Abstract
In wireless sensor networks (WSNs), the sensor nodes are interconnected and communicate with each other wirelessly to collect data about the surrounding environment. The nodes sometimes selectively hide some information and selectively expose some data, generate and forward data to the sink and connect or disconnect to the network accordingly. The WSNs are widely deployed in areas like battlefield surveillance, intrusion detection, and forest fire monitoring. The sensor nodes have low battery life, and they work mostly in unattended setups. So, there is a great risk of exposure of sensor nodes to various attacks and the compromise of sensor data may be there. To avoid this, many schemes for trust management have been suggested to evaluate data trust and node trust values, for malicious nodes detection, trust recommendation systems, etc. The paper proposes a trust evaluation scheme based on fuzzy logic for WSNs to calculate the node trust value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohammad Momani N (2010) Meghanathan : trust Models in Wireless Sensor Networks: a Survey, CNSA 2010. CCIS 89:37–46
Luo W, Ma W, Gao Q (2015) A dynamic trust management system for wireless sensor networks. Wiley
Fang W, Zhang W, Yang W, Li Z, Gao W, Yang Y (2021) Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. Elsevier
Wang Y, Attebury G, Ramamurthy B (2005) A survey of security issues in wireless sensor networks. IEEE Commun Surv Tutorials 8:2–23
Chan H, Perrig A (2003) Security and privacy in sensor networks. IEEE Comput J 36:103–105
Zia T, Zomaya A (2006) Security issues in wireless sensor networks. In: International conference on systems and networks communication, Tahiti, French Polynesia
Walters JP, Liang Z, Shi W, Chaudhary V (2006) Wireless sensor network security: a survey. In: Xiao Y (ed) Security in distributed, grid, and pervasive computing. Auerbach Publications/CRC Press
Zhang Y, Liu W, Lou W, Fang Y (2006) Location-based compromise tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24:247–260
Feng R, Xu X, Zhou X, Jiangwen W (2011) A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory. Sensors 11:1345–1360
Han G, Jiang J, Shu L, Niu J, Chao H-C (2014) Management and applications of trust in wireless sensor networks: a survey, G. Han et al. J Comput Syst Sci 80:602–617
Shaikh RA, Jameel H, d’Auriol BJ, Lee H, Lee S, Song Y-J (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patra, M., Acharya, S. (2022). A Fuzzy Logic-Based Trust Management Scheme for Wireless Sensor Network. In: Rout, R.R., Ghosh, S.K., Jana, P.K., Tripathy, A.K., Sahoo, J.P., Li, KC. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 427. Springer, Singapore. https://doi.org/10.1007/978-981-19-1018-0_14
Download citation
DOI: https://doi.org/10.1007/978-981-19-1018-0_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1017-3
Online ISBN: 978-981-19-1018-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)