Abstract

Wireless sensor network (WSN) works in a complex environment where it is difficult for people to reach or work. The openness of nodes leads to security threats vulnerable to various attacks. The trust and reputation model can be applied in WSN to reduce damage caused by malicious nodes. However, there is a high false-positive rate in trust and reputation models because a node with less reputation due to the communication environment is judged as a malicious one directly. This paper presents a trust & reputation-based malicious node identification strategy with environmental parameters (TRS&EP) to interdict the malicious nodes, such as interrupt attack nodes and selective forwarding attack nodes. Using the linear regression of machine learning and combining the energy of nodes, data volume, number of adjacent nodes, the node sparsity and other deterministic parameters can solve environmental parameters. Then TRS&EP estimates benchmark trust according to the environmental parameters. The Gaussian radial basis function is simplified to calculate the similarity between the benchmark trust sequence and cycle reputation sequence. Furthermore, TRS&EP sets three reputation intervals and an adoptive threshold span to identify the malicious nodes by dynamically considering the work environment and states of nodes. The simulated results show that TRS&EP improves the recognition of malicious nodes above 1% compared to comparison algorithms and reduces the false-positive percentage by more than 1%.

Highlights

  • Wireless sensor network (WSN) is deployable in an extensive assortment of applications, such as the military, industrial, medical, commercial, and other fields [1]

  • To address the above concerns and limitations, we propose a malicious node identification strategy based on trust, reputation sequence, and environmental parameters, TRS&EP

  • Trust and reputation model was proved can be used to identify the malicious nodes in WSN

Read more

Summary

INTRODUCTION

WSN is deployable in an extensive assortment of applications, such as the military, industrial, medical, commercial, and other fields [1]. Security mechanisms based on cryptography hardly defense malicious nodes entering the network so-called insider attacks bypassing the authentication by their neighbors. Interrupt or selectively forward information, or publish false information, even disguised as normal nodes, to evade the network’s intrusion detection system (IDS) In this situation, an effective security model should be established to cope with these attacks in the WSN [5], [6]. To address the above concerns and limitations, we propose a malicious node identification strategy based on trust, reputation sequence, and environmental parameters, TRS&EP. An environmental parameter is calculated with reputation matrix and four-state information of nodes, energy consumption, data volume, number of neighbors, and sparsity of nodes, by the inspiration for machine learning, to predict the trust value in the period.

RELATED WORK
MATRIX OF REPUTATION
MATRIX OF STATE
MATRIX OF ENVIRONMENTAL PARAMETERS
MALICIOUS NODE IDENTIFICATION
BENCHMARK MATRIX OF TRUST
NETWORK PERFORMANCE EVALUATION INDEX
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.