A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

With the development of Internet technology, social network has become an important application in the network life. However, due to the rapid increase in the number of users, the influx of a variety of bad information is brought up as well as the existence of malicious users. Therefore, it is emergent to design a valid management scheme for user’s authentication to ensure the normal operation of social networks. Node trust evaluation is an effective method to deal with typical network attacks in wireless sensor networks. In order to solve the problem of quantification and uncertainty of trust, a novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection is proposed in this paper. Firstly, by taking into account spatiotemporal correlation of the data collected by sensor nodes in adjacent area, the trust degree can be estimated. Secondly, according to the D–S theory, the trust model is established to count the number of interactive behavior of trust, distrust or uncertainty, further to evaluate the direct trust value and indirect trust value. Then, a flexible synthesis method is adopted to calculate the overall trust to identify the malicious nodes. The simulation results show that the proposed scheme has obvious advantages over the traditional methods in the identification of malicious node and data fusion accuracy, and can obtain good scalability.

[1]  Rongbo Zhu,et al.  Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks , 2015, Mob. Networks Appl..

[2]  K. Satyanarayan Reddy,et al.  Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in Wireless Sensor Networks , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[3]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[4]  Indranil Sengupta,et al.  A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks , 2007, 2007 International Conference on Computing: Theory and Applications (ICCTA'07).

[5]  Samayveer Singh,et al.  Heterogeneous HEED Protocol for Wireless Sensor Networks , 2014, Wirel. Pers. Commun..

[6]  Tomasz Bednarz,et al.  Discovery of Malicious Nodes in Wireless Sensor Networks Using Neural Predictors , 2007 .

[7]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[8]  M. Singh,et al.  Detection of Malicious Node in Wireless Sensor Network Based on Data Mining , 2012, 2012 International Conference on Computing Sciences.

[9]  Naixue Xiong,et al.  Multi-layer clustering routing algorithm for wireless vehicular sensor networks , 2010, IET Commun..

[10]  Naixue Xiong,et al.  A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[11]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[12]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[13]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[14]  Ling Liu,et al.  RLM: A General Model for Trust Representation and Aggregation , 2012, IEEE Transactions on Services Computing.

[15]  Xiao Wang,et al.  Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[16]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[17]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[18]  Ayman I. Kayssi,et al.  Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[19]  H. Rowaihy,et al.  Limiting Sybil Attacks in Structured Peer-to-Peer Networks , 2005 .

[20]  Sung-Kwun Oh,et al.  A space search optimization algorithm with accelerated convergence strategies , 2013, Appl. Soft Comput..

[21]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[22]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[23]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[24]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[25]  Suat Özdemir Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, WiMob.

[26]  Majid Iqbal Khan,et al.  Spatio-Temporal Query Processing Over Sensor Networks: Challenges, State Of The Art And Future Directions , 2012, KSII Trans. Internet Inf. Syst..

[27]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[28]  Yong Qi,et al.  Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks , 2011, Sensors.

[29]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[30]  Hanif D. Sherali,et al.  A Scheduling Algorithm for MIMO DoF Allocation in Multi-Hop Networks , 2016, IEEE Transactions on Mobile Computing.

[31]  Kyung-Ah Shim,et al.  ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.

[32]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[33]  Stefano Tomasin Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks , 2011, IEEE Communications Letters.

[34]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[35]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[36]  Wei Wang,et al.  A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing , 2014, EURASIP Journal on Wireless Communications and Networking.

[37]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[38]  Dieter Hogrefe,et al.  A Novel Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[39]  Naima Iltaf,et al.  A mechanism for detecting dishonest recommendation in indirect trust computation , 2013, EURASIP J. Wirel. Commun. Netw..