An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications

被引:135
作者
Duan, Junqi [1 ]
Gao, Deyun [1 ]
Yang, Dong [1 ]
Foh, Chuan Heng [2 ]
Chen, Hsiao-Hwa [3 ]
机构
[1] Beijing Jiaotong Univ, Natl Engn Lab Next Generat Internet Interconnect, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[2] Univ Surrey, Dept Elect Engn, Ctr Commun Syst Res, Surrey GU1 7XH, England
[3] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
来源
IEEE INTERNET OF THINGS JOURNAL | 2014年 / 1卷 / 01期
关键词
Energy awareness; game theory; Internet of Things (IoT); security; trust evaluation; wireless sensor network (WSN); ACCESS-CONTROL; AUTHENTICATION; MODEL;
D O I
10.1109/JIOT.2014.2314132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust evaluation plays an important role in securing wireless sensor networks (WSNs), which is one of the most popular network technologies for the Internet of Things (IoT). The efficiency of the trust evaluation process is largely governed by the trust derivation, as it dominates the overhead in the process, and performance of WSNs is particularly sensitive to overhead due to the limited bandwidth and power. This paper proposes an energy-aware trust derivation scheme using game theoretic approach, which manages overhead while maintaining adequate security of WSNs. A risk strategy model is first presented to stimulate WSN nodes' cooperation. Then, a game theoretic approach is applied to the trust derivation process to reduce the overhead of the process. We show with the help of simulations that our trust derivation scheme can achieve both intended security and high efficiency suitable for WSN-based IoT networks.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 44 条
[1]  
Abusalah L., 2006, In Proceedings of the 49th IEEE Global Telecommunications Conference, GLOBECOM '06, P1
[2]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[3]  
[Anonymous], 2011, 2011 IEEE INT C COMM
[4]  
[Anonymous], 1987, Genetic Algorithms and Simulated Annealing
[5]  
Chakeres I.D., 2002, ACM SIGMOBILE MOBILE, V6, P100, DOI 10.1145/581291.581309
[6]   Cryptographic Versus Trust-based Methods for MANET Routing Security [J].
Cordasco, Jared ;
Wetzel, Susanne .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) :131-140
[7]   Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix [J].
Dai, Hangyang ;
Xu, Hongbing .
IEEE SENSORS JOURNAL, 2010, 10 (08) :1399-1409
[8]   Two-Factor User Authentication in Wireless Sensor Networks [J].
Das, Manik Lal .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) :1086-1090
[9]  
Deng Hongwei, 2009, P IEEE GLOB TEL C GL, P1
[10]  
Denko M. K., 2009, P IEEE GLOB TEL C 20, P1