An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks

Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 7; pp. 33859 - 33869
Main Authors Zhao, Jin, Huang, Jifeng, Xiong, Naixue
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most effective security mechanisms to protect WSNs from internal attacks. The exponential-based trust and reputation evaluation system (ETRES) is proposed for WSNs' node trust and reputation evaluation. ETRES is used to observe the nodes' behavior, and exponential distribution is applied to represent the distribution of nodes' trust. The trust of the node is used to look for reliable nodes to transmit data and weaken malicious attacks within the wireless sensor networks. More significantly, the entropy theory is used to measure the uncertainty of direct trust values in this paper. Indirect trust is introduced to strengthen interaction information when the uncertainty of direct trust is enough high. It can not only reduce the computing power of nodes but also prolong the lifetime of the network. In addition, the confidence factor is redefined, which can dynamically adjust the node trust value to weaken the harmful effects of the compromised nodes. The simulation results show that the proposed system can more effectively defend the internal attack than the beta-based trust and reputation evaluation system (RFSN) and the binomial-based trust management System (BTMS). The proposed method can be used to strengthen network security by selecting reliable nodes. What is more, the information trust and energy are prone to integrate into ETRES.
AbstractList Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most effective security mechanisms to protect WSNs from internal attacks. The exponential-based trust and reputation evaluation system (ETRES) is proposed for WSNs' node trust and reputation evaluation. ETRES is used to observe the nodes' behavior, and exponential distribution is applied to represent the distribution of nodes' trust. The trust of the node is used to look for reliable nodes to transmit data and weaken malicious attacks within the wireless sensor networks. More significantly, the entropy theory is used to measure the uncertainty of direct trust values in this paper. Indirect trust is introduced to strengthen interaction information when the uncertainty of direct trust is enough high. It can not only reduce the computing power of nodes but also prolong the lifetime of the network. In addition, the confidence factor is redefined, which can dynamically adjust the node trust value to weaken the harmful effects of the compromised nodes. The simulation results show that the proposed system can more effectively defend the internal attack than the beta-based trust and reputation evaluation system (RFSN) and the binomial-based trust management System (BTMS). The proposed method can be used to strengthen network security by selecting reliable nodes. What is more, the information trust and energy are prone to integrate into ETRES.
Author Jifeng Huang
Naixue Xiong
Jin Zhao
Author_xml – sequence: 1
  givenname: Jin
  orcidid: 0000-0002-9414-2696
  surname: Zhao
  fullname: Zhao, Jin
– sequence: 2
  givenname: Jifeng
  surname: Huang
  fullname: Huang, Jifeng
– sequence: 3
  givenname: Naixue
  surname: Xiong
  fullname: Xiong, Naixue
BookMark eNpNkU1v1DAQhi1UJErpL-jFEucstuOvHJfVApUqkNgijtYkniAvabzYTqH_HpdUFXOZ0Wiex5be1-RsjjMScsXZhnPWvdvudvvDYSMY7zaiY1JJ-YKcC667plWtPvtvfkUucz6yWraulDknsJ3pfhxxKOEe6f7PqbrnEmBq3kNGT2_TkguF2dOveFoKlBArcA_Tso6Hh1zwjoaZfg8JJ8yZHnDOMdHPWH7H9DO_IS9HmDJePvUL8u3D_nb3qbn58vF6t71pBslsaTwf-96o3kJrRyP4oFGBtmLgXmoldO-lYspI3ttB-26QAKb3wqAfhRfMtxfkevX6CEd3SuEO0oOLENy_RUw_HKQShgkdcG1VNfYMqlVrkGo0UmtpOtt6I6vr7eo6pfhrwVzcMS5prt93Qiql2053vF6169WQYs4Jx-dXOXOP0bg1GvcYjXuKplJXKxUQ8ZmwWuuKtH8BklqMKg
