Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks

被引:1
|
作者
V. Ram Prabha
P. Latha
机构
[1] VV College of Engineering,CSE Department
[2] Government College of Engineering,Computer Science and Engineering Department
来源
关键词
Wireless sensor networks (WSNs); Security; Trust model; Multi-attribute trust model (MATM); Fuzzy logic;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WSNs) are used in many applications nowadays, because of its extensive usage. Due to the distinct characteristics, they are vulnerable to many attacks. To secure WSN, trust management plays a pertinent role. In trust based security model, decision is taken based on some specific behavior, and so it has uncertainty. Fuzzy logic deals with uncertainty and has tolerance of imprecise data with high power of precision. In this study, fuzzy logic based multi-attribute trust model is suggested. The proposed trust model has message success rate, elapsed time at node, correctness and fairness as trust metrics. Once the four trust values are calculated, fuzzy computational theory is applied to compute the final trust value of every node that can be anyone of low (l), medium (m) and high (h). Simulation results show that the fuzzy based multi-attribute trust evaluation outperforms weighted summation based multi-attribute trust evaluation.
引用
收藏
页码:2549 / 2559
页数:10
相关论文
共 50 条
  • [41] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Tataroiu, Razvan
    2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
  • [42] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
    Khashan, Osama A.
    KNOWLEDGE-BASED SYSTEMS, 2024, 304
  • [43] A Fuzzy Trust Evaluation of Cloud Collaboration Outlier Detection in Wireless Sensor Networks
    Sabitha, R.
    Shukla, Anand Prakash
    Mehbodniya, Abolfazl
    Shakkeera, L.
    Reddy, Punduru Chandra Shaker
    AD HOC & SENSOR WIRELESS NETWORKS, 2022, 53 (3-4) : 165 - 188
  • [44] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [45] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [46] Energy Efficient Malicious Node Detection Scheme in Wireless Networks
    Sukanesh, R.
    Edsor, Eisha
    Aarthylakshmi, M.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [47] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [48] Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali A.
    INTERNET OF THINGS, 2024, 27
  • [49] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, (04) : 732 - 743
  • [50] A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks
    邓晓明
    熊焰
    Journal of Computer Science & Technology, 2011, 26 (04) : 732 - 743