Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks

被引:0
作者
Liangyi Gong
Chundong Wang
Hong Yang
Zhiyuan Li
Zhentang Zhao
机构
[1] Tianjin University of Technology,Key Laboratory of Computer Vision and System, Ministry of Education
[2] Tianjin University of Technology,Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology
[3] Tianjin City Public Security Bureau Beichen Branch,undefined
来源
Mobile Networks and Applications | 2021年 / 26卷
关键词
Wireless sensor networks; Trust model; Routing; NS2;
D O I
暂无
中图分类号
学科分类号
摘要
The trust routing protocol is an important way to solve the security of wireless sensor networks. In previous work, nodes’ trust evaluation granularity is coarse, and routing trust evaluation model is relatively insufficient. In this paper, we propose a high-reliability trust evaluation model for secure routing based on combination inside states of a node with outside interaction behaviors between nodes. Firstly, we leverage a Markov chain prediction model with inside four states to assess trust degree of a routing node. The abnormal node could be found through changes of node power, traffic, response time and network delay. However, a compromised routing node self can change its inside states, so we explore the interaction behaviors between nodes to find abnormal nodes and use an improved Bayesian model to calculate the trust degree of nodes. Finally, this paper proposes a novel trust routing working principle based on a fine-grained trust model. NS2 (Network Simulator version 2) results show that our routing trust evaluation scheme can effectively identify the abnormal and malicious nodes, and reduce the harm caused by malicious nodes to wireless sensor networks.
引用
收藏
页码:2515 / 2524
页数:9
相关论文
共 113 条
[1]  
Abbas NI(2015)Fuzzy approach to improving route stability of the aodv routing protocol EURASIP J Wirel Commun Netw 2015 1-11
[2]  
Ilkan M(2017)Energy-aware and secure routing with trust for disaster response wireless sensor network Peer-to-Peer Networking and Applications 14 1-22
[3]  
Ahmed A(2017)Towards secure and flexible ehr sharing in mobile health cloud under static assumptions Clust Comput 20 1-8
[4]  
Bakar KA(2016)T2ar: trust-aware ad-hoc routing protocol for manet SpringerPlus 5 1-16
[5]  
Channa MI(2013)Trust-based routing mechanism in manet: design and implementation Mobile Networks and Applications 18 666-677
[6]  
Khan AW(2018)Privacy-preserving naive bayes classifiers secure against the substitution-then-comparison attack Inform Sci 444 72-88
[7]  
Haseeb K(2013)A novel trust evaluation model based on grey clustering theory for routing networks J Comput 8 2743-2749
[8]  
Cai Z(2013)Study on security routing algorithm based on dynamic adjacent trust J Commun 6 191-200
[9]  
Yan H(2017)Insight of the protection for data security under selective opening attacks Inform Sci s 412C413 223-241
[10]  
Li P(2018)Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial iot IEEE Access 6 1-1