A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks

被引:2
|
作者
Wang, Fang [1 ]
Wei, Zhe [1 ]
机构
[1] Civil Aviat Flight Univ China, Sch Comp Sci, Deyang, Peoples R China
关键词
malicious nodes; trust computing; Chebyshev polynomials; time series;
D O I
10.1587/transfun.2020EAL2125
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The unattended malicious nodes pose great security threats to the integrity of the IoT sensor networks. However, preventions such as cryptography and authentication are difficult to be deployed in resource constrained IoT sensor nodes with low processing capabilities and short power supply. To tackle these malicious sensor nodes, in this study, the trust computing method is applied into the IoT sensor networks as a light weight security mechanism, and based on the theory of Chebyshev Polynomials for the approximation of time series, the trust data sequence generated by each sensor node is linearized and treated as a time series for malicious node detection. The proposed method is evaluated against existing schemes using several simulations and the results demonstrate that our method can better deal with malicious nodes resulting in higher correct packet delivery rate.
引用
收藏
页码:1084 / 1087
页数:4
相关论文
共 50 条
  • [1] Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks
    Mukherjee, Partha
    Sen, Sandip
    [J]. COMPUTER JOURNAL, 2011, 54 (03): : 482 - 489
  • [2] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    [J]. 2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [3] Managing Trust and Detecting Malicious Groups in Peer-to-Peer IoT Networks
    Alhussain, Alanoud
    Kurdi, Heba
    Altoaimy, Lina
    [J]. SENSORS, 2021, 21 (13)
  • [4] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    Liu, DG
    Ning, P
    Du, WL
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619
  • [5] FBMT: Fuzzy Based Merkle Technique for Detecting and Mitigating Malicious Nodes in Sensor Networks
    Sundararajan, Ranjeeth Kumar
    Arumugam, Umamakeswari
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2019, 16 (06) : 1106 - 1113
  • [6] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [7] A New Security Localization method for Detecting malicious beacon nodes in wireless sensor networks
    Miao, Chen
    Bao, Peng
    Liang, Ma
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 428 - 432
  • [8] Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network
    Joshi, Gamini
    Sharma, Vidushi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (02) : 1437 - 1469
  • [9] Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network
    Gamini Joshi
    Vidushi Sharma
    [J]. Wireless Personal Communications, 2023, 128 : 1437 - 1469
  • [10] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296