Skip to main content
Log in

A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution

  • Research Paper
  • Special Focus on Mobile Network Virtualization
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Compared with the encryption and the authentication which can prevent the external attacks, the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network (WSN). The reputation time-varying (RTV) attacks are internal attacks. In the reputation time-varying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Time-window-based Resilient Trust Management Scheme (TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes’ reputation value, meanwhile, the control factor F c and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes’ reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Guo M J, Liu Y H, Yu H B, et al. An overview of smart city in China. China Commun, 2016, 13: 203–211

    Article  Google Scholar 

  2. Xiong Z, Sheng H, Rong W G, et al. Intelligent transportation systems for smart cities: a progress review. Sci China Inf Sci, 2012, 55: 2908–2914

    Article  Google Scholar 

  3. Mois G, Sanislav T, Folea S C. A cyber-physical system for environmental monitoring. IEEE Trans Instrum Meas, 2016, 65: 1463–1471

    Article  Google Scholar 

  4. Yang Y, Zhao C, Yao S, et al. Delay performance of network-coding-based epidemic routing. IEEE Trans Veh Technol, 2016, 65: 3676–3684

    Article  Google Scholar 

  5. Chen W, Jiang X R, Tang Z B, et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks. Artif Intell Rev, 2015, 43: 579–591

    Article  Google Scholar 

  6. Tao X F, Xu X D, Cui Q M. An overview of cooperative communications. IEEE Commun Mag, 2012, 50: 65–71

    Article  Google Scholar 

  7. Yang Y, Zhang W X, Wei K, et al. Power reduction for mobile devices by deploying low-power base stations. IET Commun, 2014, 8: 3372–3380

    Article  Google Scholar 

  8. Saurabh G, Mani B S. Reputation-based framework for high integrity sensor network. In: Proceedings of ACM Workshop on Security of ad hoc and Sensor Network. New York: ACM, 2004. 66–77

    Google Scholar 

  9. Yang G, Yin G S, Yang W, et al. A reputation-based model for malicious node detection in WSNs (in Chinese). J Harbin Inst Technol, 2009, 41: 158–162

    Google Scholar 

  10. Jiang J F, Han G J, Wang F, et al. An efficient distributed trust model for wireless sensor network. IEEE Trans Parall Distrib Syst, 2015, 26: 1228–1337

    Article  Google Scholar 

  11. He D J, Chen C, Chan S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inform Technol Biomed, 2012, 16: 1164–1175

    Article  Google Scholar 

  12. Meghanathan N. A distributed trust evaluation model for wireless mobile sensor networks. In: Proceedings of International Conference on Information Technology: New Generations (ITNG), Las Vegas, 2014. 186–191

    Google Scholar 

  13. UmaRani V, Sundaram K S, Jayashree D. Enhanced beta trust model in wireless sensor networks. In: Proceedings of International Conference on Information Communication and Embedded Systems (ICICES), Tamil Nadu, 2016. 1–5

    Google Scholar 

  14. Wang N, Liu D Q. Trust model based on changeable sampling frequency for wireless sensor network. In: Proceedings of IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, 2016. 1–4

    Google Scholar 

  15. Xia H, Jia Z P, Sha E H-M. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 2014, 8: 88–103

    Article  Google Scholar 

  16. Gheorghe L, Rughinis R, Tataroiu R. Adaptive trust management protocol based on intrusion detection for wireless sensor network. In: Proceedings of RoEduNet International Conference on Networking in Education and Research, Constanta, 2013. 1–7

    Google Scholar 

  17. Fang F, Li J F, Li J. A reputation management scheme based on multi-factor in WSN. In: Proceeding of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). Shenyang, 2013. 3843–3848

    Google Scholar 

  18. Labraoui N. A reliable trust management scheme in wireless sensor networks. In: Proceedings of IEEE International Symposium on Programming and Systems (ISPS), Algiers, 2015. 1–6

    Google Scholar 

  19. Su W G, Liao Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun, 2015, 12: 119–126

    Article  Google Scholar 

  20. Ren Y, Zadorozhny V I, Oleshchuk V A, et al. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans Mob Comput, 2014, 13: 1409–1423

    Article  Google Scholar 

  21. Reshmi V, Sajitha M. Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks. In: Proceeding of IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015. 1–6

    Google Scholar 

  22. Zhu C S, Nicanfar H, Leung V C M, et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur, 2015, 10: 118–131

    Article  Google Scholar 

  23. Fang W D, Zhang C L, Shi Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl, 2016, 59: 88–94

    Article  Google Scholar 

  24. Shafer G. A Mathematical Theory of Evidence. Princeton: Princeton University, 1976

    MATH  Google Scholar 

  25. Jøsang A. A logic for uncertain probabilities. Int J Uncertain Fuzz Knowl-Based Syst, 2011, 9: 279–311

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This work was partially supported by National Natural Science Foundation of China (Grant No. 61471346), Shanghai Natural Science Foundation (Grant No. 17ZR1429100), International Science and Technology Cooperation Program of China (Grant No. 2014DFA11640), National Program of Internation- al Science and Technology Cooperation (Grant No. 2014DFE10160), National Science and Technology Major Project (Grant No. 2014ZX03005001), and National Natural Science Foundation and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wuxiong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fang, W., Zhang, W., Yang, Y. et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60, 040305 (2017). https://doi.org/10.1007/s11432-016-9028-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-9028-0

Keywords

Navigation