A novel detection scheme based on D-S evidence theory in wireless sensor networks

被引:0
|
作者
Yang K. [1 ,2 ]
Yang X. [1 ]
Ma J. [1 ,2 ]
机构
[1] Dept. of Electronic Technol., Eng. Univ. of CAPF, Xi'an
[2] School of Network and Info. Security, Xidian Univ., Xi'an
关键词
D-S evidence theory; Detection scheme; Performance simulation; Trust evaluation;
D O I
10.15961/j.jsuese.2016.02.017
中图分类号
学科分类号
摘要
In order to solve the problem that the existing trust models could not solve malicious nodes in wireless sensor networks effectively and the problem that counter-intuitive results may appear when combining evidence, a detection scheme based on improved D-S evidence theory was proposed. The inherent deficiency of the D-S evidence theory was analyzed, a new variable was defined to describe the difference among trust evidence, and the original D-S evidence theory combination rule was modified to obtain more accurate results. Based on those improvements, a detection scheme to identify and isolate misbehaviors nodes in WSNs was proposed. Moreover, simulations were carried out to verify the effectiveness of the proposed scheme. Simulation results showed that this model could find and isolate malicious nodes quickly and accurately, suppress nodes collusion and improve network performance. Compared with other existing trust models, this model has more security, robustness and accuracy. © 2016, Editorial Department of Journal of Sichuan University (Engineering Science Edition). All right reserved.
引用
收藏
页码:118 / 124
页数:6
相关论文
共 15 条
  • [1] Marmol G., Perez M., Providing trust in wireless sensor networks using a bioinspired technique, Telecommunication Systems, 46, 2, pp. 163-180, (2013)
  • [2] Zhang S., Chen J., Yang J., Study on cloud trust model based on cluster structure for wireless sensor networks, Journal of Sichuan University: Engineering Science Edition, 46, 6, pp. 32-37, (2014)
  • [3] Boukercha A., Xua L., El-Khatibb K., Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 30, 11-12, pp. 2413-2427, (2010)
  • [4] Chen H., Wu H., Zhou X., Et al., Agent-based trust model in wireless sensor networks, Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 119-124, (2007)
  • [5] Srinivasan A., Teitelbaum J., Wu J., DRBTS: distributed reputation-based Beacon trust system, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277-283, (2006)
  • [6] Buchegger S., Le Boudec J.Y., Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, (2010)
  • [7] He Q., Wu D., Khosla P., SORI: A secure and objective reputation-based incentive scheme for ad hoc networks, Proceedings of 2004 IEEE Wireless Communications & Networking Conference, pp. 825-830, (2011)
  • [8] Zhong S., Chen J., Yang Y.R., Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications, pp. 1987-1997, (2003)
  • [9] Wu Q., Liu Q., Trusted model of secure routing for VANET based on bayesian theory, Journal of Sichuan University: Engineering Science Edition, 47, 2, pp. 129-135, (2015)
  • [10] Shafer G., A Mathematical Theory of Evidence[M, (1976)