A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network

被引:29
|
作者
Pang, Baohe [1 ]
Teng, Zhijun [2 ]
Sun, Huiyang [3 ]
Du, Chunqiu [1 ]
Li, Meng [1 ]
Zhu, Weihua [4 ]
机构
[1] Northeast Elect Power Univ, Sch Elect Engn, Jilin 132000, Jilin, Peoples R China
[2] Northeast Elect Power Univ, Key Lab Modern Power Syst Simulat & Control & Ren, Minist Educ, Jilin 132000, Jilin, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Cryptog Sci & Technol, Beijing 100000, Peoples R China
[4] Jilin Technol Coll Elect Informat, Sch Informat Technol, Jilin 132000, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Indexes; Bayes methods; Artificial intelligence; Time series analysis; Stochastic processes; Simulation; Wireless sensor network; dishonest recommendation attacks; fuzzy trust; ABC algorithm;
D O I
10.1109/LWC.2021.3070630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several threats, one of which is dishonest recommendation attacks providing false trust values that favor the attacker. In this letter, a malicious node detection strategy is proposed based on a fuzzy trust model and artificial bee colony algorithm (ABC) (FTM-ABC). The fuzzy trust model (FTM) is introduced to calculate the indirect trust, and the ABC algorithm is applied to optimize the trust model for detecting dishonest recommendation attacks. Besides, fitness function includes recommended deviation and interaction index deviation to enhance the effectiveness. Simulation results reveal the improved FTM-ABC maintains a high recognition rate and a low false-positive rate, even if the number of dishonest nodes reaches 50%.
引用
收藏
页码:1613 / 1617
页数:5
相关论文
共 50 条
  • [1] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [2] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [3] A hybrid malicious node detection approach based on fuzzy trust model and Bayesian belief in wireless sensor networks
    Shi W.
    International Journal of Wireless and Mobile Computing, 2024, 27 (01) : 56 - 63
  • [4] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [5] DMHCET: Detection of Malicious Node for Hierarchical Clustering based on Energy Trust in Wireless Sensor Network
    Manasa, P.
    Shaila, K.
    Venugopal, K. R.
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 688 - 692
  • [6] A Novel Reputation Model for Malicious Node Detection in Wireless Sensor Network
    Yin, Guisheng
    Yang, Guang
    Yang, Wu
    Yu, Xiang
    Zuo, Dongmei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3462 - +
  • [7] Enhanced LEACH Protocol Based Wireless Sensor Network Malicious Node Detection Model
    Yang H.-Y.
    Cheng F.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (03): : 304 - 310
  • [8] Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
    Nirmala, B. Vijaya
    Selvaraj, K.
    WIRELESS NETWORKS, 2025, 31 (02) : 1095 - 1116
  • [9] Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network
    A. Ranjith Kumar
    A. Sivagami
    Multimedia Tools and Applications, 2020, 79 : 14031 - 14051
  • [10] Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network
    Kumar, A. Ranjith
    Sivagami, A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 14031 - 14051