A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution

Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2017-04, Vol.60 (4), p.56-66, Article 040305
Hauptverfasser: Fang, Weidong, Zhang, Wuxiong, Yang, Yang, Liu, Yang, Chen, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 66
container_issue 4
container_start_page 56
container_title Science China. Information sciences
container_volume 60
creator Fang, Weidong
Zhang, Wuxiong
Yang, Yang
Liu, Yang
Chen, Wei
description Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.
doi_str_mv 10.1007/s11432-016-9028-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918617076</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>671702830</cqvip_id><sourcerecordid>2918617076</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</originalsourceid><addsrcrecordid>eNp9kEtPAyEUhSdGExv1B7gjukYvMOWxrMZXYuJGE3eEYZgptWVaYEz891Lb6E423Nx7zj3wVdU5gSsCIK4TITWjGAjHCqjEcFBNiOQKE0XUYam5qLFg7P24OktpAeUwBlTISZVnKLrkl96FjHIcU0YrE0zvVttGsvNSoG6IqHWdC60PPTK98aHooluP2WQ_BJT9yuFPE79-5jkb-5FQY5JrUZne3L3OUOtTjr4Zt_rT6qgzy-TO9vdJ9XZ_93r7iJ9fHp5uZ8_YMskzdkIIy7isGyUbBgasEsZZy0BSPp1y2zLV1qZhkkwFONlB25muoTUVtbXKspPqcrd3HYfN6FLWi2GMoURqqgogIkDwoiI7lY1DStF1eh39qnxGE9BbvnrHVxe-estXQ_HQnScVbehd_Nv8n-liHzQfQr8pvt8kLspbqGTAvgHJYope</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918617076</pqid></control><display><type>article</type><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><source>SpringerLink Journals</source><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</creator><creatorcontrib>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</creatorcontrib><description>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-016-9028-0</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Beta分布 ; Computer Science ; Information Systems and Communication Service ; Nodes ; Probability distribution functions ; Reputations ; Research Paper ; Trend analysis ; Trustworthiness ; Windows (intervals) ; Wireless sensor networks ; 信任管理 ; 内部攻击 ; 动态调整 ; 弹性 ; 无线传感器网络 ; 时变 ; 时间变化</subject><ispartof>Science China. Information sciences, 2017-04, Vol.60 (4), p.56-66, Article 040305</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2017</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</citedby><cites>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-016-9028-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918617076?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,777,781,21369,27905,27906,33725,41469,42538,43786,51300,64364,64368,72218</link.rule.ids></links><search><creatorcontrib>Fang, Weidong</creatorcontrib><creatorcontrib>Zhang, Wuxiong</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Chen, Wei</creatorcontrib><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</description><subject>Beta分布</subject><subject>Computer Science</subject><subject>Information Systems and Communication Service</subject><subject>Nodes</subject><subject>Probability distribution functions</subject><subject>Reputations</subject><subject>Research Paper</subject><subject>Trend analysis</subject><subject>Trustworthiness</subject><subject>Windows (intervals)</subject><subject>Wireless sensor networks</subject><subject>信任管理</subject><subject>内部攻击</subject><subject>动态调整</subject><subject>弹性</subject><subject>无线传感器网络</subject><subject>时变</subject><subject>时间变化</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtPAyEUhSdGExv1B7gjukYvMOWxrMZXYuJGE3eEYZgptWVaYEz891Lb6E423Nx7zj3wVdU5gSsCIK4TITWjGAjHCqjEcFBNiOQKE0XUYam5qLFg7P24OktpAeUwBlTISZVnKLrkl96FjHIcU0YrE0zvVttGsvNSoG6IqHWdC60PPTK98aHooluP2WQ_BJT9yuFPE79-5jkb-5FQY5JrUZne3L3OUOtTjr4Zt_rT6qgzy-TO9vdJ9XZ_93r7iJ9fHp5uZ8_YMskzdkIIy7isGyUbBgasEsZZy0BSPp1y2zLV1qZhkkwFONlB25muoTUVtbXKspPqcrd3HYfN6FLWi2GMoURqqgogIkDwoiI7lY1DStF1eh39qnxGE9BbvnrHVxe-estXQ_HQnScVbehd_Nv8n-liHzQfQr8pvt8kLspbqGTAvgHJYope</recordid><startdate>20170401</startdate><enddate>20170401</enddate><creator>Fang, Weidong</creator><creator>Zhang, Wuxiong</creator><creator>Yang, Yang</creator><creator>Liu, Yang</creator><creator>Chen, Wei</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20170401</creationdate><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><author>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Beta分布</topic><topic>Computer Science</topic><topic>Information Systems and Communication Service</topic><topic>Nodes</topic><topic>Probability distribution functions</topic><topic>Reputations</topic><topic>Research Paper</topic><topic>Trend analysis</topic><topic>Trustworthiness</topic><topic>Windows (intervals)</topic><topic>Wireless sensor networks</topic><topic>信任管理</topic><topic>内部攻击</topic><topic>动态调整</topic><topic>弹性</topic><topic>无线传感器网络</topic><topic>时变</topic><topic>时间变化</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fang, Weidong</creatorcontrib><creatorcontrib>Zhang, Wuxiong</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Chen, Wei</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fang, Weidong</au><au>Zhang, Wuxiong</au><au>Yang, Yang</au><au>Liu, Yang</au><au>Chen, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2017-04-01</date><risdate>2017</risdate><volume>60</volume><issue>4</issue><spage>56</spage><epage>66</epage><pages>56-66</pages><artnum>040305</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-016-9028-0</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2017-04, Vol.60 (4), p.56-66, Article 040305
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_journals_2918617076
source SpringerLink Journals; ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central
subjects Beta分布
Computer Science
Information Systems and Communication Service
Nodes
Probability distribution functions
Reputations
Research Paper
Trend analysis
Trustworthiness
Windows (intervals)
Wireless sensor networks
信任管理
内部攻击
动态调整
弹性
无线传感器网络
时变
时间变化
title A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T17%3A39%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20resilient%20trust%20management%20scheme%20for%20defending%20against%20reputation%20time-varying%20attacks%20based%20on%20BETA%20distribution&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Fang,%20Weidong&rft.date=2017-04-01&rft.volume=60&rft.issue=4&rft.spage=56&rft.epage=66&rft.pages=56-66&rft.artnum=040305&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-016-9028-0&rft_dat=%3Cproquest_cross%3E2918617076%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918617076&rft_id=info:pmid/&rft_cqvip_id=671702830&rfr_iscdi=true