JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 123-128.doi: 10.6040/j.issn.1671-9352.2.2014.333

Previous Articles     Next Articles

A trust evaluation model based on connection number for wireless sensor networks

LI Guo-qing   

  1. School of Information Engineering, Xuchang University, Xuchang 461000, Henan, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: According to the characteristics of WSN and network security problems, a trust evaluation model based on connection number was proposed. By monitoring the behavior of neighboring nodes, the optimal trustful node can be selected for data forwarding in accordance with the multi-attributes decision making. Experimental results show that the model has low computational overhead and meet with the characteristics of the energy-constrained for wireless sensor network. Also, it can achieve better performance for improving detection accuracy and reduce false positives to prevent routing attacks.

Key words: connection number, security evaluation, wireless sensor networks, trust model

CLC Number: 

  • TP393
[1] TAO Shu, KRUNZ M, LIU Si. Secure data collection in wireless sensor networks using randomized dispersive routes[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 941-954.
[2] PROBST M J, KASERA S K. Statistical trust establishment in wireless sensor networks[C]//Proceedings of 2007 International Conference on Parallel and Distributed Systems. Washington: IEEE Computer Society, 2007: 1-8.
[3] GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(3): 1-37.
[4] 成坚,冯仁剑,许小丰,等.基于D-S证据理论的无线传感器网络信任评估模型[J].传感技术学报,2009, 22(12):1802-1807. CHENG Jian, FENG Renjian, XU Xiaofeng, et al. Trust evaluation model based on D-S evidence theory in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2009, 22(12): 1802-1807.
[5] 高建斌,娄渊胜.基于模糊逻辑分类的WSN Sinkhole侦测[J].计算机工程,2011, 39(9):178-180. GAO Jianbin, LOU Yuansheng. Sinkhole detection based on fuzzy logic classification for WSN [J]. Computer Engineering, 2011, 39(9): 178-180.
[6] 冯欣,杨华民,宋小龙.WSN中改进的节点复制攻击检测方法[J].计算机工程,2011, 37(23):121-123, 134. FENG Xin, YANG Huamin, SONG Xiaolong. Improved detection method of node replication attack in wireless sensor network[J]. Computer Engineering, 2011, 37(23): 121-123, 134.
[7] KHALIL I, BAGCHI S, ROTARU C N, et al. UNMASK:utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks[J]. Ad Hoc Networks, 2010, 8(1): 148-164.
[8] MADRIA S, YIN Jian. SeRWA: a secure routing protocol against wormhole attacks in sensor networks[J]. Ad Hoc Networks, 2009, 7(6): 1051-1063.
[9] 王万军.不确定集对分析探索[J].河北理工大学学报:自然科学版,2008, 30(3):67-69. WANG Wanjun. On uncertain set pair analysis [J]. Journal of Hebei Institute of Technology: Natural Science Edition, 2008, 30(3): 67-69.
[10] ROMAN R, ZHOU Jianying, LOPEZ J. Applying intrusion detection systems to wireless sensor networks[C]//Proceedings of the 3rd IEEE Consumer Communications and Networking Conference(CCNC 2006). Washington: IEEE Computer Society, 2006: 640-644.
[11] BANERJEE S, GROSAN C, ABRAHAM A. IDEAS: intrusion detection based on emotional ants for sensors[C]//Proceedings of 2005 International Conference on Intelligent Systems Design and Applications (ISDA '05). Wroclaw,Poland:[s.n.], 2005: 344-349.
[1] ZHAO Feng, XU Xiu. An improved DV-hop algorithm based on iterative computation and two communication ranges for sensor network localization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 31-37.
[2] ZHOU Xian-cun, LI Ming-xi, LI Rui-xia, XU Ming-juan, LING Hai-bo. Research on the multi-point collaboration detection against replication attacks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 54-65.
[3] WAN Zhi-ping. An authentication protocol based on hybrid Das protocol for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 12-17.
[4] ZHAO Ze-mao1, LIU Yang1, ZHANG Fan1,2, ZHOU Jian-qin1, ZHANG Pin1. Research on source location privacy routing based on angle and probability in wireless sensor networks [J]. J4, 2013, 48(09): 1-9.
[5] WAN Run-ze1, LEI Jian-jun1, YUAN Cao2. An optimization strategy for managing dormant nodes in wireless sensor networks base on fuzzy clustering [J]. J4, 2013, 48(09): 17-21.
[6] L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82.
[7] CUI Huan-qing1,2, WANG Ying-long1*, L Jia-liang1,2, WEI Nuo1. Distributed node localization based on the stochastic particle swarm optimization [J]. J4, 2012, 47(9): 51-55.
[8] GUO Xiao-dong1, DU Peng1, ZHANG Xue-fen2. A energy-efficient distributed detection and power allocation algorithm in wireless sensor networks [J]. J4, 2012, 47(9): 60-64.
[9] YAO Wu-jun1, DING Yi1,WEI Li-xian1, YANG Xiao-yuan1,2. An ARQ error control scheme based on RSSI in wireless sensor networks [J]. J4, 2011, 46(9): 61-66.
[10] ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network  coverage and intelligent search [J]. J4, 2010, 45(11): 27-31.
[11] GUO Wen-juan1,2, WANG Ying-long1,2, Wei Nuo1,3, GUO Qiang1,3, ZHOU Shu-wang1,2,3. A time synchronization protocol for wireless sensor  networks based on the Kalman filter [J]. J4, 2010, 45(11): 32-36.
[12] ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor  network nodes localization method [J]. J4, 2009, 44(9): 52-55.
[13] ZHANG Xian-yi ,WANG Ying-long ,GUO Qiang,ZHAO Hong-lei . Research on the indoors channel fading model in WSN [J]. J4, 2008, 43(11): 44-47 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!