Advertisement

Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic

  • Mingming GaoEmail author
  • Yue Wu
  • Jingchang Nan
  • Shuyang Cui
Article
  • 12 Downloads

Abstract

Intelligent grid transmits data by means of wireless communication. The wireless communication network is vulnerable to multiple kinds of network attacks. Trust model is considered to be an important way to defend against malicious network attacks in large-scale communication networks. Concerning the problem of node attack in smart grid, a trust model FLTM based on fuzzy logic is proposed. FLTM model makes full use of fuzzy logic system to deal with uncertainties, estimates the overall trust value of nodes, and then detects malicious nodes. Taking direct trust, indirect trust and historical trust as inputs, the output is the overall trust of the node. Experimental data show that the proposed FLTM model can detect malicious nodes effectively. In the later stage, the FLTM model is applied to routing, thus improving the performance of data transmission.

Keywords

Wireless communication network Internet of things Malicious network attack Trust model Fuzzy logic 

Notes

References

  1. 1.
    Braga RB, Chaves IA, Oliveira CTD et al (2013) RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments[J]. J Netw Comput Appl 36(1):274–283CrossRefGoogle Scholar
  2. 2.
    Fu L, Zhang T, Zhang H et al (2011) A fuzzy classification method based on feature selection algorithm in malicious script code detection[C]. In: International conference on system science, engineering design and manufacturing Informatization. IEEE, pp 218–221Google Scholar
  3. 3.
    Geraily M, Jahan MV (2012) Fuzzy detection of malicious attacks on web applications based on hidden Markov model ensemble[C]. In: International conference on intelligent systems Modelling & Simulation. IEEE Computer Society, pp 102–108Google Scholar
  4. 4.
    Guo G, Chen Z (2015) A kind of malicious code detection scheme based on fuzzy reasoning[C]. In: International conference on intelligent computation technology and automation. IEEE, pp 19–22Google Scholar
  5. 5.
    Li J, Wei Y (2009) A shortest path algorithm of image segmentation based on fuzzy-rough grid[C]. In: International conference on computational intelligence and software engineering. IEEE, pp 1–4Google Scholar
  6. 6.
    Li Y, Zhou Q (2013) A distributed intrusion detection scheme about communication optimization in smart grid[J]. Math Probl Eng 2013(1.082):708–715Google Scholar
  7. 7.
    Oh SL, Hagiwara Y, Raghavendra U, Yuvaraj R, Arunkumar N, Murugappan M, Rajendra Acharya U (2018) A deep learning approach for Parkinson’s disease diagnosis from EEG signals. Neural Comput & Applic:1–7.  https://doi.org/10.1007/s00521-018-3689-5
  8. 8.
    Qian C, Fang Y (2018) Adaptive tracking control of flapping wing micro-air vehicles with averaging theory. CAAI Transactions on Intelligence Technology 3(1):18–27CrossRefGoogle Scholar
  9. 9.
    Rajendra Achary U, Hagiwara Y, Deshpande SN, Suren S, Koh JEW, Oh SL, Arunkumar N, Ciaccio EJ, Lim CM (2019) Characterization of focal EEG signals: a review. Futur Gener Comput Syst 91:290–299CrossRefGoogle Scholar
  10. 10.
    Sharma D, Prashar D, Salaria DS et al (2011) Detection of malicious node in ad hoc networks using statistical technique based on CPU utilization[M]. In: High performance architecture and grid computing. Springer Berlin Heidelberg, pp 349–356Google Scholar
  11. 11.
    Shin MC, Choi YH (2013) Malicious node detection using confidence level evaluation in a grid-based wireless sensor network[J]. Wirel Sens Netw 05(3):52–60CrossRefGoogle Scholar
  12. 12.
    Singh R, Singh J, Singh R (2017) Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks[J]. Wirel Commun Mob Comput 2017(2):1–14CrossRefGoogle Scholar
  13. 13.
    Wang H, Ren X, Zhao D et al (2015) Research of malicious nodes detecting and removing based on passive trust reaction mechanism in AGNT[J]. Application Research of ComputersGoogle Scholar
  14. 14.
    Wu J, Xu X (2018) Decentralised grid scheduling approach based on multi-agent reinforcement learning and gossip mechanism. CAAI Transactions on Intelligence Technology 3(1):8–17CrossRefGoogle Scholar
  15. 15.
    Wu R, Deng X, Lu R et al (2015) Trust-based anomaly detection in emerging sensor networks[J]. International Journal of Distributed Sensor Networks 2015(7):6Google Scholar
  16. 16.
    Zarei M, Rahmani AM, Sasan A et al (2009) Fuzzy based trust estimation for congestion control in wireless sensor networks[C]. In: International conference on intelligent NETWORKING and collaborative systems. IEEE, pp 233–236Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Mingming Gao
    • 1
    Email author
  • Yue Wu
    • 1
  • Jingchang Nan
    • 1
  • Shuyang Cui
    • 1
  1. 1.School of Electronic and Information EngineeringLiaoning Technical UniversityHuludaoChina

Personalised recommendations