BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks

Abstract With the emergence of WSNs in the recent times, providing trustworthy and reliable data delivery is challenging task due to unique characteristics and constraints of nodes. Malicious node can easily disrupt the integrity of network through the inclusion of false and malicious data and initiate internal attacks. Detection of malicious nodes using trust-based security is an effective and lightweight countermeasure as compared to key based security schemes which incurs higher overhead costs. The WSNs will play greater role in the next-generation IoT systems and a compromised node can jeopardize the availability and authenticity of sensory layer. In this paper, an efficient Belief based trust evaluation mechanism (BTEM) is proposed which isolates the malicious node from trust-worthy nodes and defend against Bad-mouth, On–Off and Denial of Service (DoS) attacks. Bayesian estimation approach is used in gathering direct and In-direct trust values of the sensor nodes which further considers the correlation of the data collected over the time and then estimate imprecise knowledge in decision making for secure delivery of data thus avoiding the malicious nodes. Compared with existing approaches, the proposed BTEM performs better in the detection of malicious node (MN), with lesser delay and improved network throughput.

[1]  Fenye Bao,et al.  Dynamic Trust Management for Mobile Networks and Its Applications. , 2013 .

[2]  Sung Won Kim,et al.  A Robust Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.

[3]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[4]  Vishal Parekh,et al.  A Trust Based Routing Scheme for Wireless Sensor Networks , 2012 .

[5]  Zheng Yan,et al.  Trust Modeling and Management: From Social Trust to Digital Trust , 2008 .

[6]  Abdul Hanan Abdullah,et al.  Critical link identification and prioritization using Bayesian theorem for dynamic channel assignment in wireless mesh networks , 2018, Wirel. Networks.

[7]  Guangjie Han,et al.  A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.

[8]  Aduwati Sali,et al.  TruFiX: A Configurable Trust-Based Cross-Layer Protocol for Wireless Sensor Networks , 2017, IEEE Access.

[9]  Hai Zhou,et al.  A Security Mechanism for Cluster-Based WSN against Selective Forwarding , 2016, Sensors.

[10]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[11]  Abdulhamid Zahedi,et al.  An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks , 2019, Peer-to-Peer Netw. Appl..

[12]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[13]  Yoonmee Doh,et al.  PLUS: parameterised localised trust management-based security framework for sensor networks , 2008, Int. J. Sens. Networks.

[14]  Amr Tolba,et al.  Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[15]  Mm Momani,et al.  Bayesian methods for modelling and management of trust in wireless sensor networks , 2008 .

[16]  Hasan Farooq,et al.  Energy, Traffic Load, and Link Quality Aware Ad Hoc Routing Protocol for Wireless Sensor Network Based Smart Metering Infrastructure , 2013, Int. J. Distributed Sens. Networks.

[17]  Mahdieh Ghazvini,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.

[18]  L.F. Perrone,et al.  A Study of On-Off Attack Models for Wireless Ad Hoc Networks , 2006, 2006 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks.

[19]  Muhammad Sher,et al.  Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network , 2017, J. Comput. Networks Commun..

[20]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[21]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[22]  Daniele Quercia,et al.  B-Trust: Bayesian Trust Framework for Pervasive Computing , 2006, iTrust.

[23]  Mianxiong Dong,et al.  Reliability guaranteed efficient data gathering in wireless sensor networks , 2015, IEEE Access.

[24]  Pascal Lorenz,et al.  Security and performance enhancement of AODV routing protocol , 2015, Int. J. Commun. Syst..

[25]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[26]  Mohsen Guizani,et al.  An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network , 2015, IEEE Transactions on Mobile Computing.

[27]  Shuzhi Nie,et al.  A novel trust model of dynamic optimization based on entropy method in wireless sensor networks , 2017, Cluster Computing.

[28]  R. Suzuki,et al.  Layer-2 retransmission and combining for network coding-based forwarding in wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[29]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[30]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[31]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[32]  Zhenyu Liu,et al.  An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks , 2017, J. Sensors.

[33]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[34]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[35]  Theodore B. Zahariadis,et al.  A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks , 2009, MOBILIGHT.