Abstract
With the development of Internet technology, social network has become an important application in the network life. However, due to the rapid increase in the number of users, the influx of a variety of bad information is brought up as well as the existence of malicious users. Therefore, it is emergent to design a valid management scheme for user’s authentication to ensure the normal operation of social networks. Node trust evaluation is an effective method to deal with typical network attacks in wireless sensor networks. In order to solve the problem of quantification and uncertainty of trust, a novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection is proposed in this paper. Firstly, by taking into account spatiotemporal correlation of the data collected by sensor nodes in adjacent area, the trust degree can be estimated. Secondly, according to the D–S theory, the trust model is established to count the number of interactive behavior of trust, distrust or uncertainty, further to evaluate the direct trust value and indirect trust value. Then, a flexible synthesis method is adopted to calculate the overall trust to identify the malicious nodes. The simulation results show that the proposed scheme has obvious advantages over the traditional methods in the identification of malicious node and data fusion accuracy, and can obtain good scalability.









Similar content being viewed by others
References
Zhou Y, Fang Y, Zhang Y (2008) Securing wireless sensor networks: a survey. Commun Surv Tutor IEEE 10(3):6–28
Simplício MA, Barreto PSLM, Margi CB et al (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54(15):2591–2612
Tague P, Poovendran R (2008) Modeling node capture attacks in wireless sensor networks. In: Proceedings of 46th Annual Allerton Conference on Communication, Control and Computing, pp 1221–1224
Conti M, Di Pietro R, Mancini L V et al (2008) Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of ACM WiSec, pp 214–219
Shim KA (2012) Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Tech 61:1874–1883
Bonaci T, Bushnell L, Poovendran R (2010) Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of the IEEE Conference on Decision and Control (CDC), pp 6765–6772
Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(12):2413–2427
Bilge L, Strufe T, Balzarotti D et al (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: World Wide Web Conference, pp 108–117
Sen J, Chowdhury PR, Senfupta I (2007) A distributed trust establishment scheme for mobile ad hoc networks. In: Proceedings of International Conference on Computing: Theory and Applications, pp 51–58
Ozdemir S (2008) Functional reputation based data aggregation for wireless sensor networks. In: Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Avignon, France, pp 592–597
Raha A, Naskar MK, Chakraborty A et al (2012) A novel indirect trust-based link state routing scheme using a robust route trust method for wireless sensor networks. In: Proceedings of International Conference on Mobility and Security. Istanbul, Turkey, pp 1–5
Ganeriwal S, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor networks. Washington, DC, pp 66–77
Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):1–37
Rowaihy H, Enck W, McDaniel P et al (2005) Limiting Sybil attacks in structured peer-to-peer networks. In: Proceedings of IEEE Infocom Mini-Symposium. IEEE Press, Washington, DC, USA, pp 1201–1206
Lesniewski-Lass C, Kaashoek MF (2010) Whanau: a Sybil-proof distributed hash table. In: Proceedings of 7th USENIX Symposium on Network Design and Implementation. ACMSIGCOMM Computer Communication Review, Boston, USA, pp 3–17
Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of 2010 Annual Computer Security Applications Conference, Austin, Texas USA, pp 210–218
Chu Z, Gianvecchio S, Wang H et al (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of 2010 Annual Computer Security Applications Conference, Austin, Texas USA, pp 23–29
Tomasin S (2011) Consensus-based detection of malicious nodes in cooperative wireless networks. IEEE Commun Lett 15(4):404–406
Pires WR, de Paula Figueiredo TH, Wong HC et al (2004) Malicious node detection in wireless sensor networks. In: Proceedings of the 18th International Parallel and Distributed Processing Sumposium. IEEE, Brazil, pp 212–216
Curiac DI, Volosencu C, Doboli A et al (2007) Discovery of malicious nodes in wireless sensor networks using neural predictor. WSEAS Trans Comput Res 2(1):38–43
Curiac DI, Banias O, Dragan F et al (2007) Malicious node detection in wireless sensor networks using an autoregression technique. In: Proceedings of the Third International Conference on Networking and Services (IC-NS’07). Athens, pp 83–88
Hai TH, Huh EN (2008) Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Proceedings of the Seventh IEEE International Symposium on Network Computing and Applications, pp 325–331
Atakli IM, Hu H, Chen Y et al (2008) Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the International Symposium on Simulation of Systems Security. Spring Sim, San Diego, CA, USA, pp 836–843
Singh M, Mehta G, Vaid C et al (2012) Detection of malicious node in wireless sensor network based on data mining. In: Proceedings of International Conference on Computing Sciences. IEEE, Phagwara, pp 291–294
Denko MK, Sun T, Woungang I (2011) Trust management in ubiquitous computing: a Bayesian approach. Comput Commun 34(3):398–406
Iltaf N, Ghafoor A, Zia U (2013) A mechanism for detecting dishonest recommendation in indirect trust computation. EURASIP J Wirel Commun Netw 1:1–13
Wang X, Liu L, Su J (2012) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5(1):131–143
Li X, Zhou F, Du J (2013) LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935
Liu Y, Xiong N, Zhao Y et al (2010) Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun 4(7):810–816
Bhat P, Reddy KS (2015) Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in wireless sensor networks. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Aluva, India, August 10–13, pp 954–958
Shu W, Ding L, Wang S (2011) An efficient heuristic scheduling algorithm for optimal job allocation in computational grids. ICIC Express Lett 5(4):1045–1050
Huang W, Oh SK, Guo Z et al (2013) A space search optimization algorithm with accelerated convergence strategies. Appl Soft Comput 13(12):4659–4675
Jabeen F, Nawaz S, Tanveer S et al (2012) Spatio-temporal query processing over sensor networks: challenges, state of the art and future directions. KSII Trans Internet Inf Syst 6(7):1756–1776
Xiong N, Vasilakos AV, Yang LT et al (2009) Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J Sel Areas Commun 27(4):495–509
Liu X, Zhu R, Jalaian B et al (2015) Dynamic spectrum access algorithm based on game theory in cognitive radio networks. Mobile Netw Appl 20(6):817–827
Feng R, Che S, Wang X et al (2013) Trust management scheme based on D–S evidence theory for wireless sensor networks. Int J Distrib Sens Netw 9(6):1–9
Chand S, Singh S, Kumar B (2014) Heterogeneous HEED protocol for wireless sensor networks. Wirel Pers Commun 77(3):2117–2139
Shu W, Wang W, Wang Y (2014) A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. EURASIP J Wirel Commun Netw 64:1–9
Zeng H, Shi Y, Hou YT et al (2016) A scheduling algorithm for MIMO DoF allocation in multi-hop networks. IEEE Trans Mob Comput 15(2):264–277
Xiong N, Jia X, Yang LT et al (2010) A distributed efficient flow control scheme for multirate multicast networks. IEEE Trans Parallel Distrib Syst 21(9):1254–1266
Wei W, Qi Y (2011) Information potential fields navigation in wireless Ad-Hoc sensor networks. Sensors 11(5):4794–4807
Acknowledgements
This work was supported by Key Technologies Research and Development Program of China (2013BAH16F02), National Natural Science Foundation of China (61309029). We wish to thank the anonymous reviewers who helped to improve the quality of the paper. The authors gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, W., Zhu, S., Tang, J. et al. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74, 1779–1801 (2018). https://doi.org/10.1007/s11227-017-2150-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-2150-3