Malicious Node Detection in Wireless Weak-Link Sensor Networks Using Dynamic Trust Management

被引:1
|
作者
Wang, Chenlong [1 ]
Liu, Guanghua [1 ]
Jiang, Tao [1 ]
机构
[1] Huazhong Univ Sci & Technol, Res Ctr 6G Mobile Commun, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Trust management; Wireless sensor networks; Adaptation models; Peer-to-peer computing; Wireless communication; Fuzzy sets; Fuzzy control; Malicious node detection; wireless weak-link sensor networks (WWSNs); trust management; dynamic; ROUTING PROTOCOL; DATA-COLLECTION;
D O I
10.1109/TMC.2024.3418826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The application of Wireless Sensor Networks (WSNs) in extreme environments is becoming increasingly widespread. Within these extreme environments, communication links between WSN nodes become more fragile. We refer to such WSNs as Wireless Weak-link Sensor Networks (WWSNs). The characteristics of WWSNs make them more vulnerable to internal attacks. During the data transmission process from source nodes to destination nodes, intermediary nodes could act as malicious entities capable of intercepting or manipulating data. Therefore, detecting malicious nodes is of utmost importance. This paper proposes a malicious node detection strategy based on dynamic trust management to address these challenges. The dynamic trust management algorithm integrates type-2 fuzzy logic and considers various trust factors to comprehensively evaluate node trust within WWSNs. Additionally, a dynamic trust value updating mechanism is proposed to accommodate the dynamic environmental changes inherent to WWSNs. Experimental results emphasize the effectiveness of the proposed approach in dynamically adapting to the network environment while achieving a high level of performance in detecting malicious nodes.
引用
收藏
页码:12866 / 12877
页数:12
相关论文
共 50 条
  • [41] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
    Guo, Yongan
    Tang, Xinyu
    Sun, Hongbo
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
  • [42] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
    Khashan, Osama A.
    KNOWLEDGE-BASED SYSTEMS, 2024, 304
  • [43] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [44] A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks
    Zhang, Wei
    Zhu, Shiwei
    Tang, Jian
    Xiong, Naixue
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (04): : 1779 - 1801
  • [45] Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
    Nirmala, B. Vijaya
    Selvaraj, K.
    WIRELESS NETWORKS, 2025, 31 (02) : 1095 - 1116
  • [46] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [47] Energy Efficient Malicious Node Detection Scheme in Wireless Networks
    Sukanesh, R.
    Edsor, Eisha
    Aarthylakshmi, M.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [48] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [49] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    Gomathy, V.
    Padhy, Neelamadhab
    Samanta, Debabrata
    Sivaram, M.
    Jain, Vishal
    Amiri, Iraj Sadegh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 4995 - 5001
  • [50] Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
    V. Gomathy
    Neelamadhab Padhy
    Debabrata Samanta
    M. Sivaram
    Vishal Jain
    Iraj Sadegh Amiri
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 4995 - 5001