Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation

Wireless sensor networks (WSNs) face many security challenges in their applications. In order to improve the security of WSNs, a trust security algorithm based on nodes behavior analysis and cloud model is proposed. According to the behavior characteristics of the conventional attacks, three kinds of trust factors are defined and introduced to the trust security algorithm: the transmission rate factor, the spatial correlation factor and the replay attack factor. The cloud model is used to judge the security status of the nodes according to these three trust factors. In the comprehensive calculation of the trust value, the time attenuation factor and the strategy for excluding the impersonation factor by historical evaluations are introduced. Moreover, the influence of the impersonation factor is further excluded by considering the acceptance domain of the trust distribution, and the defamatory nodes could get punished finally. Simulation experiments show that the proposed algorithm can detect the malicious nodes, identify the impersonation nodes, and resist on impersonation attacks effectively.

[1]  Deyi Li,et al.  A new cognitive model: Cloud model , 2009 .

[2]  Kai Chen,et al.  Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.

[3]  Changjiang Zhang,et al.  A particle swarm optimization-aided fuzzy cloud classifier applied for plant numerical taxonomy based on attribute similarity , 2009, Expert systems with applications.

[4]  Vandana Sharma,et al.  Mitigating Replay Attack in Wireless Sensor Network Through Assortment of Packets , 2017 .

[5]  Waleej Haider,et al.  Trust Based Energy Preserving Routing Protocol in Multi-hop WSN , 2015, NETYS.

[6]  Ki-Hyung Kim,et al.  A Reliable and Secure Hybrid Key Management Scheme for WSNs , 2015 .

[7]  E. Baburaj,et al.  Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks , 2017, Comput. Electr. Eng..

[8]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[9]  Hwang Soo Lee,et al.  Wireless sensor network design for tactical military applications : Remote large-scale environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[10]  Uma Rathore Bhatt,et al.  DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .

[11]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[12]  Manita Rajput,et al.  Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol , 2016 .

[13]  Wang Junwei,et al.  Improved TEEN based trust routing algorithm in WSNs , 2015, The 27th Chinese Control and Decision Conference (2015 CCDC).

[14]  Javier Poncela-González,et al.  Optimal Fair Scheduling in S-TDMA Sensor Networks for Monitoring River Plumes , 2016, J. Sensors.

[15]  Bin Tian,et al.  A novel sybil attack detection scheme for wireless sensor network , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.

[16]  Azzedine Boukerche,et al.  Towards a novel trust-based opportunistic routing protocol for wireless networks , 2016, Wirel. Networks.

[17]  Kyung Sup Kwak,et al.  Wide area sensor network for disaster prevention and monitoring: Concept and service coverage , 2014, 2014 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS).

[18]  Muhammad Yousaf,et al.  Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.

[19]  Mata ur Rehman,et al.  Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator Compromises , 2011, 2011 Frontiers of Information Technology.

[20]  Martin Johnston,et al.  The Optimum Design of Location-Dependent Key Management Protocol for a WSN With a Random Selected Cell Reporter , 2016, IEEE Sensors Journal.

[21]  Zhengliang Hu,et al.  Towed vector fiber optic sensor used in ocean seismic exploration , 2012, Other Conferences.

[22]  Li Xiao,et al.  Dynamic camouflage event based malicious node detection architecture , 2010, The Journal of Supercomputing.

[23]  Anitha Julian,et al.  A cross layer UWSN architecture for marine environment monitoring , 2015, 2015 Global Conference on Communication Technologies (GCCT).