Skip to main content
Log in

Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Intelligent grid transmits data by means of wireless communication. The wireless communication network is vulnerable to multiple kinds of network attacks. Trust model is considered to be an important way to defend against malicious network attacks in large-scale communication networks. Concerning the problem of node attack in smart grid, a trust model FLTM based on fuzzy logic is proposed. FLTM model makes full use of fuzzy logic system to deal with uncertainties, estimates the overall trust value of nodes, and then detects malicious nodes. Taking direct trust, indirect trust and historical trust as inputs, the output is the overall trust of the node. Experimental data show that the proposed FLTM model can detect malicious nodes effectively. In the later stage, the FLTM model is applied to routing, thus improving the performance of data transmission.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Braga RB, Chaves IA, Oliveira CTD et al (2013) RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments[J]. J Netw Comput Appl 36(1):274–283

    Article  Google Scholar 

  2. Fu L, Zhang T, Zhang H et al (2011) A fuzzy classification method based on feature selection algorithm in malicious script code detection[C]. In: International conference on system science, engineering design and manufacturing Informatization. IEEE, pp 218–221

  3. Geraily M, Jahan MV (2012) Fuzzy detection of malicious attacks on web applications based on hidden Markov model ensemble[C]. In: International conference on intelligent systems Modelling & Simulation. IEEE Computer Society, pp 102–108

  4. Guo G, Chen Z (2015) A kind of malicious code detection scheme based on fuzzy reasoning[C]. In: International conference on intelligent computation technology and automation. IEEE, pp 19–22

  5. Li J, Wei Y (2009) A shortest path algorithm of image segmentation based on fuzzy-rough grid[C]. In: International conference on computational intelligence and software engineering. IEEE, pp 1–4

  6. Li Y, Zhou Q (2013) A distributed intrusion detection scheme about communication optimization in smart grid[J]. Math Probl Eng 2013(1.082):708–715

    Google Scholar 

  7. Oh SL, Hagiwara Y, Raghavendra U, Yuvaraj R, Arunkumar N, Murugappan M, Rajendra Acharya U (2018) A deep learning approach for Parkinson’s disease diagnosis from EEG signals. Neural Comput & Applic:1–7. https://doi.org/10.1007/s00521-018-3689-5

  8. Qian C, Fang Y (2018) Adaptive tracking control of flapping wing micro-air vehicles with averaging theory. CAAI Transactions on Intelligence Technology 3(1):18–27

    Article  Google Scholar 

  9. Rajendra Achary U, Hagiwara Y, Deshpande SN, Suren S, Koh JEW, Oh SL, Arunkumar N, Ciaccio EJ, Lim CM (2019) Characterization of focal EEG signals: a review. Futur Gener Comput Syst 91:290–299

    Article  Google Scholar 

  10. Sharma D, Prashar D, Salaria DS et al (2011) Detection of malicious node in ad hoc networks using statistical technique based on CPU utilization[M]. In: High performance architecture and grid computing. Springer Berlin Heidelberg, pp 349–356

  11. Shin MC, Choi YH (2013) Malicious node detection using confidence level evaluation in a grid-based wireless sensor network[J]. Wirel Sens Netw 05(3):52–60

    Article  Google Scholar 

  12. Singh R, Singh J, Singh R (2017) Fuzzy based advanced hybrid intrusion detection system to detect malicious nodes in wireless sensor networks[J]. Wirel Commun Mob Comput 2017(2):1–14

    Article  Google Scholar 

  13. Wang H, Ren X, Zhao D et al (2015) Research of malicious nodes detecting and removing based on passive trust reaction mechanism in AGNT[J]. Application Research of Computers

  14. Wu J, Xu X (2018) Decentralised grid scheduling approach based on multi-agent reinforcement learning and gossip mechanism. CAAI Transactions on Intelligence Technology 3(1):8–17

    Article  Google Scholar 

  15. Wu R, Deng X, Lu R et al (2015) Trust-based anomaly detection in emerging sensor networks[J]. International Journal of Distributed Sensor Networks 2015(7):6

    Google Scholar 

  16. Zarei M, Rahmani AM, Sasan A et al (2009) Fuzzy based trust estimation for congestion control in wireless sensor networks[C]. In: International conference on intelligent NETWORKING and collaborative systems. IEEE, pp 233–236

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingming Gao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, M., Wu, Y., Nan, J. et al. Multimedia detection algorithm of malicious nodes in intelligent grid based on fuzzy logic. Multimed Tools Appl 78, 24011–24022 (2019). https://doi.org/10.1007/s11042-019-7191-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7191-6

Keywords

Navigation