A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network

被引:29
|
作者
Pang, Baohe [1 ]
Teng, Zhijun [2 ]
Sun, Huiyang [3 ]
Du, Chunqiu [1 ]
Li, Meng [1 ]
Zhu, Weihua [4 ]
机构
[1] Northeast Elect Power Univ, Sch Elect Engn, Jilin 132000, Jilin, Peoples R China
[2] Northeast Elect Power Univ, Key Lab Modern Power Syst Simulat & Control & Ren, Minist Educ, Jilin 132000, Jilin, Peoples R China
[3] Beijing Elect Sci & Technol Inst, Dept Cryptog Sci & Technol, Beijing 100000, Peoples R China
[4] Jilin Technol Coll Elect Informat, Sch Informat Technol, Jilin 132000, Jilin, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Indexes; Bayes methods; Artificial intelligence; Time series analysis; Stochastic processes; Simulation; Wireless sensor network; dishonest recommendation attacks; fuzzy trust; ABC algorithm;
D O I
10.1109/LWC.2021.3070630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor network (WSN) nodes owing to their openness, are susceptible to several threats, one of which is dishonest recommendation attacks providing false trust values that favor the attacker. In this letter, a malicious node detection strategy is proposed based on a fuzzy trust model and artificial bee colony algorithm (ABC) (FTM-ABC). The fuzzy trust model (FTM) is introduced to calculate the indirect trust, and the ABC algorithm is applied to optimize the trust model for detecting dishonest recommendation attacks. Besides, fitness function includes recommended deviation and interaction index deviation to enhance the effectiveness. Simulation results reveal the improved FTM-ABC maintains a high recognition rate and a low false-positive rate, even if the number of dishonest nodes reaches 50%.
引用
收藏
页码:1613 / 1617
页数:5
相关论文
共 50 条
  • [11] An Improved ABC-based Node Localization Algorithm for Wireless Sensor Network
    Li, Mudong
    Xiong, Wei
    Liang, Qing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [12] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [13] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks
    Yin, Xueqiang
    Li, Shining
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)
  • [14] A PSO based malicious node detection and energy efficient clustering in wireless sensor network
    Kumar, Sumit
    Mehfuz, Shabana
    2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 859 - 863
  • [15] Trust evaluation model with entropy-based weight assignment for malicious node’s detection in wireless sensor networks
    Xueqiang Yin
    Shining Li
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [16] Fuzzy Logic Based Faulty Node Detection in Wireless Sensor Network
    Jadav, Pooja
    Babu, Vinoth K.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 390 - 394
  • [17] Routing in Wireless Sensor Network using Fuzzy based Trust Model
    Raje, Radhika A.
    Sakhare, Apeksha V.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 529 - 532
  • [18] A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network
    Zhijun Teng
    Baohe Pang
    Mingyang Sun
    Luying Xie
    Liwen Guo
    Wireless Personal Communications, 2021, 117 : 1143 - 1162
  • [19] A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network
    Teng, Zhijun
    Pang, Baohe
    Sun, Mingyang
    Xie, Luying
    Guo, Liwen
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1143 - 1162
  • [20] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461