Skip to main content
Log in

A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the development of Internet technology, social network has become an important application in the network life. However, due to the rapid increase in the number of users, the influx of a variety of bad information is brought up as well as the existence of malicious users. Therefore, it is emergent to design a valid management scheme for user’s authentication to ensure the normal operation of social networks. Node trust evaluation is an effective method to deal with typical network attacks in wireless sensor networks. In order to solve the problem of quantification and uncertainty of trust, a novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection is proposed in this paper. Firstly, by taking into account spatiotemporal correlation of the data collected by sensor nodes in adjacent area, the trust degree can be estimated. Secondly, according to the D–S theory, the trust model is established to count the number of interactive behavior of trust, distrust or uncertainty, further to evaluate the direct trust value and indirect trust value. Then, a flexible synthesis method is adopted to calculate the overall trust to identify the malicious nodes. The simulation results show that the proposed scheme has obvious advantages over the traditional methods in the identification of malicious node and data fusion accuracy, and can obtain good scalability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Zhou Y, Fang Y, Zhang Y (2008) Securing wireless sensor networks: a survey. Commun Surv Tutor IEEE 10(3):6–28

    Article  Google Scholar 

  2. Simplício MA, Barreto PSLM, Margi CB et al (2010) A survey on key management mechanisms for distributed wireless sensor networks. Comput Netw 54(15):2591–2612

    Article  MATH  Google Scholar 

  3. Tague P, Poovendran R (2008) Modeling node capture attacks in wireless sensor networks. In: Proceedings of 46th Annual Allerton Conference on Communication, Control and Computing, pp 1221–1224

  4. Conti M, Di Pietro R, Mancini L V et al (2008) Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of ACM WiSec, pp 214–219

  5. Shim KA (2012) Cpas: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans Veh Tech 61:1874–1883

    Article  Google Scholar 

  6. Bonaci T, Bushnell L, Poovendran R (2010) Node capture attacks in wireless sensor networks: a system theoretic approach. In: Proceedings of the IEEE Conference on Decision and Control (CDC), pp 6765–6772

  7. Boukerch A, Xu L, El-Khatib K (2007) Trust-based security for wireless ad hoc and sensor networks. Comput Commun 30(12):2413–2427

    Article  Google Scholar 

  8. Bilge L, Strufe T, Balzarotti D et al (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: World Wide Web Conference, pp 108–117

  9. Sen J, Chowdhury PR, Senfupta I (2007) A distributed trust establishment scheme for mobile ad hoc networks. In: Proceedings of International Conference on Computing: Theory and Applications, pp 51–58

  10. Ozdemir S (2008) Functional reputation based data aggregation for wireless sensor networks. In: Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. Avignon, France, pp 592–597

  11. Raha A, Naskar MK, Chakraborty A et al (2012) A novel indirect trust-based link state routing scheme using a robust route trust method for wireless sensor networks. In: Proceedings of International Conference on Mobility and Security. Istanbul, Turkey, pp 1–5

  12. Ganeriwal S, Srivastava MB (2004) Reputation based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor networks. Washington, DC, pp 66–77

  13. Ganeriwal S, Balzano LK, Srivastava MB (2008) Reputation based framework for high integrity sensor networks. ACM Trans Sens Netw 4(3):1–37

    Article  Google Scholar 

  14. Rowaihy H, Enck W, McDaniel P et al (2005) Limiting Sybil attacks in structured peer-to-peer networks. In: Proceedings of IEEE Infocom Mini-Symposium. IEEE Press, Washington, DC, USA, pp 1201–1206

  15. Lesniewski-Lass C, Kaashoek MF (2010) Whanau: a Sybil-proof distributed hash table. In: Proceedings of 7th USENIX Symposium on Network Design and Implementation. ACMSIGCOMM Computer Communication Review, Boston, USA, pp 3–17

  16. Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of 2010 Annual Computer Security Applications Conference, Austin, Texas USA, pp 210–218

  17. Chu Z, Gianvecchio S, Wang H et al (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of 2010 Annual Computer Security Applications Conference, Austin, Texas USA, pp 23–29

  18. Tomasin S (2011) Consensus-based detection of malicious nodes in cooperative wireless networks. IEEE Commun Lett 15(4):404–406

    Article  Google Scholar 

  19. Pires WR, de Paula Figueiredo TH, Wong HC et al (2004) Malicious node detection in wireless sensor networks. In: Proceedings of the 18th International Parallel and Distributed Processing Sumposium. IEEE, Brazil, pp 212–216

  20. Curiac DI, Volosencu C, Doboli A et al (2007) Discovery of malicious nodes in wireless sensor networks using neural predictor. WSEAS Trans Comput Res 2(1):38–43

