Using Trust Metric to Detect Malicious Behaviors in WSNs

In order to enhance transaction security in wireless sensor networks, it is important to evaluate nodes' trustworthiness. Malicious nodes may strategically alter their behavior for concealing malicious behavior and prompting their reputation. Collusive or malicious behaviors might change the system trust entropy due to their voting ratings are biased. In this paper, according to the basic theory of Shanon informational entropy, the trust entropy and standard structure entropy of distributed entities trustworthiness evaluation are proposed, which be used to detect whether the malicious behavior happened in sensor systems. By simulating experiment, it can detect whether malicious behavior happened where the system is attacked either maliciously, randomly or collusively. Especially in collusive attack, the malicious nodes will boost their clique reputation and drop honest nodes by bad mouthing attack.

[1]  Man Hon Wong,et al.  Mining fuzzy association rules in databases , 1998, SGMD.

[2]  Dongheng Li,et al.  Starburst: A hybrid algorithm for video-based eye tracking combining feature-based and model-based approaches , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[3]  Jian-Gang Wang,et al.  Eye gaze estimation from a single image of one eye , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[4]  Beno Benhabib,et al.  Three-dimensional location estimation of circular features for machine vision , 1992, IEEE Trans. Robotics Autom..

[5]  Ya-Jing Zhang,et al.  An investigation of immune detection algorithm with vaccine operator and fuzzy match , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[6]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  Christopher Krügel,et al.  Anomalous system call detection , 2006, TSEC.

[8]  Shichao Zhang,et al.  Detecting Collusion Attacks in Security Protocols , 2006, APWeb.

[9]  Marina Moscarini,et al.  Auditing sum-queries to make a statistical database secure , 2006, TSEC.

[10]  Jian-Gang Wang,et al.  Estimating the eye gaze from one eye , 2005, Comput. Vis. Image Underst..

[11]  Ping Xiong,et al.  Optimization of membership functions in anomaly detection based on fuzzy data mining , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[12]  Carlos Hitoshi Morimoto,et al.  Eye gaze tracking techniques for interactive applications , 2005, Comput. Vis. Image Underst..

[13]  Shumeet Baluja,et al.  Non-Intrusive Gaze Tracking Using Artificial Neural Networks , 1993, NIPS.

[14]  Fillia Makedon,et al.  Attack detection in time series for recommender systems , 2006, KDD '06.

[15]  Chunyan Miao,et al.  An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..

[16]  Zhiwei Zhu,et al.  Eye gaze tracking under natural head movements , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[17]  Fabio Ricciato,et al.  Modeling and simulation of mobile gateways interacting with wireless sensor networks , 2006, Proceedings of the Design Automation & Test in Europe Conference.

[18]  Shanzhong Zhu,et al.  A New Power-Efficient Scheme to Deliver Time-Sensitive Data in Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[19]  Narendra Ahuja,et al.  Appearance-based eye gaze estimation , 2002, Sixth IEEE Workshop on Applications of Computer Vision, 2002. (WACV 2002). Proceedings..

[20]  Luiz A. DaSilva,et al.  A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[21]  Carlos Hitoshi Morimoto,et al.  A computer vision framework for eye gaze tracking , 2003, 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003).

[22]  Ahmed Patel,et al.  Evidence processing and privacy issues in evidence-based reputation systems , 2005, Comput. Stand. Interfaces.

[23]  Andrew W. Fitzgibbon,et al.  Direct Least Square Fitting of Ellipses , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  Fillia Makedon,et al.  Analysis of a low-dimensional linear model under recommendation attacks , 2006, SIGIR.

[25]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[26]  Zhongmin Cai,et al.  A rough set theory based method for anomaly intrusion detection in computer network systems , 2003, Expert Syst. J. Knowl. Eng..

[27]  Goto Shigeki,et al.  An Improved Intrusion Detecting Method Based on Process Profiling , 2002 .