A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks

Abstract Wireless sensor networks (WSNs) face many security issues. When external attacks can be prevented with traditional cryptographic mechanisms; internal attacks remain difficult to be eliminated. Trust and reputation have been recently suggested by many researches as a powerful tool for guaranteeing an effective security mechanism. They enable the detection and the isolation of both faulty and malicious nodes. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies especially in the case of dishonest recommendations attacks, i.e. badmouthing, ballot-stuffing and collusion attacks. In this paper, we propose a novel bio inspired trust model for WSNs namely Bee-Trust Scheme (BTS) based on the use of both a modified cloud model and a cognitive chronometry parameter. The objective of the scheme is to achieve both a higher detection rate and a lower false positive rate of dishonest recommendations attacks by allowing the distinction between erroneous recommendations and dishonest ones which has thus far been overlooked by most research work. Simulation results demonstrate that the proposed scheme is both effective and lightweight even when the number of dishonest recommenders is large.

[1]  Abdelhak Mourad Guéroui,et al.  Bacterial Foraging Optimization Scheme for Mobile Sensing in Wireless Sensor Networks , 2017, International Journal of Wireless Information Networks.

[2]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[3]  Majid Bayani Abbasy,et al.  Time delay performance analysis of sensor allocation strategies on a WSN , 2011, ACWR '11.

[4]  Mohamed Lehsaini,et al.  Dishonest recommendation attacks in wireless sensor networks: A survey , 2015, 2015 12th International Symposium on Programming and Systems (ISPS).

[5]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[6]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[7]  Heena Rathore Case Study: A Review of Security Challenges, Attacks and Trust and Reputation Models in Wireless Sensor Networks , 2016 .

[8]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[9]  Jie Wu,et al.  DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[10]  D. Roff,et al.  Evolutionary Ecology: Concepts and Case Studies , 2001 .

[11]  Qiang Liu,et al.  A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[12]  E. Crane A Book of Honey , 1980 .

[13]  Abdelhak Mourad Guéroui,et al.  A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[14]  Audun Jøsang,et al.  Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review , 2013, IFIPTM.

[15]  Hyunsoo Yoon,et al.  Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..

[16]  M. Pham-Delègue,et al.  Foraging behaviour of honey bees (Apis mellifera L.) on transgenic oilseed rape (Brassica napus L.var. oleifera) , 1995, Transgenic Research.

[17]  K. Frisch Decoding the Language of the Bee , 1974 .

[18]  Xiaodong Li,et al.  Swarm Intelligence in Optimization , 2008, Swarm Intelligence.

[19]  Abdelhak Mourad Guéroui,et al.  Clustering algorithm for wireless sensor networks: the honeybee swarms nest-sites selection process based approach , 2018, Int. J. Sens. Networks.

[20]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[21]  Damien Charlet,et al.  Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks , 2011, J. Netw. Comput. Appl..

[22]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[23]  Mrinal Kanti Naskar,et al.  Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN , 2014 .

[24]  Troy Lee,et al.  How Information-Mapping Patterns Determine Foraging Behaviour of a Honey Bee Colony , 2002, Open Syst. Inf. Dyn..

[25]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[26]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[27]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[28]  Yuqing Zhang,et al.  Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.

[29]  Panagiotis Karkazis,et al.  DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .

[30]  Xu Wu,et al.  A self-adaptive trust management scheme for wireless sensor networks , 2015 .

[31]  Kah Phooi Seng,et al.  Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..

[32]  Zhongwei Li,et al.  Multi-agent trust-based intrusion detection scheme for wireless sensor networks , 2017, Comput. Electr. Eng..

[33]  Dervis Karaboga,et al.  A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..

[34]  Bo Xing,et al.  Innovative Computational Intelligence: A Rough Guide to 134 Clever Algorithms , 2013 .

[35]  Saleh Alrashed Reducing power consumption of non-preemptive real-time systems , 2017, The Journal of Supercomputing.

[36]  Sherali Zeadally,et al.  Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.

[37]  Naima Iltaf,et al.  A mechanism for detecting dishonest recommendation in indirect trust computation , 2013, EURASIP J. Wirel. Commun. Netw..

[38]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[39]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[40]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .

[41]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[42]  Ado Adamou Abba Ari,et al.  A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach , 2016, J. Netw. Comput. Appl..

[43]  Tanuj Sen,et al.  A new approach to solve Economic Dispatch problem using a Hybrid ACO–ABC–HS optimization algorithm , 2016 .

[44]  Brian L. Mark,et al.  E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.

[45]  Detecting lies about consumer attitudes using the timed antagonistic response alethiometer , 2014, Behavior research methods.

[46]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[47]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[48]  A. Gregg When vying reveals lying: the timed antagonistic response alethiometer , 2007 .

[49]  Krishna M. Sivalingam,et al.  Data gathering in sensor networks using the energy*delay metric , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[50]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[51]  Chuanlei Zhang,et al.  BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..