Cargando…
A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Molecular Diversity Preservation International (MDPI)
2011
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274036/ https://www.ncbi.nlm.nih.gov/pubmed/22319355 http://dx.doi.org/10.3390/s110201345 |
_version_ | 1782222996109262848 |
---|---|
author | Feng, Renjian Xu, Xiaofeng Zhou, Xiang Wan, Jiangwen |
author_facet | Feng, Renjian Xu, Xiaofeng Zhou, Xiang Wan, Jiangwen |
author_sort | Feng, Renjian |
collection | PubMed |
description | For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that ‘hard to acquire and easy to lose’. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation. |
format | Online Article Text |
id | pubmed-3274036 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2011 |
publisher | Molecular Diversity Preservation International (MDPI) |
record_format | MEDLINE/PubMed |
spelling | pubmed-32740362012-02-08 A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory Feng, Renjian Xu, Xiaofeng Zhou, Xiang Wan, Jiangwen Sensors (Basel) Article For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes behavioral strategies and modified evidence theory. According to the behaviors of sensor nodes, a variety of trust factors and coefficients related to the network application are established to obtain direct and indirect trust values through calculating weighted average of trust factors. Meanwhile, the fuzzy set method is applied to form the basic input vector of evidence. On this basis, the evidence difference is calculated between the indirect and direct trust values, which link the revised D-S evidence combination rule to finally synthesize integrated trust value of nodes. The simulation results show that NBBTE can effectively identify malicious nodes and reflects the characteristic of trust value that ‘hard to acquire and easy to lose’. Furthermore, it is obvious that the proposed scheme has an outstanding advantage in terms of illustrating the real contribution of different nodes to trust evaluation. Molecular Diversity Preservation International (MDPI) 2011-01-25 /pmc/articles/PMC3274036/ /pubmed/22319355 http://dx.doi.org/10.3390/s110201345 Text en © 2011 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/). |
spellingShingle | Article Feng, Renjian Xu, Xiaofeng Zhou, Xiang Wan, Jiangwen A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title | A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title_full | A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title_fullStr | A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title_full_unstemmed | A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title_short | A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory |
title_sort | trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3274036/ https://www.ncbi.nlm.nih.gov/pubmed/22319355 http://dx.doi.org/10.3390/s110201345 |
work_keys_str_mv | AT fengrenjian atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT xuxiaofeng atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT zhouxiang atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT wanjiangwen atrustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT fengrenjian trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT xuxiaofeng trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT zhouxiang trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory AT wanjiangwen trustevaluationalgorithmforwirelesssensornetworksbasedonnodebehaviorsanddsevidencetheory |