CODEN IAECCG
CitedBy_id crossref_primary_10_1016_j_future_2023_02_003
crossref_primary_10_1016_j_asoc_2020_106937
crossref_primary_10_3390_s24092852
crossref_primary_10_3390_electronics12153274
crossref_primary_10_1016_j_cose_2021_102211
crossref_primary_10_1007_s12652_020_02169_7
crossref_primary_10_3390_electronics12183801
crossref_primary_10_1007_s11235_022_00915_0
crossref_primary_10_3390_electronics12122617
crossref_primary_10_3390_electronics11203364
crossref_primary_10_1080_09540091_2023_2299103
crossref_primary_10_1007_s11277_021_08855_9
crossref_primary_10_1007_s11277_022_10165_7
crossref_primary_10_1016_j_ins_2023_119284
crossref_primary_10_1155_2020_2643546
crossref_primary_10_1007_s11277_024_10948_0
crossref_primary_10_1186_s13638_019_1511_4
crossref_primary_10_24136_oc_2019_025
crossref_primary_10_3390_s23125620
crossref_primary_10_1002_cpe_6283
crossref_primary_10_3390_electronics11213504
crossref_primary_10_1016_j_sysarc_2022_102783
crossref_primary_10_3390_electronics12061268
crossref_primary_10_1002_dac_5254
crossref_primary_10_1016_j_iot_2022_100627
crossref_primary_10_1109_ACCESS_2021_3086534
crossref_primary_10_1109_TITS_2021_3086976
crossref_primary_10_1109_JIOT_2024_3382188
crossref_primary_10_3390_s23218744
crossref_primary_10_61187_ita_v1i2_36
crossref_primary_10_3390_electronics11213558
crossref_primary_10_3390_app12042045
crossref_primary_10_3390_electronics12122556
crossref_primary_10_1016_j_future_2021_06_049
crossref_primary_10_1145_3585520
crossref_primary_10_1016_j_ins_2024_120420
crossref_primary_10_3390_electronics13020257
crossref_primary_10_1016_j_jksuci_2020_10_012
crossref_primary_10_3390_app122312432
crossref_primary_10_3390_s20205747
crossref_primary_10_3390_app14104130
crossref_primary_10_1109_JIOT_2020_2966870
crossref_primary_10_1007_s12083_020_00906_5
crossref_primary_10_1016_j_cose_2020_101868
crossref_primary_10_1016_j_adhoc_2023_103212
crossref_primary_10_3390_electronics12030654
crossref_primary_10_1186_s13638_019_1482_5
crossref_primary_10_1002_dac_4582
crossref_primary_10_1007_s11227_021_04231_3
Cites_doi 10.1109/ACCESS.2016.2578298
10.1016/j.ins.2017.04.035
10.1016/j.ins.2017.09.036
10.1109/TETC.2014.2364921
10.1016/j.jnca.2016.06.009
10.1016/j.jpdc.2017.08.002
10.1007/s11042-017-5523-y
10.1109/ACCESS.2018.2799681
10.1007/s11432-016-9028-0
10.1109/TII.2017.2738842
10.1109/MCOM.2017.1600822
10.1002/sec.1384
10.3390/s18030751
10.1049/iet-ifs.2012.0145
10.1016/j.jnca.2015.06.013
10.1109/ACCESS.2018.2815039
10.1109/ICIS.2016.7550727
10.1016/j.ins.2016.06.049
10.1109/ACCESS.2018.2809501
10.1109/ACCESS.2018.2810891
10.3390/s18020450
10.1016/j.procs.2016.03.077
10.1145/1362542.1362546
10.1016/j.comcom.2017.11.006
10.3390/s17030553
10.1109/TII.2017.2740571
10.1016/j.jcss.2013.06.014
10.3390/s18041216
10.1109/ISPS.2015.7244958
10.1109/TCC.2017.2649525
10.1109/MCOM.2018.1700592
10.3390/s17102166
10.1109/ICICES.2016.7518888
10.3390/s18051422
10.1155/2013/952905
10.1007/s11227-017-2150-3
10.3390/s16020245
10.1155/2015/678926
10.1109/ICESS.2008.31
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2019.2904544
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005-present
IEEE Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList Materials Research Database


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 33869
ExternalDocumentID oai_doaj_org_article_a16856bdb0ad4566a45f746647983d74
