A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network
In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional repu...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2021-03, Vol.117 (2), p.1143-1162 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1162 |
---|---|
container_issue | 2 |
container_start_page | 1143 |
container_title | Wireless personal communications |
container_volume | 117 |
creator | Teng, Zhijun Pang, Baohe Sun, Mingyang Xie, Luying Guo, Liwen |
description | In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%. |
doi_str_mv | 10.1007/s11277-020-07915-w |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2496306189</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2496306189</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</originalsourceid><addsrcrecordid>eNp9kMtKAzEUQIMoWB8_4CrgejSP6WSyLKU-oLZCFd2FNL3RaJvUJHWoX-_UEdy5undxzr1wEDqj5IISIi4TpUyIgjBSECFpv2j2UI_2BStqXj7vox6RTBYVo-wQHaX0RkirSdZDfoDv9NIZFzYJT8IC8O0CfHbWGZ1d8HiWo87wssWNy6945D9dDH7VInqJ73XUK8gQE56us1u5r85xHj-5CEtICc_ApxDxBHIT4vsJOrB6meD0dx6jx6vRw_CmGE-vb4eDcWE4lbmoGRfEWJhbQ6o5Y-1WspJrBhqErWHODTfSGF5JO-e2T8saBCOi0kxqKyQ_Rufd3XUMHxtIWb2FTfTtS8VKWXFS0XpHsY4yMaQUwap1dCsdt4oSteuquq6q7ap-uqqmlXgnpRb2LxD_Tv9jfQN0Qn5w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2496306189</pqid></control><display><type>article</type><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><source>Springer Nature - Complete Springer Journals</source><creator>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</creator><creatorcontrib>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</creatorcontrib><description>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-07915-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Eavesdropping ; Engineering ; Mathematical models ; Networks ; Nodes ; Optimization ; Parameter identification ; Reputations ; Sensors ; Signal,Image and Speech Processing ; Wireless sensor networks</subject><ispartof>Wireless personal communications, 2021-03, Vol.117 (2), p.1143-1162</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</citedby><cites>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-07915-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-07915-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Teng, Zhijun</creatorcontrib><creatorcontrib>Pang, Baohe</creatorcontrib><creatorcontrib>Sun, Mingyang</creatorcontrib><creatorcontrib>Xie, Luying</creatorcontrib><creatorcontrib>Guo, Liwen</creatorcontrib><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Eavesdropping</subject><subject>Engineering</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Parameter identification</subject><subject>Reputations</subject><subject>Sensors</subject><subject>Signal,Image and Speech Processing</subject><subject>Wireless sensor networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtKAzEUQIMoWB8_4CrgejSP6WSyLKU-oLZCFd2FNL3RaJvUJHWoX-_UEdy5undxzr1wEDqj5IISIi4TpUyIgjBSECFpv2j2UI_2BStqXj7vox6RTBYVo-wQHaX0RkirSdZDfoDv9NIZFzYJT8IC8O0CfHbWGZ1d8HiWo87wssWNy6945D9dDH7VInqJ73XUK8gQE56us1u5r85xHj-5CEtICc_ApxDxBHIT4vsJOrB6meD0dx6jx6vRw_CmGE-vb4eDcWE4lbmoGRfEWJhbQ6o5Y-1WspJrBhqErWHODTfSGF5JO-e2T8saBCOi0kxqKyQ_Rufd3XUMHxtIWb2FTfTtS8VKWXFS0XpHsY4yMaQUwap1dCsdt4oSteuquq6q7ap-uqqmlXgnpRb2LxD_Tv9jfQN0Qn5w</recordid><startdate>20210301</startdate><enddate>20210301</enddate><creator>Teng, Zhijun</creator><creator>Pang, Baohe</creator><creator>Sun, Mingyang</creator><creator>Xie, Luying</creator><creator>Guo, Liwen</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210301</creationdate><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><author>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Eavesdropping</topic><topic>Engineering</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Parameter identification</topic><topic>Reputations</topic><topic>Sensors</topic><topic>Signal,Image and Speech Processing</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Teng, Zhijun</creatorcontrib><creatorcontrib>Pang, Baohe</creatorcontrib><creatorcontrib>Sun, Mingyang</creatorcontrib><creatorcontrib>Xie, Luying</creatorcontrib><creatorcontrib>Guo, Liwen</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Teng, Zhijun</au><au>Pang, Baohe</au><au>Sun, Mingyang</au><au>Xie, Luying</au><au>Guo, Liwen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-03-01</date><risdate>2021</risdate><volume>117</volume><issue>2</issue><spage>1143</spage><epage>1162</epage><pages>1143-1162</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-07915-w</doi><tpages>20</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2021-03, Vol.117 (2), p.1143-1162 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2496306189 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Communications Engineering Computer Communication Networks Eavesdropping Engineering Mathematical models Networks Nodes Optimization Parameter identification Reputations Sensors Signal,Image and Speech Processing Wireless sensor networks |
title | A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T08%3A13%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Malicious%20Node%20Identification%20Strategy%20with%20Environmental%20Parameters%20Optimization%20in%20Wireless%20Sensor%20Network&rft.jtitle=Wireless%20personal%20communications&rft.au=Teng,%20Zhijun&rft.date=2021-03-01&rft.volume=117&rft.issue=2&rft.spage=1143&rft.epage=1162&rft.pages=1143-1162&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-07915-w&rft_dat=%3Cproquest_cross%3E2496306189%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2496306189&rft_id=info:pmid/&rfr_iscdi=true |