Cargando…

A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory

For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this...

Descripción completa

Detalles Bibliográficos
Autores principales: Feng, Renjian, Xu, Xiaofeng, Zhou, Xiang, Wan, Jiangwen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Molecular Diversity Preservation International (MDPI) 2011
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274036/
https://www.ncbi.nlm.nih.gov/pubmed/22319355
http://dx.doi.org/10.3390/s110201345
_version_ 1782222996109262848
author Feng, Renjian
Xu, Xiaofeng
Zhou, Xiang
Wan, Jiangwen
author_facet Feng, Renjian
Xu, Xiaofeng
Zhou, Xiang
Wan, Jiangwen
author_sort Feng, Renjian
collection PubMed
description For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that ‘hard to acquire and easy to lose’. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation.
format Online
Article
Text
id pubmed-3274036
institution National Center for Biotechnology Information
language English
publishDate 2011
publisher Molecular Diversity Preservation International (MDPI)
record_format MEDLINE/PubMed
spelling pubmed-32740362012-02-08 A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory Feng, Renjian Xu, Xiaofeng Zhou, Xiang Wan, Jiangwen Sensors (Basel) Article For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that ‘hard to acquire and easy to lose’. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation. Molecular Diversity Preservation International (MDPI) 2011-01-25 /pmc/articles/PMC3274036/ /pubmed/22319355 http://dx.doi.org/10.3390/s110201345 Text en © 2011 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
spellingShingle Article
Feng, Renjian
Xu, Xiaofeng
Zhou, Xiang
Wan, Jiangwen
A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title_full A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title_fullStr A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title_full_unstemmed A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title_short A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
title_sort trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274036/
https://www.ncbi.nlm.nih.gov/pubmed/22319355
http://dx.doi.org/10.3390/s110201345
work_keys_str_mv AT fengrenjian atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT xuxiaofeng atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT zhouxiang atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT wanjiangwen atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT fengrenjian trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT xuxiaofeng trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT zhouxiang trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory
AT wanjiangwen trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory