BDTMS: Binomial Distribution-based Trust Management Scheme for Healthcare-oriented Wireless Sensor Network

被引:0
|
作者
Fang, Weidong [1 ]
Zhu, Chunsheng [2 ]
Chen, Wei [3 ]
Zhang, Wuxiong [4 ]
Rodrigues, Joel J. P. C. [5 ,6 ,7 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Key Lab Wireless Sensor Network & Commun, Shanghai 200051, Peoples R China
[2] Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V6T 1Z4, Canada
[3] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[4] Shanghai Res Ctr Wireless Commun, Shanghai 201210, Peoples R China
[5] Natl Inst Telecommun Inatel, Santa Rita Do Sapucai, Brazil
[6] Inst Telecomunicacoes, Lisbon, Portugal
[7] Univ Fortaleza UNIFOR, Fortaleza, Ceara, Brazil
基金
中国国家自然科学基金;
关键词
wireless sensor network (WSN); healthcare; trust management; internal attack; On-Off attack; BIG DATA; CLOUD; CITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Healthcare-oriented wireless sensor network (HWSN) is one of the applications of wireless sensor networks in e-health. It not only can better achieve the physiological information of people, but also more efficiently reduce the latency regarding information collection and transmission. However, similar to other distributed networks, it also faces enormous security challenges, especially from internal attacks. It is difficult to distinguish many attack behaviors from interference in the complex healthcare scenarios, such as On-Off attack. In this paper, we propose a Binomial Distribution-based Trust Management Scheme (BDTMS) for HWSN. The proposed method can rapidly detect and effectively defend against On-Off attacks. In addition, the proposed method is also applicable to defending against bad mouthing attacks. Simulation results show that, compared with the Time-window-based Resilient Trust Management Scheme (TRTMS), our proposed BDTMS achieves better performance in defending against On-Off attack under obstacle movement, especially with higher detection accuracy.
引用
收藏
页码:382 / 387
页数:6
相关论文
共 50 条
  • [21] Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks
    Zheng, Guiping
    Gong, Bei
    Zhang, Yu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [22] A Hybrid Key Management Scheme for Wireless Sensor Network
    Han, Yanyan
    He, Yanru
    Liu, Peihe
    Yan, Xiaoxuan
    Li, Na
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 347 - 364
  • [23] Trust Based Scheme for IoT Enabled Wireless Sensor Networks
    Bader A. Ali
    Hanady M. Abdulsalam
    Aseel AlGhemlas
    Wireless Personal Communications, 2018, 99 : 1061 - 1080
  • [24] A self-adaptive trust management scheme for wireless sensor networks
    Wu, Xu
    Zheng, Qinghua
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2015, 37 (10) : 1197 - 1206
  • [25] Key pre-distribution management scheme for wireless sensor based on hash
    Yu, Jia
    Xu, Ke
    Peng, Wen-Bing
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2011, 31 (08): : 909 - 913
  • [26] Trust Based Scheme for IoT Enabled Wireless Sensor Networks
    Ali, Bader A.
    Abdulsalam, Hanady M.
    AlGhemlas, Aseel
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (02) : 1061 - 1080
  • [27] An Improved ID-Based Key Management Scheme in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 351 - 359
  • [28] Guard against trust management vulnerabilities in Wireless Sensor Network
    Sahoo, Rashmi Ranjan
    Ray, Sudhabindu
    Sarkar, Souvik
    Bhoi, Sourav Kumar
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7229 - 7251
  • [29] Guard against trust management vulnerabilities in Wireless Sensor Network
    Rashmi Ranjan Sahoo
    Sudhabindu Ray
    Souvik Sarkar
    Sourav Kumar Bhoi
    Arabian Journal for Science and Engineering, 2018, 43 : 7229 - 7251
  • [30] LKH++ Based Group Key Management Scheme for Wireless Sensor Network
    Wenbin Yao
    Si Han
    Xiaoyong Li
    Wireless Personal Communications, 2015, 83 : 3057 - 3073