A lightweight trust management based on Bayesian and Entropy for wireless sensor networks

被引:45
作者
Che, Shenyun [1 ]
Feng, Renjian [1 ]
Liang, Xuan [1 ]
Wang, Xiao [1 ,2 ]
机构
[1] Beihang Univ, Sch Instrument Sci & Optoelect Engn, Beijing 100191, Peoples R China
[2] Sci & Technol Commun Informat Secur Control Lab, Jiaxing 314033, Peoples R China
基金
中国国家自然科学基金;
关键词
trust management; Bayesian; Entropy; confidence level; trust value; REPUTATION;
D O I
10.1002/sec.969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of wireless sensor networks, the issue of designing a reasonable trust management has attracted more and more research attention. Based on Bayesian and Entropy, this paper proposes a lightweight trust management for wireless sensor networks. First, the evaluated node's direct trust value is calculated by Bayesian and periodically updated according to the combination of effective history records and adaptive decay factor. We use effective history records rather than all the records to save nodes' memory, and the adaptive decay factor enhances the algorithm's accuracy and dynamic. Then, according to the confidence level of the direct trust value, we decide whether the direct trust is credible enough to be the integrated trust. This can reduce the energy computation and make the algorithm lightweight. Last, if the direct trust is not credible enough, the overall indirect trust value will be calculated. The Entropy Theory is adopted to distribute weights to different trust values, which can improve the problems caused by distributing weights subjectively and also enhance adaptability of the model. Simulation experiments are provided to assess the performance of the proposed trust management in terms of attack-defeat ability and energy consumption. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:168 / 175
页数:8
相关论文
共 20 条
[11]   Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks [J].
Misra, Sudip ;
Goswami, Sumit ;
Pathak, Gyan Prakash ;
Shah, Nirav .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02) :146-162
[12]   Reputation-based role assignment for role-based access control in wireless sensor networks [J].
Misra, Sudip ;
Vaish, Ankur .
COMPUTER COMMUNICATIONS, 2011, 34 (03) :281-294
[13]   Geographic server distribution model for key revocation [J].
Misra, Sudip ;
Goswami, Sumit ;
Pathak, Gyan Prakash ;
Shah, Nirav ;
Woungang, Isaac .
TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) :281-295
[14]   Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks [J].
Shaikh, Riaz Ahmed ;
Jameel, Hassan ;
d'Auriol, Brian J. ;
Lee, Heejo ;
Lee, Sungyoung ;
Song, Young-Jae .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (11) :1698-1712
[15]   Defense of trust management vulnerabilities in distributed networks [J].
Sun, Yan ;
Han, Zhu ;
Liu, K. J. Ray .
IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (02) :112-119
[16]   Fuzzy reputation-based trust model [J].
Tajeddine, Ayman ;
Kayssi, Ayman ;
Chehab, Ali ;
Artail, Hassan .
APPLIED SOFT COMPUTING, 2011, 11 (01) :345-355
[17]  
Voliotis S, 2009, 2009 INT S AUT DEC S, P1
[18]   Evaluation approach of subjective trust based on cloud model [J].
Wang S.-X. ;
Zhang L. ;
Li H.-S. .
Ruan Jian Xue Bao/Journal of Software, 2010, 21 (06) :1341-1352
[19]   SensorTrust: A resilient trust model for wireless sensing systems [J].
Zhan, Guoxing ;
Shi, Weisong ;
Deng, Julia .
PERVASIVE AND MOBILE COMPUTING, 2011, 7 (04) :509-522
[20]   Detecting node replication attacks in wireless sensor networks: A survey [J].
Zhu, Wen Tao ;
Zhou, Jianying ;
Deng, Robert H. ;
Bao, Feng .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :1022-1034