Trustability based on beta distribution detecting abnormal behaviour nodes in WSN

Large numbers of low-power, low-cost, and multifunctional sensor nodes being integrated as a network are improved with wireless communication and electronics updated technologies. Wireless sensor networks (WSN) have been engaged as one of most important parts in our daily life. Common application areas include hospitals, homes, battlefields, and transportation systems. However, nodes deployed in a wireless sensor networks run on batteries with limited power and computation ability. The communication channels can be unreliable and the performance can be vulnerable to attacks and sensor failures such as; wormhole and sinkhole attacks, denial-of-service (DoS), and other pollution attacks. Many algorithms have been published relating to these areas, but few research papers discuss internal attacks. Our major focus in this paper is to ensure the designed networks correct security state, such as if the functions are within the original design. In our proposed algorithm we investigated three scenarios with the trustability based on the beta distribution detecting those nodes in a WSN showing abnormal behaviour. Furthermore, our algorithm can present how weighting is an effective viable security measure in the targeted WSN. Our proposed algorithm does not have any previous information about the target network when it is applied to a WSN. It offers consistent results, detecting malicious nodes with all achieving a trust value inside a 0.003 range within two-hops of the assessing node in a WSN.

[1]  Xu Huang,et al.  Protecting an WSN from internal attack based on epistemic uncertainties , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[2]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[4]  Indranil Sengupta,et al.  A Distributed Trust Model for Securing Mobile Ad Hoc Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[5]  Xu Huang,et al.  Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks , 2012, ICA3PP.

[6]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[7]  Dharmendra Sharma,et al.  Novel Protection from Internal Attacks in Wireless Sensor Networks , 2013 .

[8]  Muhammad R. Ahmed,et al.  Markov chain Monte Carlo based internal attack evaluation for wireless sensor network , 2013 .

[9]  Xu Huang,et al.  Protecting wireless sensor networks from internal attacks based on uncertain decisions , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  J. Rotter A new scale for the measurement of interpersonal trust. , 1967, Journal of personality.

[11]  J. G. Holmes Trust and the appraisal process in close relationships. , 1991 .

[13]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[14]  Dong,et al.  Attack Resistant Trust Management Model Based on Beta Function for Distributed Routing in Internet of Things , 2012 .