Skip to main content
Log in

Trust evaluation method for clustered wireless sensor networks based on cloud model

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Trust Management has been proved to be an effective method to detect malicious nodes and ensure security in Wireless Sensor Networks (WSNs). While, most existing trust management methods are not good at dealing with uncertainty of trust relationship such as randomness, fuzziness in WSNs, which leads to inaccurate trust metric. In this paper, a trust evaluation method for clustered wireless sensor networks based on cloud model is proposed and evaluated, which implements the conversion between qualitative and quantitative of sensor nodes’ trust metrics in order to achieve better trust evaluation. Firstly, the method considers multi-factors including communication factor, message factor and energy factor and builds mathematical model for each trust factor to get factor trust cloud. Secondly, immediate trust cloud is calculated by assigning adjustive weights for each factor trust cloud and combining them. Thirdly, recommendation trust cloud and immediate trust cloud are synthesized according to time sensitive factor in order to get final trust cloud. Furthermore, the final trust cloud of sensor node is converted to trust grade by trust cloud decision-making. Verification Experiments manifest that the proposed method has feasibility and accuracy in the aspect of evaluating sensor nodes’ trust. Moreover, comparison experiments under different attacks show that our method is sensitive to multiple attacks, it outperforms other trust evaluation methods not only in the accuracy of detecting malicious nodes, but also in the tolerance of abnormal conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 16(1), 266–282.

    Article  Google Scholar 

  2. He, D. J., Chan, S., & Guizani, M. (2014). Small data dissemination for wireless sensor networks: The security aspect. IEEE Wireless Communications, 21(3), 110–116.

    Article  Google Scholar 

  3. Lu, H., Li, J., & Guizani, M. (2014). Secure and efficient data transmission for cluster-based wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 750–761.

    Article  Google Scholar 

  4. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  5. Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks”. IET Wireless Senors System, 2(3), 161–169.

    Article  Google Scholar 

  6. Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.

    Article  Google Scholar 

  7. Marzi, H., & Marzi, A. (2014). A security model for wireless sensor networks. In Proceedings of IEEE international conference on computational intelligence and virtual environments for measurement systems and applications (pp. 64–69).

  8. Sun, Y., Han, Z., & Ray Liu, K. J. (2009). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.

    Article  Google Scholar 

  9. Geetha, V., & Chandrasekaran, K. (2014). A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), 173–183.

    Article  Google Scholar 

  10. Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys and Tutorial, 13(4), 562–583.

    Article  Google Scholar 

  11. Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of IEEE symposium on security and privacy (pp. 164–173).

  12. Gu, L., Wang, J., & Sun, B. (2014). Trust management mechanism for internet of things. China Communications, 11(2), 148–156.

    Article  Google Scholar 

  13. Ganeriwal, S., Srivastava, M.B. (2004). Reputation-based framework for high integrity sensor networks. In Proceedings of ACM workshop security of ad hoc and sensor networks (pp. 66–67).

  14. Bao, F., Chen, I., Chang, M., & Cho, J. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9(2), 169–183.

    Article  Google Scholar 

  15. Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924–935.

    Article  Google Scholar 

  16. He, D., Chen, C., Chan, S., & Vasilakos, A. V. (2012). ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  17. Han, G., Jiang, J., Lei, L., & Guizani, M. (2015). An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447–2458.

    Article  Google Scholar 

  18. Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 14(9), 2396–2407.

    Article  MATH  Google Scholar 

  19. Shaikh, R. A., Jameel, H., d’Auriol, B. J., Lee, H., Lee, S., & Song, Y. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.

    Article  Google Scholar 

  20. Ishmanov, F., Kim, S. W., & Nam, S. Y. (2014). A security trust establishment scheme for wireless sensor networks. Sensors, 14(1), 1877–1897.

    Article  Google Scholar 

  21. Feng, R., Xu, X., Zhou, X., & Wan, J. (2011). A trust evaluation algorithm for wireless sensor networks based on node behaviors and d–s evidence theory. Sensors, 11(2), 1345–1360.

    Article  Google Scholar 

  22. Yang, K., Liu, S., & Li, X. (2015). A novel detection scheme based on D–S evidence theory in wireless sensor networks. In International conference on intelligent networking and collaborative systems (pp. 398–401).

  23. Li, D. (2000). Uncertainty in knowledge representation. Engineering Science, 2(10), 73–79.

    Google Scholar 

  24. Li, D., & Du, Y. (2008). Artificial intelligence with uncertainty (pp. 107–150). Boca Raton: Chapman & Hall/CRC Press.

    MATH  Google Scholar 

  25. Li, D., Liu, C., & Gan, W. (2009). A new cognitive model: Cloud model. International Journal of Intelligent Systems, 24(3), 257–375.

    Article  MATH  Google Scholar 

  26. Huang, H., & Wang, R. (2008). A subjective trust evaluation model based on membership cloud theory. Journal on Communications, 29(4), 13–19.

    Google Scholar 

  27. Cai, H., Li, Z., & Tian, J. (2011). A new trust evaluation model based on cloud theory in E-commerence environment. In Proceedings of 2011 international symposium on intelligence information processing and trusted computing (pp. 139–142).

  28. Jin, B., Wang, Y., Liu, Z., & Xue, J. (2011). A trust model based on cloud model and bayesian network. Procedia Environmental Sciences, 11, 452–459.

    Article  Google Scholar 

  29. Cai, S., Han, Q., Gao, Z., Yand, D., & Zhao, J. (2012). Research on cloud trust model for malicious node detection in wireless sensor network. Acta Electronica Sinica, 40(11), 2232–2238.

    Google Scholar 

  30. Heinzelman, W.R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceeding of the 33rd annual Hawaii international conference on system sciences (pp. 3005–3014).

Download references

Acknowledgments

This paper is supported by National Natural Science Fund of China under Grant No. 51477138 and Network Computing and Security Technology of Shaanxi Key Laboratory under Grant No. 15JS078; and supported by Industrial Science and Technology Project of Shaanxi Province under Grant No. 2016GY-140 and Science Research Project of Department of Education Key Laboratory of Shaanxi Provincial under Grant No. 15JS078.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lisha Yan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, T., Yan, L. & Yang, Y. Trust evaluation method for clustered wireless sensor networks based on cloud model. Wireless Netw 24, 777–797 (2018). https://doi.org/10.1007/s11276-016-1368-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-016-1368-y

Keywords

Navigation