Cargando…
A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks †
In tactical wireless sensor networks, tactical sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the sa...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7070555/ https://www.ncbi.nlm.nih.gov/pubmed/32085600 http://dx.doi.org/10.3390/s20041108 |
_version_ | 1783506002139676672 |
---|---|
author | Lim, Jihun Keum, Dooho Ko, Young-Bae |
author_facet | Lim, Jihun Keum, Dooho Ko, Young-Bae |
author_sort | Lim, Jihun |
collection | PubMed |
description | In tactical wireless sensor networks, tactical sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and carry out reconnaissance of enemies. These tactical sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose a stepwise and hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based network. Sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the results showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption. |
format | Online Article Text |
id | pubmed-7070555 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-70705552020-03-19 A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † Lim, Jihun Keum, Dooho Ko, Young-Bae Sensors (Basel) Article In tactical wireless sensor networks, tactical sensors are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers. The main function of these networks is to use sensors to measure radiation, nuclear, and biochemical values for the safety of allies and also to monitor and carry out reconnaissance of enemies. These tactical sensors require a network traffic flow that sends various types of measured information to the gateway, which needs high reliability. To ensure reliability, it must be able to detect malicious nodes that perform packet-dropping attacks to disrupt the network traffic flow, and energy-constrained sensors require energy-efficient methods to detect them. Therefore, in this paper, we propose a stepwise and hybrid trust evaluation scheme for locating malicious nodes that perform packet-dropping attacks in a tree-based network. Sensors send a query to the gateway by observing the traffic patterns of their child nodes. Moreover, depending on the situation, the gateway detects malicious nodes by choosing between gateway-assisted trust evaluation and gateway-independent trust evaluation. We implemented and evaluated the proposed scheme with the OPNET simulator, and the results showed that a higher packet delivery ratio can be achieved with significantly lower energy consumption. MDPI 2020-02-18 /pmc/articles/PMC7070555/ /pubmed/32085600 http://dx.doi.org/10.3390/s20041108 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lim, Jihun Keum, Dooho Ko, Young-Bae A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title | A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title_full | A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title_fullStr | A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title_full_unstemmed | A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title_short | A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks † |
title_sort | stepwise and hybrid trust evaluation scheme for tactical wireless sensor networks † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7070555/ https://www.ncbi.nlm.nih.gov/pubmed/32085600 http://dx.doi.org/10.3390/s20041108 |
work_keys_str_mv | AT limjihun astepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks AT keumdooho astepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks AT koyoungbae astepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks AT limjihun stepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks AT keumdooho stepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks AT koyoungbae stepwiseandhybridtrustevaluationschemefortacticalwirelesssensornetworks |