A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network

In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional repu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2021-03, Vol.117 (2), p.1143-1162
Hauptverfasser: Teng, Zhijun, Pang, Baohe, Sun, Mingyang, Xie, Luying, Guo, Liwen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1162
container_issue 2
container_start_page 1143
container_title Wireless personal communications
container_volume 117
creator Teng, Zhijun
Pang, Baohe
Sun, Mingyang
Xie, Luying
Guo, Liwen
description In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.
doi_str_mv 10.1007/s11277-020-07915-w
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2496306189</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2496306189</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</originalsourceid><addsrcrecordid>eNp9kMtKAzEUQIMoWB8_4CrgejSP6WSyLKU-oLZCFd2FNL3RaJvUJHWoX-_UEdy5undxzr1wEDqj5IISIi4TpUyIgjBSECFpv2j2UI_2BStqXj7vox6RTBYVo-wQHaX0RkirSdZDfoDv9NIZFzYJT8IC8O0CfHbWGZ1d8HiWo87wssWNy6945D9dDH7VInqJ73XUK8gQE56us1u5r85xHj-5CEtICc_ApxDxBHIT4vsJOrB6meD0dx6jx6vRw_CmGE-vb4eDcWE4lbmoGRfEWJhbQ6o5Y-1WspJrBhqErWHODTfSGF5JO-e2T8saBCOi0kxqKyQ_Rufd3XUMHxtIWb2FTfTtS8VKWXFS0XpHsY4yMaQUwap1dCsdt4oSteuquq6q7ap-uqqmlXgnpRb2LxD_Tv9jfQN0Qn5w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2496306189</pqid></control><display><type>article</type><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><source>Springer Nature - Complete Springer Journals</source><creator>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</creator><creatorcontrib>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</creatorcontrib><description>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-07915-w</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Communications Engineering ; Computer Communication Networks ; Eavesdropping ; Engineering ; Mathematical models ; Networks ; Nodes ; Optimization ; Parameter identification ; Reputations ; Sensors ; Signal,Image and Speech Processing ; Wireless sensor networks</subject><ispartof>Wireless personal communications, 2021-03, Vol.117 (2), p.1143-1162</ispartof><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020</rights><rights>Springer Science+Business Media, LLC, part of Springer Nature 2020.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</citedby><cites>FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-07915-w$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-07915-w$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Teng, Zhijun</creatorcontrib><creatorcontrib>Pang, Baohe</creatorcontrib><creatorcontrib>Sun, Mingyang</creatorcontrib><creatorcontrib>Xie, Luying</creatorcontrib><creatorcontrib>Guo, Liwen</creatorcontrib><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</description><subject>Algorithms</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Eavesdropping</subject><subject>Engineering</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Parameter identification</subject><subject>Reputations</subject><subject>Sensors</subject><subject>Signal,Image and Speech Processing</subject><subject>Wireless sensor networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kMtKAzEUQIMoWB8_4CrgejSP6WSyLKU-oLZCFd2FNL3RaJvUJHWoX-_UEdy5undxzr1wEDqj5IISIi4TpUyIgjBSECFpv2j2UI_2BStqXj7vox6RTBYVo-wQHaX0RkirSdZDfoDv9NIZFzYJT8IC8O0CfHbWGZ1d8HiWo87wssWNy6945D9dDH7VInqJ73XUK8gQE56us1u5r85xHj-5CEtICc_ApxDxBHIT4vsJOrB6meD0dx6jx6vRw_CmGE-vb4eDcWE4lbmoGRfEWJhbQ6o5Y-1WspJrBhqErWHODTfSGF5JO-e2T8saBCOi0kxqKyQ_Rufd3XUMHxtIWb2FTfTtS8VKWXFS0XpHsY4yMaQUwap1dCsdt4oSteuquq6q7ap-uqqmlXgnpRb2LxD_Tv9jfQN0Qn5w</recordid><startdate>20210301</startdate><enddate>20210301</enddate><creator>Teng, Zhijun</creator><creator>Pang, Baohe</creator><creator>Sun, Mingyang</creator><creator>Xie, Luying</creator><creator>Guo, Liwen</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210301</creationdate><title>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</title><author>Teng, Zhijun ; Pang, Baohe ; Sun, Mingyang ; Xie, Luying ; Guo, Liwen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-82370cfebfc06b22feb4243a2eae7f8eb3c3c9cc369fb3f5148e72076a29af793</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Eavesdropping</topic><topic>Engineering</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Parameter identification</topic><topic>Reputations</topic><topic>Sensors</topic><topic>Signal,Image and Speech Processing</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Teng, Zhijun</creatorcontrib><creatorcontrib>Pang, Baohe</creatorcontrib><creatorcontrib>Sun, Mingyang</creatorcontrib><creatorcontrib>Xie, Luying</creatorcontrib><creatorcontrib>Guo, Liwen</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Teng, Zhijun</au><au>Pang, Baohe</au><au>Sun, Mingyang</au><au>Xie, Luying</au><au>Guo, Liwen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-03-01</date><risdate>2021</risdate><volume>117</volume><issue>2</issue><spage>1143</spage><epage>1162</epage><pages>1143-1162</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>In the wireless sensor network (WSN), nodes show a low forwarding rate under a poor-quality links environment and a resource-constrained state. The malicious nodes imitate this forwarding behavior, which can selectively forward date, eavesdropping, or discarding important dates. The traditional reputation model is challenging to identify with this kind of sub-attack nodes. To address these problems, a malicious node identification strategy based on time reputation model and environmental parameters optimization (TRM-EPO) is proposed in the WSN. First of all, the comprehensive reputation is calculated according to the direct reputation and the recommended indirect reputation. The environmental parameters matrix is based on nodes’ running state, taking into account nodes’ energy, data volume, number of adjacent nodes, and node sparsity. Besides, according to the environmental parameters matrix, and the recorded comprehensive reputation matrix, the next cycle’s trust can be predicted. Finally, a similarity of the actual reputation and predicted trust matrix is proposed to compare with an adaptive threshold to identify malicious nodes. The experimental results demonstrate that the proposed strategy improves sensor nodes’ security and reliability in a complex environment. Moreover, compared to comparison algorithms, the TRM-EPO improves the recognition rate above 1% and reduces the false-positive rate by more than 1%.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-07915-w</doi><tpages>20</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2021-03, Vol.117 (2), p.1143-1162
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2496306189
source Springer Nature - Complete Springer Journals
subjects Algorithms
Communications Engineering
Computer Communication Networks
Eavesdropping
Engineering
Mathematical models
Networks
Nodes
Optimization
Parameter identification
Reputations
Sensors
Signal,Image and Speech Processing
Wireless sensor networks
title A Malicious Node Identification Strategy with Environmental Parameters Optimization in Wireless Sensor Network
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T08%3A13%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Malicious%20Node%20Identification%20Strategy%20with%20Environmental%20Parameters%20Optimization%20in%20Wireless%20Sensor%20Network&rft.jtitle=Wireless%20personal%20communications&rft.au=Teng,%20Zhijun&rft.date=2021-03-01&rft.volume=117&rft.issue=2&rft.spage=1143&rft.epage=1162&rft.pages=1143-1162&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-07915-w&rft_dat=%3Cproquest_cross%3E2496306189%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2496306189&rft_id=info:pmid/&rfr_iscdi=true