Advertisement

Wireless Networks

, Volume 24, Issue 3, pp 777–797 | Cite as

Trust evaluation method for clustered wireless sensor networks based on cloud model

  • Tong Zhang
  • Lisha YanEmail author
  • Yuan Yang
Article

Abstract

Trust Management has been proved to be an effective method to detect malicious nodes and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust management methods are not good at dealing with uncertainty of trust relationship such as randomness, fuzziness in WSNs, which leads to inaccurate trust metric. In this paper, a trust evaluation method for clustered wireless sensor networks based on cloud model is proposed and evaluated, which implements the conversion between qualitative and quantitative of sensor nodes’ trust metrics in order to achieve better trust evaluation. Firstly, the method considers multi-factors including communication factor, message factor and energy factor and builds mathematical model for each trust factor to get factor trust cloud. Secondly, immediate trust cloud is calculated by assigning adjustive weights for each factor trust cloud and combining them. Thirdly, recommendation trust cloud and immediate trust cloud are synthesized according to time sensitive factor in order to get final trust cloud. Furthermore, the final trust cloud of sensor node is converted to trust grade by trust cloud decision-making. Verification Experiments manifest that the proposed method has feasibility and accuracy in the aspect of evaluating sensor nodes’ trust. Moreover, comparison experiments under different attacks show that our method is sensitive to multiple attacks, it outperforms other trust evaluation methods not only in the accuracy of detecting malicious nodes, but also in the tolerance of abnormal conditions.

Keywords

Clustered wireless sensor networks Trust model Cloud theory Trust grade Security 

Notes

Acknowledgments

This paper is supported by National Natural Science Fund of China under Grant No. 51477138 and Network Computing and Security Technology of Shaanxi Key Laboratory under Grant No. 15JS078; and supported by Industrial Science and Technology Project of Shaanxi Province under Grant No. 2016GY-140 and Science Research Project of Department of Education Key Laboratory of Shaanxi Provincial under Grant No. 15JS078.

References

  1. 1.
    Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1), 266–282.CrossRefGoogle Scholar
  2. 2.
    He, D. J., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.CrossRefGoogle Scholar
  3. 3.
    Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.CrossRefGoogle Scholar
  4. 4.
    Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRefGoogle Scholar
  5. 5.
    Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks”. IET Wireless Senors System, 2(3), 161–169.CrossRefGoogle Scholar
  6. 6.
    Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.CrossRefGoogle Scholar
  7. 7.
    Marzi, H., & Marzi, A. (2014). A security model for wireless sensor networks. In Proceedings of IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (pp. 64–69).Google Scholar
  8. 8.
    Sun, Y., Han, Z., & Ray Liu, K. J. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.CrossRefGoogle Scholar
  9. 9.
    Geetha, V., & Chandrasekaran, K. (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), 173–183.CrossRefGoogle Scholar
  10. 10.
    Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorial, 13(4), 562–583.CrossRefGoogle Scholar
  11. 11.
    Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of IEEE symposium on security and privacy (pp. 164–173).Google Scholar
  12. 12.
    Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for internet of things. China Communications, 11(2), 148–156.CrossRefGoogle Scholar
  13. 13.
    Ganeriwal, S., Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of ACM workshop security of ad hoc and sensor networks (pp. 66–67).Google Scholar
  14. 14.
    Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.CrossRefGoogle Scholar
  15. 15.
    Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.CrossRefGoogle Scholar
  16. 16.
    He, D., Chen, C., Chan, S., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.CrossRefGoogle Scholar
  17. 17.
    Han, G., Jiang, J., Lei, L., & Guizani, M. (2015). An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447–2458.CrossRefGoogle Scholar
  18. 18.
    Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 14(9), 2396–2407.CrossRefzbMATHGoogle Scholar
  19. 19.
    Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.CrossRefGoogle Scholar
  20. 20.
    Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A security trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.CrossRefGoogle Scholar
  21. 21.
    Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d–s evidence theory. Sensors, 11(2), 1345–1360.CrossRefGoogle Scholar
  22. 22.
    Yang, K., Liu, S., & Li, X. (2015). A novel detection scheme based on D–S evidence theory in wireless sensor networks. In International conference on intelligent networking and collaborative systems (pp. 398–401).Google Scholar
  23. 23.
    Li, D. (2000). Uncertainty in knowledge representation. Engineering Science, 2(10), 73–79.Google Scholar
  24. 24.
    Li, D., & Du, Y. (2008). Artificial intelligence with uncertainty (pp. 107–150). Boca Raton: Chapman & Hall/CRC Press.zbMATHGoogle Scholar
  25. 25.
    Li, D., Liu, C., & Gan, W. (2009). A new cognitive model: Cloud model. International Journal of Intelligent Systems, 24(3), 257–375.CrossRefzbMATHGoogle Scholar
  26. 26.
    Huang, H., & Wang, R. (2008). A subjective trust evaluation model based on membership cloud theory. Journal on Communications, 29(4), 13–19.Google Scholar
  27. 27.
    Cai, H., Li, Z., & Tian, J. (2011). A new trust evaluation model based on cloud theory in E-commerence environment. In Proceedings of 2011 international symposium on intelligence information processing and trusted computing (pp. 139–142).Google Scholar
  28. 28.
    Jin, B., Wang, Y., Liu, Z., & Xue, J. (2011). A trust model based on cloud model and bayesian network. Procedia Environmental Sciences, 11, 452–459.CrossRefGoogle Scholar
  29. 29.
    Cai, S., Han, Q., Gao, Z., Yand, D., & Zhao, J. (2012). Research on cloud trust model for malicious node detection in wireless sensor network. Acta Electronica Sinica, 40(11), 2232–2238.Google Scholar
  30. 30.
    Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceeding of the 33rd annual Hawaii international conference on system sciences (pp. 3005–3014).Google Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyXi’an University of TechnologyXi’anChina
  2. 2.School of Automation and Information EngineeringXi’an University of TechnologyXi’anChina

Personalised recommendations