A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution

Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2017-04, Vol.60 (4), p.56-66, Article 040305
Hauptverfasser: Fang, Weidong, Zhang, Wuxiong, Yang, Yang, Liu, Yang, Chen, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
ISSN:1674-733X
1869-1919
DOI:10.1007/s11432-016-9028-0