An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things

In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.

[1]  Luis Martínez-López,et al.  Integration of a Consistency Control Module within a Consensus Model , 2008, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Gong Xudong Node behavior and identity-based trusted authentication in wireless sensor networks , 2013 .

[3]  Chen Zhong,et al.  Trust Management in Wireless Sensor Networks , 2008 .

[4]  Qi Jing,et al.  Trust Management in Wireless Sensor Networks: Trust Management in Wireless Sensor Networks , 2008 .

[5]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[6]  Wolfgang Kellerer,et al.  Castor: Scalable Secure Routing for Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[7]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[8]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[9]  Wei Qin-fang Detection of selective forwarding attack in the Internet of things , 2012 .

[10]  Niki Pissinou,et al.  Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[11]  Basil S. Maglaris,et al.  Towards multisensor data fusion for DoS detection , 2004, SAC '04.

[12]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[13]  Subhash Challa,et al.  Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.

[14]  Theodore B. Zahariadis,et al.  A novel flexible trust management system for heterogeneous wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[15]  Wenchao Huang,et al.  Node behavior and identity-based trusted authentication in wireless sensor networks: Node behavior and identity-based trusted authentication in wireless sensor networks , 2013 .

[16]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[17]  Yoonmee Doh,et al.  PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[18]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[19]  Lawrence Carin,et al.  Bayesian Compressive Sensing , 2008, IEEE Transactions on Signal Processing.

[20]  Steve Hodges,et al.  Prototyping Connected Devices for the Internet of Things , 2013, Computer.

[21]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[22]  Guangjie Han,et al.  Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..

[23]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[24]  Stefanos Gritzalis,et al.  Hybrid trust and reputation management for sensor networks , 2010, Wirel. Networks.

[25]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[26]  Chi-Yin Chow,et al.  On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments , 2011, IEEE Transactions on Mobile Computing.

[27]  Enrique Herrera-Viedma,et al.  A Consensus Model for Group Decision Making Problems with Unbalanced Fuzzy Linguistic Information , 2009, Int. J. Inf. Technol. Decis. Mak..

[28]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[29]  Yenumula Reddy,et al.  Detection of Packet Dropping in Wireless Sensor Networks , 2010, 2010 Seventh International Conference on Information Technology: New Generations.