Abstract

Abnormal behavior detection and trust evaluation mode of traditional sensor node have a single function without considering all the factors, and the trust value algorithm is relatively complicated. To avoid these above disadvantages, a trust evaluation model based on the autonomous behavior of sensor node is proposed in this paper. Each sensor node has the monitoring privilege and obligation. Neighboring sensor nodes can monitor each other. Their direct and indirect trust values can be achieved by using a relatively simple calculation method, the synthesis trust value of which could be got according to the composition rule of D-S evidence theory. Firstly, the cluster head assigns different weighted value for the data from each sensor node, then the weight vector is set according to the synthesis trust value, the data fusion processing is executed, and finally the cluster head sensor node transmits the fused result to the base station. Simulation experiment results demonstrate that the trust evaluation model can rapidly, exactly, and effectively recognize malicious sensor node and avoid malicious sensor node becoming cluster head sensor node. The proposed algorithm can greatly increase the safety and accuracy of data fusion, improve communication efficiency, save energy of sensor node, suit different application fields, and deploy environments.

Highlights

  • As an important element of Internet of Things, wireless sensor networks (WSN) are composed of many compact microsensors

  • (5) It adopts the same way to the collected data of other cluster sensor nodes and the data from each sensor node will be sent to the base station after fusion according to the weighted value

  • The legitimacy of sensor node is the key of realizing data security fusion for WSNs

Read more

Summary

Introduction

As an important element of Internet of Things, wireless sensor networks (WSN) are composed of many compact microsensors They have a lot of advantages, for instance, wireless communication, data processing, and real-time monitoring as well as the several characteristics such as self-organization [1], universality, simple and easy operation, and strong adaptability. Any neighboring sensor nodes can monitor each other in region Their direct and indirect trust values can be achieved by using relatively simple calculation method. In view of the different proportion of attack behaviors in different application fields and deployment environments, the weight vector would be set when the synthesis trust value is calculated, so the validity of the trust evaluation model and algorithm are improved in various actual situations

The Node Trust Evaluation Model
The Stimulation Experiment and Result Analysis
Conclusions
Findings
Conflict of Interests
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call