TML-CDS: Trusted Multi-layer Connected Dominating Set for Secure Routing in Distributed Networks

The internal attack launched by compromised nodes is a serious security risk in distributed networks. It is due to the openness of wireless channel and the lack of trust relationships between nodes. The trust model is an interesting approach to detect and remove these compromised nodes from the trusted routing table and maintain trust relationships in distributed networks. However, how to construct the secure dominating node to aggregate and forward the information is an enormous challenge in distributed networks. In this paper, a distributed construction algorithm of multi-layer connected dominating set is proposed for secure routing with trust models. The probabilities of nodes being compromised, combined with the trust value of the trust model, are used to construct a trusted multi-layer connected dominating set. Moreover, the impact of a node being compromised on the distributed network is quantified as loss expectation. The simulation results show that the proposed algorithm can effectively reduce the impact of nodes being compromised on the distributed network, and enhance the security of the network.

[1]  Han Hu,et al.  Optimal Computation Offloading in Collaborative LEO-IoT Enabled MEC: A Multiagent Deep Reinforcement Learning Approach , 2023, IEEE Transactions on Green Communications and Networking.

[2]  Han Hu,et al.  Energy-Efficient Trajectory Optimization for Aerial Video Surveillance under QoS Constraints , 2022, IEEE Conference on Computer Communications.

[3]  Wei Chen,et al.  A Trust-Based Security System for Data Collection in Smart City , 2021, IEEE Transactions on Industrial Informatics.

[4]  Sudhakar Sengan,et al.  RETRACTED ARTICLE: Dominating set based virtual backbone cluster scheduling for ensuring energy efficiency in asymmetric radio WSN , 2021, Journal of Ambient Intelligence and Humanized Computing.

[5]  Peng Yuan,et al.  CDS-Based Topology Control in FANETs via Power and Position Optimization , 2020, IEEE Wireless Communications Letters.

[6]  Wuxiong Zhang,et al.  Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey , 2020, Wirel. Commun. Mob. Comput..

[7]  Yanyan Li,et al.  The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network , 2020, Wirel. Commun. Mob. Comput..

[8]  Ge Zhang,et al.  TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks , 2020, Peer-to-Peer Netw. Appl..

[9]  Yong Luo,et al.  Transforming Device Fingerprinting for Wireless Security via Online Multitask Metric Learning , 2020, IEEE Internet of Things Journal.

[10]  Lei Shu,et al.  BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks , 2019, IEEE Access.

[11]  Suhyun Kim,et al.  Coping with bad-mouthing in peer-to-peer file sharing networks , 2015, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P).

[12]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[13]  Naima Iltaf,et al.  An attack resistant method for detecting dishonest recommendations in pervasive computing environment , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[14]  Erman Ayday,et al.  Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.

[15]  Otto Carlos Muniz Bandeira Duarte,et al.  A Trust Model Robust to Slander Attacks in Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[16]  Jie Wu,et al.  An extended localized algorithm for connected dominating set formation in ad hoc wireless networks , 2004, IEEE Transactions on Parallel and Distributed Systems.

[17]  Liang Jun-bin,et al.  An Energy-Balanced Connected Dominating Sets for Data Gatheringin Wireless Sensor Networks , 2013 .