A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputati...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2017-04, Vol.60 (4), p.56-66, Article 040305 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 66 |
---|---|
container_issue | 4 |
container_start_page | 56 |
container_title | Science China. Information sciences |
container_volume | 60 |
creator | Fang, Weidong Zhang, Wuxiong Yang, Yang Liu, Yang Chen, Wei |
description | Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement. |
doi_str_mv | 10.1007/s11432-016-9028-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918617076</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>671702830</cqvip_id><sourcerecordid>2918617076</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</originalsourceid><addsrcrecordid>eNp9kEtPAyEUhSdGExv1B7gjukYvMOWxrMZXYuJGE3eEYZgptWVaYEz891Lb6E423Nx7zj3wVdU5gSsCIK4TITWjGAjHCqjEcFBNiOQKE0XUYam5qLFg7P24OktpAeUwBlTISZVnKLrkl96FjHIcU0YrE0zvVttGsvNSoG6IqHWdC60PPTK98aHooluP2WQ_BJT9yuFPE79-5jkb-5FQY5JrUZne3L3OUOtTjr4Zt_rT6qgzy-TO9vdJ9XZ_93r7iJ9fHp5uZ8_YMskzdkIIy7isGyUbBgasEsZZy0BSPp1y2zLV1qZhkkwFONlB25muoTUVtbXKspPqcrd3HYfN6FLWi2GMoURqqgogIkDwoiI7lY1DStF1eh39qnxGE9BbvnrHVxe-estXQ_HQnScVbehd_Nv8n-liHzQfQr8pvt8kLspbqGTAvgHJYope</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918617076</pqid></control><display><type>article</type><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><source>SpringerLink Journals</source><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</creator><creatorcontrib>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</creatorcontrib><description>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-016-9028-0</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Beta分布 ; Computer Science ; Information Systems and Communication Service ; Nodes ; Probability distribution functions ; Reputations ; Research Paper ; Trend analysis ; Trustworthiness ; Windows (intervals) ; Wireless sensor networks ; 信任管理 ; 内部攻击 ; 动态调整 ; 弹性 ; 无线传感器网络 ; 时变 ; 时间变化</subject><ispartof>Science China. Information sciences, 2017-04, Vol.60 (4), p.56-66, Article 040305</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2017</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</citedby><cites>FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-016-9028-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918617076?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,777,781,21369,27905,27906,33725,41469,42538,43786,51300,64364,64368,72218</link.rule.ids></links><search><creatorcontrib>Fang, Weidong</creatorcontrib><creatorcontrib>Zhang, Wuxiong</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Chen, Wei</creatorcontrib><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</description><subject>Beta分布</subject><subject>Computer Science</subject><subject>Information Systems and Communication Service</subject><subject>Nodes</subject><subject>Probability distribution functions</subject><subject>Reputations</subject><subject>Research Paper</subject><subject>Trend analysis</subject><subject>Trustworthiness</subject><subject>Windows (intervals)</subject><subject>Wireless sensor networks</subject><subject>信任管理</subject><subject>内部攻击</subject><subject>动态调整</subject><subject>弹性</subject><subject>无线传感器网络</subject><subject>时变</subject><subject>时间变化</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kEtPAyEUhSdGExv1B7gjukYvMOWxrMZXYuJGE3eEYZgptWVaYEz891Lb6E423Nx7zj3wVdU5gSsCIK4TITWjGAjHCqjEcFBNiOQKE0XUYam5qLFg7P24OktpAeUwBlTISZVnKLrkl96FjHIcU0YrE0zvVttGsvNSoG6IqHWdC60PPTK98aHooluP2WQ_BJT9yuFPE79-5jkb-5FQY5JrUZne3L3OUOtTjr4Zt_rT6qgzy-TO9vdJ9XZ_93r7iJ9fHp5uZ8_YMskzdkIIy7isGyUbBgasEsZZy0BSPp1y2zLV1qZhkkwFONlB25muoTUVtbXKspPqcrd3HYfN6FLWi2GMoURqqgogIkDwoiI7lY1DStF1eh39qnxGE9BbvnrHVxe-estXQ_HQnScVbehd_Nv8n-liHzQfQr8pvt8kLspbqGTAvgHJYope</recordid><startdate>20170401</startdate><enddate>20170401</enddate><creator>Fang, Weidong</creator><creator>Zhang, Wuxiong</creator><creator>Yang, Yang</creator><creator>Liu, Yang</creator><creator>Chen, Wei</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20170401</creationdate><title>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</title><author>Fang, Weidong ; Zhang, Wuxiong ; Yang, Yang ; Liu, Yang ; Chen, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-e777c3684b98b30a0c97aecc30826556cd39d4ab381570e8f0dfafb24274cc9c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Beta分布</topic><topic>Computer Science</topic><topic>Information Systems and Communication Service</topic><topic>Nodes</topic><topic>Probability distribution functions</topic><topic>Reputations</topic><topic>Research Paper</topic><topic>Trend analysis</topic><topic>Trustworthiness</topic><topic>Windows (intervals)</topic><topic>Wireless sensor networks</topic><topic>信任管理</topic><topic>内部攻击</topic><topic>动态调整</topic><topic>弹性</topic><topic>无线传感器网络</topic><topic>时变</topic><topic>时间变化</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Fang, Weidong</creatorcontrib><creatorcontrib>Zhang, Wuxiong</creatorcontrib><creatorcontrib>Yang, Yang</creatorcontrib><creatorcontrib>Liu, Yang</creatorcontrib><creatorcontrib>Chen, Wei</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Fang, Weidong</au><au>Zhang, Wuxiong</au><au>Yang, Yang</au><au>Liu, Yang</au><au>Chen, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2017-04-01</date><risdate>2017</risdate><volume>60</volume><issue>4</issue><spage>56</spage><epage>66</epage><pages>56-66</pages><artnum>040305</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(WSN). The reputation time-varying(RTV) attacks are internal attacks. In the reputation timevarying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Timewindow-based Resilient Trust Management Scheme(TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor Fc and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-016-9028-0</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2017-04, Vol.60 (4), p.56-66, Article 040305 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918617076 |
source | SpringerLink Journals; ProQuest Central UK/Ireland; Alma/SFX Local Collection; ProQuest Central |
subjects | Beta分布 Computer Science Information Systems and Communication Service Nodes Probability distribution functions Reputations Research Paper Trend analysis Trustworthiness Windows (intervals) Wireless sensor networks 信任管理 内部攻击 动态调整 弹性 无线传感器网络 时变 时间变化 |
title | A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T17%3A39%3A02IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20resilient%20trust%20management%20scheme%20for%20defending%20against%20reputation%20time-varying%20attacks%20based%20on%20BETA%20distribution&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Fang,%20Weidong&rft.date=2017-04-01&rft.volume=60&rft.issue=4&rft.spage=56&rft.epage=66&rft.pages=56-66&rft.artnum=040305&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-016-9028-0&rft_dat=%3Cproquest_cross%3E2918617076%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918617076&rft_id=info:pmid/&rft_cqvip_id=671702830&rfr_iscdi=true |