Malicious Node Detection in Wireless Weak-Link Sensor Networks Using Dynamic Trust Management

被引:1
|
作者
Wang, Chenlong [1 ]
Liu, Guanghua [1 ]
Jiang, Tao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Res Ctr 6G Mobile Commun, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Trust management; Wireless sensor networks; Adaptation models; Peer-to-peer computing; Wireless communication; Fuzzy sets; Fuzzy control; Malicious node detection; wireless weak-link sensor networks (WWSNs); trust management; dynamic; ROUTING PROTOCOL; DATA-COLLECTION;
D O I
10.1109/TMC.2024.3418826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of Wireless Sensor Networks (WSNs) in extreme environments is becoming increasingly widespread. Within these extreme environments, communication links between WSN nodes become more fragile. We refer to such WSNs as Wireless Weak-link Sensor Networks (WWSNs). The characteristics of WWSNs make them more vulnerable to internal attacks. During the data transmission process from source nodes to destination nodes, intermediary nodes could act as malicious entities capable of intercepting or manipulating data. Therefore, detecting malicious nodes is of utmost importance. This paper proposes a malicious node detection strategy based on dynamic trust management to address these challenges. The dynamic trust management algorithm integrates type-2 fuzzy logic and considers various trust factors to comprehensively evaluate node trust within WWSNs. Additionally, a dynamic trust value updating mechanism is proposed to accommodate the dynamic environmental changes inherent to WWSNs. Experimental results emphasize the effectiveness of the proposed approach in dynamically adapting to the network environment while achieving a high level of performance in detecting malicious nodes.
引用
收藏
页码:12866 / 12877
页数:12
相关论文
共 50 条
  • [1] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [2] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [3] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [4] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [5] Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks
    Lim, Sung Yul
    Choi, Yoon-Hwa
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2013, 2 (01): : 70 - 84
  • [6] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    Prabha, V. Ram
    Latha, P.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (02): : 143 - 151
  • [7] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [8] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    V Ram Prabha
    P Latha
    Sādhanā, 2017, 42 : 143 - 151
  • [9] Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine
    Jaint, Bhavnesh
    Indu, S.
    Pandey, Neeta
    Pahwa, Khushbu
    2019 3RD INTERNATIONAL CONFERENCE ON RECENT DEVELOPMENTS IN CONTROL, AUTOMATION & POWER ENGINEERING (RDCAPE), 2019, : 247 - 252
  • [10] Malicious Link Detection in Multi-Hop Wireless Sensor Networks
    Liang, Yuan
    Liu, Yunhao
    Ren, Jian
    Li, Tongtong
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,