Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

被引:1
|
作者
V. Ram Prabha
P. Latha
机构
[1] VV College of Engineering,CSE Department
[2] Government College of Engineering,Computer Science and Engineering Department
来源
关键词
Wireless sensor networks (WSNs); Security; Trust model; Multi-attribute trust model (MATM); Fuzzy logic;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To secure WSN, trust management plays a pertinent role. In trust based security model, decision is taken based on some specific behavior, and so it has uncertainty. Fuzzy logic deals with uncertainty and has tolerance of imprecise data with high power of precision. In this study, fuzzy logic based multi-attribute trust model is suggested. The proposed trust model has message success rate, elapsed time at node, correctness and fairness as trust metrics. Once the four trust values are calculated, fuzzy computational theory is applied to compute the final trust value of every node that can be anyone of low (l), medium (m) and high (h). Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation based multi-attribute trust evaluation.
引用
下载
收藏
页码:2549 / 2559
页数:10
相关论文
共 50 条
  • [31] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [32] Malignant Node Detection through Trust Model Events in Wireless Sensor Networks
    Ali, Masthan A. H.
    Ahammed, Ali G. F.
    Banu, Reshma
    Parameshachari, B. D.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2016, : 285 - 292
  • [33] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [34] Malicious beacon detection for localization in wireless sensor networks
    Wang, Weidong
    Zhu, Qingxin
    Zhong, Qianchuan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1410 - +
  • [35] A Malicious Node Detection Model for Wireless Sensor Networks Security Based on CHSA-MNDA
    Guo, Yongan
    Tang, Xinyu
    Sun, Hongbo
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 860 - 865
  • [36] Retraction Note: Emerging network communication for malicious node detection in wireless multimedia sensor networks
    S. Arockia Jayadhas
    S. Emalda Roslin
    W. Florin
    Optical and Quantum Electronics, 56 (10)
  • [37] Trust based Secure Routing Protocol using Fuzzy Logic in Wireless Sensor Networks
    Renubala, S.
    Dhanalakshmi, K. S.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1264 - 1268
  • [38] Trust Based Target Coverage Protocol for Wireless Sensor Networks Using Fuzzy Logic
    Chaturvedi, Pooja
    Daniel, A. K.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2016), 2016, 9581 : 188 - 192
  • [39] Adaptive Trust Management Protocol Based on Fault Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Deaconescu, Razvan
    Tapus, Nicolae
    SERVICE COMPUTATION 2010: THE SECOND INTERNATIONAL CONFERENCES ON ADVANCED SERVICE COMPUTING, 2010, : 215 - 221
  • [40] Malicious Node Detection Using Minimal Event Cycle Computation Method in Wireless Sensor Networks
    Priyanka, J. Steffi Agino
    Tephillah, S.
    Balamurugan, A. M.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,