A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

被引:1
作者
Wei Zhang
Shiwei Zhu
Jian Tang
Naixue Xiong
机构
[1] Central University of Finance and Economics,School of Information
[2] Georgia State University,Department of Computer Science
来源
The Journal of Supercomputing | 2018年 / 74卷
关键词
Trust management scheme; Dempster–Shafer evidence theory; Security; Wireless sensor networks;
D O I
暂无
中图分类号
学科分类号
摘要
With the development of Internet technology, social network has become an important application in the network life. However, due to the rapid increase in the number of users, the influx of a variety of bad information is brought up as well as the existence of malicious users. Therefore, it is emergent to design a valid management scheme for user’s authentication to ensure the normal operation of social networks. Node trust evaluation is an effective method to deal with typical network attacks in wireless sensor networks. In order to solve the problem of quantification and uncertainty of trust, a novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection is proposed in this paper. Firstly, by taking into account spatiotemporal correlation of the data collected by sensor nodes in adjacent area, the trust degree can be estimated. Secondly, according to the D–S theory, the trust model is established to count the number of interactive behavior of trust, distrust or uncertainty, further to evaluate the direct trust value and indirect trust value. Then, a flexible synthesis method is adopted to calculate the overall trust to identify the malicious nodes. The simulation results show that the proposed scheme has obvious advantages over the traditional methods in the identification of malicious node and data fusion accuracy, and can obtain good scalability.
引用
收藏
页码:1779 / 1801
页数:22
相关论文
共 64 条
[1]  
Zhou Y(2008)Securing wireless sensor networks: a survey Commun Surv Tutor IEEE 10 6-28
[2]  
Fang Y(2010)A survey on key management mechanisms for distributed wireless sensor networks Comput Netw 54 2591-2612
[3]  
Zhang Y(2012)Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks IEEE Trans Veh Tech 61 1874-1883
[4]  
Simplício MA(2007)Trust-based security for wireless ad hoc and sensor networks Comput Commun 30 2413-2427
[5]  
Barreto PSLM(2008)Reputation based framework for high integrity sensor networks ACM Trans Sens Netw 4 1-37
[6]  
Margi CB(2011)Consensus-based detection of malicious nodes in cooperative wireless networks IEEE Commun Lett 15 404-406
[7]  
Shim KA(2007)Discovery of malicious nodes in wireless sensor networks using neural predictor WSEAS Trans Comput Res 2 38-43
[8]  
Boukerch A(2011)Trust management in ubiquitous computing: a Bayesian approach Comput Commun 34 398-406
[9]  
Xu L(2013)A mechanism for detecting dishonest recommendation in indirect trust computation EURASIP J Wirel Commun Netw 1 1-13
[10]  
El-Khatib K(2012)Rlm: a general model for trust representation and aggregation IEEE Trans Serv Comput 5 131-143