A fuzzy trust management mechanism with dynamic behavior monitoring for wireless sensor networks

被引:0
|
作者
Fu, Shiming [1 ]
Zhang, Ping [2 ]
Shi, Xuehong [2 ]
机构
[1] Chongqing Univ Educ, Sch Artificial Intelligence, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
关键词
Wireless sensor networks; Monitoring; Cloud computing; Security; Wireless communication; Distributed databases; Communication system security; behavior monitoring; cloud; fuzzy; trust; wireless sensor networks; ALGORITHM; TYPE-2;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Traditional wireless sensor networks (WSNs) are typically deployed in remote and hostile environments for information collection. The wireless communication methods adopted by sensor nodes may make the network highly vulnerable to various attacks. Traditional encryption and authentication mechanisms cannot prevent attacks launched by internal malicious nodes. The trust-based security mechanism is usually adopted to solve this problem in WSNs. However, the behavioral evidence used for trust estimation presents some uncertainties due to the open wireless medium and the inexpensive sensor nodes. Moreover, how to efficiently collect behavioral evidences are rarely discussed. To address these issues, in this paper, we present a trust management mechanism based on fuzzy logic and a cloud model. First, a type-II fuzzy logic system is used to preprocess the behavioral evidences and alleviate uncertainty. Then, the cloud model is introduced to estimate the trust values for sensor nodes. Finally, a dynamic behavior monitoring protocol is proposed to provide a balance between energy conservation and safety assurance. Simulation results demonstrate that our trust management mechanism can effectively protect the network from internal malicious attacks while enhancing the energy efficiency of behavior monitoring.
引用
收藏
页码:177 / 189
页数:13
相关论文
共 50 条
  • [1] A Fuzzy Trust Management Mechanism with Dynamic Behavior Monitoring for Wireless Sensor Networks
    Fu Shiming
    Zhang Ping
    Shi Xuehong
    China Communications, 2024, 21 (05) : 177 - 189
  • [2] Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks
    Zheng, Guiping
    Gong, Bei
    Zhang, Yu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] A dynamic trust management system for wireless sensor networks
    Luo, Wei
    Ma, Wenping
    Gao, Qiang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (07) : 613 - 621
  • [4] Energy Monitoring and Management Mechanism for Wireless Sensor Networks
    Papadakis, Andreas
    Zahariadis, Theodore
    1ST MINI CONFERENCE ON EMERGING ENGINEERING APPLICATIONS (MCEEA'15), 2016, 41
  • [5] A fuzzy fully distributed trust management system in wireless sensor networks
    Jadidoleslamy, Hossein
    Aref, Mohammad Reza
    Bahramgiri, Hossein
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2016, 70 (01) : 40 - 49
  • [6] Trust management in wireless sensor networks
    Jing, Qi
    Tang, Li-Yong
    Chen, Zhong
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (07): : 1716 - 1730
  • [7] Trust management in wireless sensor networks
    Zahariadis, Theodore
    Leligou, Helen C.
    Trakadas, Panagiotis
    Voliotis, Stamatis
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (04): : 386 - 395
  • [8] A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Liu, Sheng
    Guo, Tan
    Liang, Zhifang
    IEEE ACCESS, 2018, 6 : 71404 - 71412
  • [9] Fuzzy Based Dynamic Load Management Policy for Wireless Sensor Networks
    Chanak, Prasenjit
    Banerjee, Indrajit
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1665 - 1670
  • [10] Trust management for resilient wireless sensor networks
    Hur, Junbeom
    Lee, Younho
    Hong, Seong-Min
    Yoon, Hyunsoo
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 56 - 68