Abstract
Trust Management has been proved to be an effective method to detect malicious nodes and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust management methods are not good at dealing with uncertainty of trust relationship such as randomness, fuzziness in WSNs, which leads to inaccurate trust metric. In this paper, a trust evaluation method for clustered wireless sensor networks based on cloud model is proposed and evaluated, which implements the conversion between qualitative and quantitative of sensor nodes’ trust metrics in order to achieve better trust evaluation. Firstly, the method considers multi-factors including communication factor, message factor and energy factor and builds mathematical model for each trust factor to get factor trust cloud. Secondly, immediate trust cloud is calculated by assigning adjustive weights for each factor trust cloud and combining them. Thirdly, recommendation trust cloud and immediate trust cloud are synthesized according to time sensitive factor in order to get final trust cloud. Furthermore, the final trust cloud of sensor node is converted to trust grade by trust cloud decision-making. Verification Experiments manifest that the proposed method has feasibility and accuracy in the aspect of evaluating sensor nodes’ trust. Moreover, comparison experiments under different attacks show that our method is sensitive to multiple attacks, it outperforms other trust evaluation methods not only in the accuracy of detecting malicious nodes, but also in the tolerance of abnormal conditions.
Similar content being viewed by others
References
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1), 266–282.
He, D. J., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.
Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.
Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks”. IET Wireless Senors System, 2(3), 161–169.
Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.
Marzi, H., & Marzi, A. (2014). A security model for wireless sensor networks. In Proceedings of IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (pp. 64–69).
Sun, Y., Han, Z., & Ray Liu, K. J. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.
Geetha, V., & Chandrasekaran, K. (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), 173–183.
Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorial, 13(4), 562–583.
Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of IEEE symposium on security and privacy (pp. 164–173).
Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for internet of things. China Communications, 11(2), 148–156.
Ganeriwal, S., Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of ACM workshop security of ad hoc and sensor networks (pp. 66–67).
Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.
Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.
He, D., Chen, C., Chan, S., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.
Han, G., Jiang, J., Lei, L., & Guizani, M. (2015). An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447–2458.
Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 14(9), 2396–2407.
Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A security trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.
Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d–s evidence theory. Sensors, 11(2), 1345–1360.
Yang, K., Liu, S., & Li, X. (2015). A novel detection scheme based on D–S evidence theory in wireless sensor networks. In International conference on intelligent networking and collaborative systems (pp. 398–401).
Li, D. (2000). Uncertainty in knowledge representation. Engineering Science, 2(10), 73–79.
Li, D., & Du, Y. (2008). Artificial intelligence with uncertainty (pp. 107–150). Boca Raton: Chapman & Hall/CRC Press.
Li, D., Liu, C., & Gan, W. (2009). A new cognitive model: Cloud model. International Journal of Intelligent Systems, 24(3), 257–375.
Huang, H., & Wang, R. (2008). A subjective trust evaluation model based on membership cloud theory. Journal on Communications, 29(4), 13–19.
Cai, H., Li, Z., & Tian, J. (2011). A new trust evaluation model based on cloud theory in E-commerence environment. In Proceedings of 2011 international symposium on intelligence information processing and trusted computing (pp. 139–142).
Jin, B., Wang, Y., Liu, Z., & Xue, J. (2011). A trust model based on cloud model and bayesian network. Procedia Environmental Sciences, 11, 452–459.
Cai, S., Han, Q., Gao, Z., Yand, D., & Zhao, J. (2012). Research on cloud trust model for malicious node detection in wireless sensor network. Acta Electronica Sinica, 40(11), 2232–2238.
Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceeding of the 33rd annual Hawaii international conference on system sciences (pp. 3005–3014).
Acknowledgments
This paper is supported by National Natural Science Fund of China under Grant No. 51477138 and Network Computing and Security Technology of Shaanxi Key Laboratory under Grant No. 15JS078; and supported by Industrial Science and Technology Project of Shaanxi Province under Grant No. 2016GY-140 and Science Research Project of Department of Education Key Laboratory of Shaanxi Provincial under Grant No. 15JS078.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, T., Yan, L. & Yang, Y. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Netw 24, 777–797 (2018). https://doi.org/10.1007/s11276-016-1368-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-016-1368-y