Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks

被引:23
|
作者
Yin, Xueqiang [1 ,2 ]
Li, Shining [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710029, Shaanxi, Peoples R China
[2] China Elect Technol Grp Corp, Res Inst 15, Beijing 100083, Peoples R China
关键词
Trust evaluation model; Entropy; Weight assignment; Security; Wireless sensor networks; ENERGY-AWARE; MANAGEMENT; SECURE; SCHEME;
D O I
10.1186/s13638-019-1524-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trust management is considered as an effective complementary mechanism to ensure the security of sensor networks. Based on historical behavior, the trust value can be evaluated and applied to estimate the reliability of the node. For the analysis of the possible attack behavior of malicious nodes, we proposed a trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks. To mitigate the malicious attacks such as packet dropping or packet modifications, multidimensional trust indicators are derived from communication between adjacent sensor nodes, and direct and indirect trust values will be estimated based on the corresponding behaviors of those sensor nodes. In order to improve the validity of trust quantification and ensure the objectivity of evaluation, the entropy weight method is applied to determine the proper value of the weight. Finally, the indirect trust value and direct trust value are synthesized to obtain the overall trust. Experimental results show that the proposed scheme performs well in terms of the identification of malicious node.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
    Xueqiang Yin
    Shining Li
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019
  • [2] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    [J]. IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [3] An entropy-based trust modeling and evaluation for wireless sensor networks
    Dai Hongjun
    Jia Zhiping
    Dong Xiaona
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 27 - +
  • [4] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    [J]. Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [5] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [6] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [7] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [8] Entropy-based Trust Management for Data Collection in Wireless Sensor Networks
    Luo, Hong
    Tao, Jiaming
    Sun, Yan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3171 - 3174
  • [9] Evaluation Model of Node Trust in Ship Wireless Sensor Networks
    Niu, Jingchun
    [J]. JOURNAL OF COASTAL RESEARCH, 2019, : 729 - 734
  • [10] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617