Trust-Based Anomaly Detection in Emerging Sensor Networks

被引:3
|
作者
Wu, Renyong [1 ]
Deng, Xue [1 ]
Lu, Rongxing [2 ]
Shen, Xuemin [2 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
D O I
10.1155/2015/363569
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) consist of a large number of small-size, energy-constrained nodes and generally are deployed to monitor surrounding situation or relay generated packets in other devices. However, due to the openness of wireless media and the inborn self-organization feature of WSNs, that is, frequent interoperations among neighbouring nodes, network security has been tightly related to data credibility and/or transmission reliability, thus trust evaluation of network nodes is becoming another interesting issue. Obviously, how to describe node's behaviors and how to integrate various characteristics to make the final decision are two major research aspects of trust model. In this paper, a new trust model is proposed to detect anomaly nodes based on fuzzy theory and revised evidence theory. By monitoring the behaviors of the evaluated nodes with multidimensional characteristics and integrating these pieces of information, the malicious nodes in a network can be identified and the normal operation of the whole network can be verified. In addition, to accelerate the detection process, a weighting judgment mechanism is adopted to deal with the uncertain states of evaluated nodes. Finally extensive simulations are conducted, and the results demonstrate that the proposed trust model can achieve higher detection ratio of malicious nodes in comparison with the previously reported results.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [2] A trust-based detection scheme to explore anomaly prevention in social networks
    Wu, Xu
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 60 (03) : 1565 - 1586
  • [3] A trust-based detection scheme to explore anomaly prevention in social networks
    Xu Wu
    [J]. Knowledge and Information Systems, 2019, 60 : 1565 - 1586
  • [4] A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor Networks
    Liang, Kun
    Sun, Shijie
    Huang, Xiangdang
    Yang, Qiuling
    Neal, N. Xiong
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 427 - 440
  • [5] A Trust-Based Formal Model for Fault Detection in Wireless Sensor Networks
    Wang, Na
    Wang, Jiacun
    Chen, Xuemin
    [J]. SENSORS, 2019, 19 (08)
  • [6] Trust-Based Data Disclosure in Sensor Networks
    Aivaloglou, Efthimia
    Gritzalis, Stefanos
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 741 - 746
  • [7] Trust-based federated learning for network anomaly detection
    Chen, Naiyue
    Jin, Yi
    Li, Yinglong
    Cai, Luxin
    [J]. WEB INTELLIGENCE, 2021, 19 (04) : 317 - 327
  • [8] Trust-based classifier combination for network anomaly detection
    Rehak, Martin
    Pechoucek, Michal
    Grill, Martin
    Bartos, Karel
    [J]. COOPERATIVE INFORMATION AGENTS XII, PROCEEDINGS, 2008, 5180 : 116 - +
  • [9] A Trust-Based Distributed Data Fault Detection Algorithm for Wireless Sensor Networks
    Taghikhaki, Zahra
    Sharifi, Mohsen
    [J]. 2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 893 - 898
  • [10] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    [J]. SENSORS, 2017, 17 (06):