .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[8]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360
[9]  
Islam MS, 2010, INT J COMPUT SCI NET, V10, P21
[10]  
Josang Audun, 2002, Proceedings of the 15th Bled Electronic Commerce Conference, V41, P324