    Google Scholar 

  21. Curiac DI, Banias O, Dragan F et al (2007) Malicious node detection in wireless sensor networks using an autoregression technique. In: Proceedings of the Third International Conference on Networking and Services (IC-NS’07). Athens, pp 83–88

  22. Hai TH, Huh EN (2008) Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: Proceedings of the Seventh IEEE International Symposium on Network Computing and Applications, pp 325–331

  23. Atakli IM, Hu H, Chen Y et al (2008) Malicious node detection in wireless sensor networks using weighted trust evaluation. In: Proceedings of the International Symposium on Simulation of Systems Security. Spring Sim, San Diego, CA, USA, pp 836–843

  24. Singh M, Mehta G, Vaid C et al (2012) Detection of malicious node in wireless sensor network based on data mining. In: Proceedings of International Conference on Computing Sciences. IEEE, Phagwara, pp 291–294

  25. Denko MK, Sun T, Woungang I (2011) Trust management in ubiquitous computing: a Bayesian approach. Comput Commun 34(3):398–406

    Article  Google Scholar 

  26. Iltaf N, Ghafoor A, Zia U (2013) A mechanism for detecting dishonest recommendation in indirect trust computation. EURASIP J Wirel Commun Netw 1:1–13

    Google Scholar 

  27. Wang X, Liu L, Su J (2012) Rlm: a general model for trust representation and aggregation. IEEE Trans Serv Comput 5(1):131–143

    Article  Google Scholar 

  28. Li X, Zhou F, Du J (2013) LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans Inf Forensics Secur 8(6):924–935

    Article  Google Scholar 

  29. Liu Y, Xiong N, Zhao Y et al (2010) Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun 4(7):810–816

    Article  Google Scholar 

  30. Bhat P, Reddy KS (2015) Energy efficient detection of malicious nodes using secure clustering with load balance and reliable node disjoint multipath routing in wireless sensor networks. In: Proceedings of International Conference on Advances in Computing, Communications and Informatics, Aluva, India, August 10–13, pp 954–958

  31. Shu W, Ding L, Wang S (2011) An efficient heuristic scheduling algorithm for optimal job allocation in computational grids. ICIC Express Lett 5(4):1045–1050

    Google Scholar 

  32. Huang W, Oh SK, Guo Z et al (2013) A space search optimization algorithm with accelerated convergence strategies. Appl Soft Comput 13(12):4659–4675

    Article  Google Scholar 

  33. Jabeen F, Nawaz S, Tanveer S et al (2012) Spatio-temporal query processing over sensor networks: challenges, state of the art and future directions. KSII Trans Internet Inf Syst 6(7):1756–1776

    Google Scholar 

  34. Xiong N, Vasilakos AV, Yang LT et al (2009) Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J Sel Areas Commun 27(4):495–509

    Article  Google Scholar 

  35. Liu X, Zhu R, Jalaian B et al (2015) Dynamic spectrum access algorithm based on game theory in cognitive radio networks. Mobile Netw Appl 20(6):817–827

    Article  Google Scholar 

  36. Feng R, Che S, Wang X et al (2013) Trust management scheme based on D–S evidence theory for wireless sensor networks. Int J Distrib Sens Netw 9(6):1–9

    Article  Google Scholar 

  37. Chand S, Singh S, Kumar B (2014) Heterogeneous HEED protocol for wireless sensor networks. Wirel Pers Commun 77(3):2117–2139

    Article  Google Scholar 

  38. Shu W, Wang W, Wang Y (2014) A novel energy-efficient resource allocation algorithm based on immune clonal optimization for green cloud computing. EURASIP J Wirel Commun Netw 64:1–9

    Google Scholar 

  39. Zeng H, Shi Y, Hou YT et al (2016) A scheduling algorithm for MIMO DoF allocation in multi-hop networks. IEEE Trans Mob Comput 15(2):264–277

    Article  Google Scholar 

  40. Xiong N, Jia X, Yang LT et al (2010) A distributed efficient flow control scheme for multirate multicast networks. IEEE Trans Parallel Distrib Syst 21(9):1254–1266

    Article  Google Scholar 

  41. Wei W, Qi Y (2011) Information potential fields navigation in wireless Ad-Hoc sensor networks. Sensors 11(5):4794–4807

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Key Technologies Research and Development Program of China (2013BAH16F02), National Natural Science Foundation of China (61309029). We wish to thank the anonymous reviewers who helped to improve the quality of the paper. The authors gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shiwei Zhu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, W., Zhu, S., Tang, J. et al. A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74, 1779–1801 (2018). https://doi.org/10.1007/s11227-017-2150-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-017-2150-3

Keywords