10_1109_ACCESS_2019_2904544
8666110
Genre orig-research
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABVLG
ACGFS
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IFIPE
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RIG
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-d1fbb75b8a38f721c6e5a682c1d46526bd4505741b8c6d9c4aa7bd27edf2d20d3
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Fri Oct 04 13:04:20 EDT 2024
Fri Sep 13 04:13:38 EDT 2024
Fri Aug 23 01:48:53 EDT 2024
Wed Jun 26 19:28:05 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-d1fbb75b8a38f721c6e5a682c1d46526bd4505741b8c6d9c4aa7bd27edf2d20d3
ORCID 0000-0002-9414-2696
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8666110
PQID 2455639691
PQPubID 4845423
PageCount 11
ParticipantIDs doaj_primary_oai_doaj_org_article_a16856bdb0ad4566a45f746647983d74
crossref_primary_10_1109_ACCESS_2019_2904544
ieee_primary_8666110
proquest_journals_2455639691
PublicationCentury 2000
PublicationDate 20190000
2019-00-00
20190101
2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 20190000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref37
ref15
ref36
ref14
ref31
ref30
ref11
ref32
ref10
dong (ref19) 2012; 9
ref2
ref1
ref39
ref17
ref38
ref16
zhao (ref12) 0
fang (ref18) 2017; 28
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref21
ref43
wang (ref33) 2014; 18
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref3
  doi: 10.1109/ACCESS.2016.2578298
– ident: ref20
  doi: 10.1016/j.ins.2017.04.035
– ident: ref10
  doi: 10.1016/j.ins.2017.09.036
– volume: 18
  start-page: 57
  year: 2014
  ident: ref33
  article-title: An improved light-weight trust model in WSN
  publication-title: Comput Model New Technol
  contributor:
    fullname: wang
– ident: ref43
  doi: 10.1109/TETC.2014.2364921
– ident: ref8
  doi: 10.1016/j.jnca.2016.06.009
– ident: ref28
  doi: 10.1016/j.jpdc.2017.08.002
– ident: ref4
  doi: 10.1007/s11042-017-5523-y
– volume: 9
  start-page: 89
  year: 2012
  ident: ref19
  article-title: Attack-resistant trust management model based on beta function for distributed routing in Internet of Things
  publication-title: China Commun
  contributor:
    fullname: dong
– ident: ref29
  doi: 10.1109/ACCESS.2018.2799681
– ident: ref37
  doi: 10.1007/s11432-016-9028-0
– ident: ref16
  doi: 10.1109/TII.2017.2738842
– ident: ref26
  doi: 10.1109/MCOM.2017.1600822
– ident: ref36
  doi: 10.1002/sec.1384
– ident: ref14
  doi: 10.3390/s18030751
– ident: ref32
  doi: 10.1049/iet-ifs.2012.0145
– ident: ref35
  doi: 10.1016/j.jnca.2015.06.013
– ident: ref15
  doi: 10.1109/ACCESS.2018.2815039
– ident: ref34
  doi: 10.1109/ICIS.2016.7550727
– ident: ref31
  doi: 10.1016/j.ins.2016.06.049
– ident: ref13
  doi: 10.1109/ACCESS.2018.2809501
– ident: ref6
  doi: 10.1109/ACCESS.2018.2810891
– ident: ref24
  doi: 10.3390/s18020450
– ident: ref2
  doi: 10.1016/j.procs.2016.03.077
– ident: ref41
  doi: 10.1145/1362542.1362546
– ident: ref7
  doi: 10.1016/j.comcom.2017.11.006
– ident: ref11
  doi: 10.3390/s17030553
– ident: ref5
  doi: 10.1109/TII.2017.2740571
– ident: ref1
  doi: 10.1016/j.jcss.2013.06.014
– volume: 28
  start-page: 703
  year: 2017
  ident: ref18
  article-title: Binomial-based trust management system in wireless sensor networks
  publication-title: Chin J Sens Actuators
  contributor:
    fullname: fang
– ident: ref23
  doi: 10.3390/s18041216
– ident: ref40
  doi: 10.1109/ISPS.2015.7244958
– ident: ref27
  doi: 10.1109/TCC.2017.2649525
– ident: ref22
  doi: 10.1109/MCOM.2018.1700592
– ident: ref9
  doi: 10.3390/s17102166
– ident: ref39
  doi: 10.1109/ICICES.2016.7518888
– ident: ref21
  doi: 10.3390/s18051422
– ident: ref38
  doi: 10.1155/2013/952905
– year: 0
  ident: ref12
  article-title: PTMS: Poisson-based Trust Management System in Wireless Sensor Networks
  contributor:
    fullname: zhao
– ident: ref25
  doi: 10.1007/s11227-017-2150-3
– ident: ref30
  doi: 10.3390/s16020245
– ident: ref17
  doi: 10.1155/2015/678926
– ident: ref42
  doi: 10.1109/ICESS.2008.31
SSID ssj0000816957
Score 2.4366472
Snippet Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Publisher
StartPage 33859
SubjectTerms Evaluation
Exponential distribution
internal attacks
Network security
Nodes
Probability distribution functions
Reliability
Reputations
Resists
Sensors
trust and reputation evaluation system
Trust management
Trustworthiness
Uncertainty
Wireless networks
Wireless sensor networks
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA7iSQ-iTnE6JQeP1rVpfh7nmIjgLirsFpK-FITRiW7gn-9L042JBy9eS2iS77Xvva99-R4h10j9g5C1zmoQkHEQPHMBqgyqoGvvSyhNPO_8NJUPr_xxJmZbrb5iTViSB07ADV0htZAefO4Ag710XNQqaqIro0tQSQm0EFtkqvXBupBGqE5mqMjNcDQe445iLZe5ZSYKz_EfoahV7O9arPzyy22wuT8kB12WSEdpdUdkJzTHZH9LO7BH3KihSXoY_RWdfL0vmlj44-bZHQYmoC_xMAV1DVDMsVfphzudbLS9aZIqp28NjQWwc3R49Bkp7eKDTlNl-OcJeb2fvIwfsq5fQlbxXC8zKBBdJbx2pa6R2VUyCCc1qwrgUjAEkUc6wguvKwmm4s4pD0wFqBmwHMpTstvgYs8IzVmAYCQ3pXbc4OBaoW_wVc5BglOsT27W0Nn3JIthWzqRG5uQthFp2yHdJ3cR3s3QqGndXkBL287S9i9L90kvGmdzE43MCyfsk8HaWLZ7_z4t41H4zEhTnP_H1BdkL24nfXoZkN3lxypcYjKy9Fftc_cNZ9baYg
  priority: 102
  providerName: Directory of Open Access Journals
Title An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks
URI https://ieeexplore.ieee.org/document/8666110
https://www.proquest.com/docview/2455639691/abstract/
https://doaj.org/article/a16856bdb0ad4566a45f746647983d74
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La9wwEBZpTu2hr7R02zTo0GO8sWU9j5tlQygklyaQm5A0MpQGb0h2ofTXd8bymqTtoTdjZDHWJ41mRjOfGPuCrn9WurNVBwoqCUpWIUOqIGXbxdhC66je-eJSn1_LrzfqZo8dT7UwOech-SzP6XE4y4d12lKo7MSird1QPdUzW4tSqzXFU-gCCafMSCzU1O5ksVziP1D2lpsLR1Rz8snmM3D0j5eq_KWJh-3l7BW72AlWskp-zLebOE-__uBs_F_JX7OXo53JF2VivGF7uX_LXjxiHzxgYdHzQl6MGo-vft6te0odCrfVKW5twK-oHIOHHjha6dtyZM9XEzs4L2Tn_HvPKYX2FlUm_4ZO8fqeX5bc8od37PpsdbU8r8YbF6oka7upoEF8jIo2tLZD3zDprIK2IjUgtRI6giSHRjbRJg0uyRBMBGEydAJEDe17tt-jsB8Yr0WG7LR0rQ3SYePOoHaJqZagIRgxY8c7KPxdIdbwg0NSO1-Q84ScH5GbsVOCa2pKrNjDCxxmPy4yHxptFQoZ64CCah2k6gzx5xtnWzDYyQFBM3UyojJjhzvw_biCH7yQRJ3mtGs-_vurT-w5CVjCMYdsf3O_zZ_RQNnEo8GxPxrm529nJ-Wo
link.rule.ids 315,786,790,802,870,2115,4043,27956,27957,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFLem7QAcGDAQZQN84Lh0iePPY1d1KrD2QiftZtl-joQ2pdPWSoi_nuc4jcbHgVuUONZLfvb7sN_7mZBPGPpHIRtdNCCg4CB44SKEAkLUjfc11CbVOy-Wcn7Fv1yL6z1yOtTCxBi75LM4TpfdXj6swzYtlZ1p9LWrVE91gHa-NLlaa1hRSUdIGKF6aiF8fjaZTvErUv6WGTOTyOb4b-anY-nvj1X5Sxd3BubikCx2ouW8kpvxduPH4ecfrI3_K_sL8rz3NOkkD42XZC-2r8izR_yDR8RNWprpi1Hn0dmPu3WbkofcbXGOxg3oKhVkUNcCRT99mzft6WzgB6eZ7px-b2lKor1FpUm_YVi8vqfLnF3-8JpcXcxW03nRn7lQBF7qTQEVIqSE167WDUaHQUbhpGahAi4Fkx54Cml45XWQYAJ3TnlgKkLDgJVQvyH7LQr7ltCSRYhGclNrxw02bhTqFx9KDhKcYiNyuoPC3mVqDduFJKWxGTmbkLM9ciNynuAamiZe7O4G_mbbTzPrKqkFCulLh4JK6bhoVGLQV0bXoLCTowTN0EmPyoic7MC3_Rx-sIwn8jQjTfXu3299JE_mq8Wlvfy8_HpMniZh8-LMCdnf3G_je3RXNv5DN0p_AT806Ak
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Effective+Exponential-Based+Trust+and+Reputation+Evaluation+System+in+Wireless+Sensor+Networks&rft.jtitle=IEEE+access&rft.au=Jin+Zhao&rft.au=Jifeng+Huang&rft.au=Naixue+Xiong&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=33859&rft.epage=33869&rft_id=info:doi/10.1109%2FACCESS.2019.2904544&rft.externalDocID=8666110
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon