Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks

被引:23
|
作者
Yin, Xueqiang [1 ,2 ]
Li, Shining [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710029, Shaanxi, Peoples R China
[2] China Elect Technol Grp Corp, Res Inst 15, Beijing 100083, Peoples R China
关键词
Trust evaluation model; Entropy; Weight assignment; Security; Wireless sensor networks; ENERGY-AWARE; MANAGEMENT; SECURE; SCHEME;
D O I
10.1186/s13638-019-1524-z
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trust management is considered as an effective complementary mechanism to ensure the security of sensor networks. Based on historical behavior, the trust value can be evaluated and applied to estimate the reliability of the node. For the analysis of the possible attack behavior of malicious nodes, we proposed a trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks. To mitigate the malicious attacks such as packet dropping or packet modifications, multidimensional trust indicators are derived from communication between adjacent sensor nodes, and direct and indirect trust values will be estimated based on the corresponding behaviors of those sensor nodes. In order to improve the validity of trust quantification and ensure the objectivity of evaluation, the entropy weight method is applied to determine the proper value of the weight. Finally, the indirect trust value and direct trust value are synthesized to obtain the overall trust. Experimental results show that the proposed scheme performs well in terms of the identification of malicious node.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [22] Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks
    Lim, Sung Yul
    Choi, Yoon-Hwa
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2013, 2 (01): : 70 - 84
  • [23] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [24] Performance Evaluation of Wireless Sensor Networks Based on Entropy Weight and AHP
    Jia, Zhi-Peng
    Huang, Zhi-Qing
    Zhang, Yan-Xin
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 640 - 645
  • [25] Entropy-Based Anomaly Detection Using Observation Points Relations in Wireless Sensor Networks
    Arkan, Ahmad Shahab
    Ahmadi, Mahmood
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (02) : 1783 - 1798
  • [26] Entropy-Based Anomaly Detection Using Observation Points Relations in Wireless Sensor Networks
    Ahmad Shahab Arkan
    Mahmood Ahmadi
    [J]. Wireless Personal Communications, 2021, 119 : 1783 - 1798
  • [27] Trust evaluation model for wireless sensor networks
    Hur, J
    Lee, Y
    Yoon, H
    Choi, D
    Jin, S
    [J]. 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 491 - 496
  • [28] Entropy-based High-Accuracy Distributed Faulty Sensor Detection Algorithm in Wireless Sensor Networks
    Ouyang, Wen
    Liu, Yu-Ting
    Lin, Yu-Wei
    [J]. 2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 774 - 778
  • [29] Node-Level Trust Evaluation in Wireless Sensor Networks
    Desai, S. Sundeep
    Nene, Manisha J.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2139 - 2152
  • [30] A Novel Reputation Model for Malicious Node Detection in Wireless Sensor Network
    Yin, Guisheng
    Yang, Guang
    Yang, Wu
    Yu, Xiang
    Zuo, Dongmei
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3462 - +