Malicious Node Detection in Wireless Weak-Link Sensor Networks Using Dynamic Trust Management

被引:1
|
作者
Wang, Chenlong [1 ]
Liu, Guanghua [1 ]
Jiang, Tao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Res Ctr 6G Mobile Commun, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Trust management; Wireless sensor networks; Adaptation models; Peer-to-peer computing; Wireless communication; Fuzzy sets; Fuzzy control; Malicious node detection; wireless weak-link sensor networks (WWSNs); trust management; dynamic; ROUTING PROTOCOL; DATA-COLLECTION;
D O I
10.1109/TMC.2024.3418826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of Wireless Sensor Networks (WSNs) in extreme environments is becoming increasingly widespread. Within these extreme environments, communication links between WSN nodes become more fragile. We refer to such WSNs as Wireless Weak-link Sensor Networks (WWSNs). The characteristics of WWSNs make them more vulnerable to internal attacks. During the data transmission process from source nodes to destination nodes, intermediary nodes could act as malicious entities capable of intercepting or manipulating data. Therefore, detecting malicious nodes is of utmost importance. This paper proposes a malicious node detection strategy based on dynamic trust management to address these challenges. The dynamic trust management algorithm integrates type-2 fuzzy logic and considers various trust factors to comprehensively evaluate node trust within WWSNs. Additionally, a dynamic trust value updating mechanism is proposed to accommodate the dynamic environmental changes inherent to WWSNs. Experimental results emphasize the effectiveness of the proposed approach in dynamically adapting to the network environment while achieving a high level of performance in detecting malicious nodes.
引用
收藏
页码:12866 / 12877
页数:12
相关论文
共 50 条
  • [31] Dynamic power management of sink node of wireless sensor networks
    School of Electronics and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, China
    Hsi An Chiao Tung Ta Hsueh, 2008, 2 (138-142):
  • [32] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [33] A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
    Wei Zhang
    Shiwei Zhu
    Jian Tang
    Naixue Xiong
    The Journal of Supercomputing, 2018, 74 : 1779 - 1801
  • [34] Trust management in wireless sensor networks
    Jing, Qi
    Tang, Li-Yong
    Chen, Zhong
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (07): : 1716 - 1730
  • [35] Trust management in wireless sensor networks
    Zahariadis, Theodore
    Leligou, Helen C.
    Trakadas, Panagiotis
    Voliotis, Stamatis
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (04): : 386 - 395
  • [36] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617
  • [37] Malignant Node Detection through Trust Model Events in Wireless Sensor Networks
    Ali, Masthan A. H.
    Ahammed, Ali G. F.
    Banu, Reshma
    Parameshachari, B. D.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 285 - 292
  • [38] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [39] Malicious beacon detection for localization in wireless sensor networks
    Wang, Weidong
    Zhu, Qingxin
    Zhong, Qianchuan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1410 - +
  • [40] Retraction Note: Emerging network communication for malicious node detection in wireless multimedia sensor networks
    S. Arockia Jayadhas
    S. Emalda Roslin
    W. Florin
    Optical and Quantum Electronics, 56 (10)