Abstract
In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.
Similar content being viewed by others
References
Medaglia, C. M., & Serbanati, A. (2010). An overview of privacy and security issues in the internet of things. In D. Giusto (Ed.), The internet of things: 20th tyrrhenian workshop on digital communications (pp. 389–395). New York: Springer.
He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Retrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.
Galuba, W., Papadimitratos, P., Poturalski, M., & Aberer, K. (2010). Castor: Scalable secure routing for ad hoc networks. In International conference on computer communications, IEEE, pp. 2829–2837.
Aivaloglou, E., & Gritzalis, S. (2010). Hybrid trust and reputation management for sensor networks. Wireless Networks, 16(5), 1493–1510.
Hodges, S., Taylor, S., Villar, N., Scott, J., Bial, D., & Fischer, P. T. (2013). Prototyping connected devices for the internet of things. Computer, 46(2), 26–34.
Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.
Siaterlis, C., & Maglaris, B. (2004). Towards multisensor data fusion for dos detection. In Proceedings of the ACM symposium on applied computing, ACM, pp. 439–446.
Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.
Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2009). A novel flexible trust management system for heterogeneous wireless sensor networks. In International symposium on autonomous decentralized systems, IEEE, pp. 1–6.
Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks. Journal of Software, 19(7), 1716–1730.
Hu, X., Wei, Q., & Tang, H. (2010). Model and simulation of creditability-based data aggregation for the internet of things. Chinese Journal of Scientific Instrument, 31(11), 2636–2640.
Xiang-Dong, H. U., Peng-Qin, Y. U., & Wei, Q. F. (2012). Detection of selective forwarding attack in the internet of things. Journal of Chongqing University of Posts & Telecommunications, 24(2), 148–152.
Reddy, Y., Durand, J., & Kafle, S. (2010). Detection of packet dropping in wireless sensor networks. In International conference on information technology: New generations, IEEE, pp. 879–884.
Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. In International colloquium on computing, communication, control, and management, IEEE, Vol. 3, pp. 109–113.
Man-Fu, M. A., & Zhang, L. (2013). Inter-domain trust model based on gateway of Iot. Computer Engineering & Design, 34(11), 3829–3834.
Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.
Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trUst management scheme for sensor networks security. In IEEE international conference on mobile adhoc and sensor systems, IEEE, pp. 437–446.
Liu, T., Xiong, Y., Huang, W., Qiwei, L. U., & Gong, X. (2013). Node behavior and identity-based trusted authentication in wireless sensor networks. Journal of Computer Applications, 33(7), 1842–1845.
Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. In Proceedings of world academy of science engineering & technolog, pp. 2070–3740.
Pissinou, N., & Crosby, G. V. (2007). Cluster-based reputation and trust for wireless sensor networks. In 4th IEEE consumer communications and networking conference, IEEE, pp. 604–608.
Chow, C. Y., Mokbel, M. F., & Leong, H. V. (2011). On efficient and scalable support of continuous queries in mobile peer-to-peer environments. IEEE Transactions on Mobile Computing, 10(10), 1473–1487.
Denko, M. K., Sun, T., & Woungang, I. (2011). Trust management in ubiquitous computing: A bayesian approach. Computer Communications, 34(3), 398–406.
Cabrerizo, F. J., Alonso, S., & Herreraviedma, E. (2009). A consensus model for group decision making problems with unbalanced fuzzy linguistic information. International Journal of Information Technology & Decision Making, 08(1), 109–131.
Chiclana, F., Mata, F., Martnez, L., Herreraviedma, E., & Alonso, S. (2008). Integration of a consistency control module within a consensus model. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 16(1), 35–53.
Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.
Momani, M., Challa, S., & Alhmouz, R. (2010). Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Networks, 5(7), 815–822.
Ji, S., Xue, Y., & Carin, L. (2008). Bayesian compressive sensing. IEEE Transactions on Signal Processing, 56(6), 2346–2356.
Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2008). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.
Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In IEEE 23rd international symposium on personal indoor and mobile radio communications, IEEE, pp. 18–23.
Acknowledgments
This work is supported in part by the Natural Science Foundation of Jiangsu Province (Grant No. BK20160294), the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant No. 14KJB510010), Changzhou Sci & Tech Program (Grant No. CJ20140058), Doctoral Scientific Research Foundation of Jiangsu University of Technology (Grant No. KYY13002), Science and Technology Project of Jiangsu-Prospective Joint Research Project (Grant No. BY2014038-09) and National Natural Science Foundation of China (Grant No. 61201248)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, Y., Jia, Z., Tao, W. et al. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wireless Pers Commun 93, 571–587 (2017). https://doi.org/10.1007/s11277-016-3802-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-016-3802-y