Skip to main content
Log in

An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Medaglia, C. M., & Serbanati, A. (2010). An overview of privacy and security issues in the internet of things. In D. Giusto (Ed.), The internet of things: 20th tyrrhenian workshop on digital communications (pp. 389–395). New York: Springer.

    Chapter  Google Scholar 

  2. He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Retrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16(4), 623–632.

    Article  Google Scholar 

  3. Galuba, W., Papadimitratos, P., Poturalski, M., & Aberer, K. (2010). Castor: Scalable secure routing for ad hoc networks. In International conference on computer communications, IEEE, pp. 2829–2837.

  4. Aivaloglou, E., & Gritzalis, S. (2010). Hybrid trust and reputation management for sensor networks. Wireless Networks, 16(5), 1493–1510.

    Article  Google Scholar 

  5. Hodges, S., Taylor, S., Villar, N., Scott, J., Bial, D., & Fischer, P. T. (2013). Prototyping connected devices for the internet of things. Computer, 46(2), 26–34.

    Article  Google Scholar 

  6. Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.

    Article  Google Scholar 

  7. Siaterlis, C., & Maglaris, B. (2004). Towards multisensor data fusion for dos detection. In Proceedings of the ACM symposium on applied computing, ACM, pp. 439–446.

  8. Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H. C. (2014). Management and applications of trust in wireless sensor networks: A survey. Journal of Computer and System Sciences, 80(3), 602–617.

    Article  MATH  Google Scholar 

  9. Trakadas, P., Maniatis, S., Karkazis, P., & Zahariadis, T. (2009). A novel flexible trust management system for heterogeneous wireless sensor networks. In International symposium on autonomous decentralized systems, IEEE, pp. 1–6.

  10. Jing, Q., Tang, L. Y., & Chen, Z. (2008). Trust management in wireless sensor networks. Journal of Software, 19(7), 1716–1730.

    Article  Google Scholar 

  11. Hu, X., Wei, Q., & Tang, H. (2010). Model and simulation of creditability-based data aggregation for the internet of things. Chinese Journal of Scientific Instrument, 31(11), 2636–2640.

    Google Scholar 

  12. Xiang-Dong, H. U., Peng-Qin, Y. U., & Wei, Q. F. (2012). Detection of selective forwarding attack in the internet of things. Journal of Chongqing University of Posts & Telecommunications, 24(2), 148–152.

    Google Scholar 

  13. Reddy, Y., Durand, J., & Kafle, S. (2010). Detection of packet dropping in wireless sensor networks. In International conference on information technology: New generations, IEEE, pp. 879–884.

  14. Deng, H., Sun, X., Wang, B., & Cao, Y. (2009). Selective forwarding attack detection using watermark in WSNs. In International colloquium on computing, communication, control, and management, IEEE, Vol. 3, pp. 109–113.

  15. Man-Fu, M. A., & Zhang, L. (2013). Inter-domain trust model based on gateway of Iot. Computer Engineering & Design, 34(11), 3829–3834.

    Google Scholar 

  16. Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.

    Article  MATH  Google Scholar 

  17. Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trUst management scheme for sensor networks security. In IEEE international conference on mobile adhoc and sensor systems, IEEE, pp. 437–446.

  18. Liu, T., Xiong, Y., Huang, W., Qiwei, L. U., & Gong, X. (2013). Node behavior and identity-based trusted authentication in wireless sensor networks. Journal of Computer Applications, 33(7), 1842–1845.

    Article  Google Scholar 

  19. Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. In Proceedings of world academy of science engineering & technolog, pp. 2070–3740.

  20. Pissinou, N., & Crosby, G. V. (2007). Cluster-based reputation and trust for wireless sensor networks. In 4th IEEE consumer communications and networking conference, IEEE, pp. 604–608.

  21. Chow, C. Y., Mokbel, M. F., & Leong, H. V. (2011). On efficient and scalable support of continuous queries in mobile peer-to-peer environments. IEEE Transactions on Mobile Computing, 10(10), 1473–1487.

    Article  Google Scholar 

  22. Denko, M. K., Sun, T., & Woungang, I. (2011). Trust management in ubiquitous computing: A bayesian approach. Computer Communications, 34(3), 398–406.

    Article  Google Scholar 

  23. Cabrerizo, F. J., Alonso, S., & Herreraviedma, E. (2009). A consensus model for group decision making problems with unbalanced fuzzy linguistic information. International Journal of Information Technology & Decision Making, 08(1), 109–131.

    Article  MATH  Google Scholar 

  24. Chiclana, F., Mata, F., Martnez, L., Herreraviedma, E., & Alonso, S. (2008). Integration of a consistency control module within a consensus model. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 16(1), 35–53.

    Article  MathSciNet  Google Scholar 

  25. Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.

    MATH  Google Scholar 

  26. Momani, M., Challa, S., & Alhmouz, R. (2010). Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Networks, 5(7), 815–822.

    Article  Google Scholar 

  27. Ji, S., Xue, Y., & Carin, L. (2008). Bayesian compressive sensing. IEEE Transactions on Signal Processing, 56(6), 2346–2356.

    Article  MathSciNet  Google Scholar 

  28. Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y. J. (2008). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698–1712.

    Article  Google Scholar 

  29. Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012). A subjective model for trustworthiness evaluation in the social internet of things. In IEEE 23rd international symposium on personal indoor and mobile radio communications, IEEE, pp. 18–23.

Download references

Acknowledgments

This work is supported in part by the Natural Science Foundation of Jiangsu Province (Grant No. BK20160294), the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant No. 14KJB510010), Changzhou Sci & Tech Program (Grant No. CJ20140058), Doctoral Scientific Research Foundation of Jiangsu University of Technology (Grant No. KYY13002), Science and Technology Project of Jiangsu-Prospective Joint Research Project (Grant No. BY2014038-09) and National Natural Science Foundation of China (Grant No. 61201248)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Yu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, Y., Jia, Z., Tao, W. et al. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wireless Pers Commun 93, 571–587 (2017). https://doi.org/10.1007/s11277-016-3802-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3802-y

Keywords

Navigation