Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

被引:1
|
作者
V. Ram Prabha
P. Latha
机构
[1] VV College of Engineering,CSE Department
[2] Government College of Engineering,Computer Science and Engineering Department
来源
关键词
Wireless sensor networks (WSNs); Security; Trust model; Multi-attribute trust model (MATM); Fuzzy logic;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To secure WSN, trust management plays a pertinent role. In trust based security model, decision is taken based on some specific behavior, and so it has uncertainty. Fuzzy logic deals with uncertainty and has tolerance of imprecise data with high power of precision. In this study, fuzzy logic based multi-attribute trust model is suggested. The proposed trust model has message success rate, elapsed time at node, correctness and fairness as trust metrics. Once the four trust values are calculated, fuzzy computational theory is applied to compute the final trust value of every node that can be anyone of low (l), medium (m) and high (h). Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation based multi-attribute trust evaluation.
引用
收藏
页码:2549 / 2559
页数:10
相关论文
共 50 条
  • [1] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [2] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    Prabha, V. Ram
    Latha, P.
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (02): : 143 - 151
  • [3] Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
    V Ram Prabha
    P Latha
    [J]. Sādhanā, 2017, 42 : 143 - 151
  • [4] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    [J]. IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [5] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [6] A Multipath Secure Routing Protocol Based on Malicious Node Detection in Wireless Sensor Networks
    Yao Lan
    Gao Fuxiang
    Zhao Zhibin
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 799 - 804
  • [7] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [8] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617
  • [9] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    Gomathi, S.
    Krishnan, C. Gopala
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 1775 - 1790
  • [10] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    S. Gomathi
    C. Gopala Krishnan
    [J]. Wireless Personal Communications, 2020, 113 : 1775 - 1790