An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks
Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most...
Saved in:
Published in | IEEE access Vol. 7; pp. 33859 - 33869 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most effective security mechanisms to protect WSNs from internal attacks. The exponential-based trust and reputation evaluation system (ETRES) is proposed for WSNs' node trust and reputation evaluation. ETRES is used to observe the nodes' behavior, and exponential distribution is applied to represent the distribution of nodes' trust. The trust of the node is used to look for reliable nodes to transmit data and weaken malicious attacks within the wireless sensor networks. More significantly, the entropy theory is used to measure the uncertainty of direct trust values in this paper. Indirect trust is introduced to strengthen interaction information when the uncertainty of direct trust is enough high. It can not only reduce the computing power of nodes but also prolong the lifetime of the network. In addition, the confidence factor is redefined, which can dynamically adjust the node trust value to weaken the harmful effects of the compromised nodes. The simulation results show that the proposed system can more effectively defend the internal attack than the beta-based trust and reputation evaluation system (RFSN) and the binomial-based trust management System (BTMS). The proposed method can be used to strengthen network security by selecting reliable nodes. What is more, the information trust and energy are prone to integrate into ETRES. |
---|---|
AbstractList | Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional security methods cannot be used to resist the internal attacks from compromised nodes. The trust and reputation evaluation system is the most effective security mechanisms to protect WSNs from internal attacks. The exponential-based trust and reputation evaluation system (ETRES) is proposed for WSNs' node trust and reputation evaluation. ETRES is used to observe the nodes' behavior, and exponential distribution is applied to represent the distribution of nodes' trust. The trust of the node is used to look for reliable nodes to transmit data and weaken malicious attacks within the wireless sensor networks. More significantly, the entropy theory is used to measure the uncertainty of direct trust values in this paper. Indirect trust is introduced to strengthen interaction information when the uncertainty of direct trust is enough high. It can not only reduce the computing power of nodes but also prolong the lifetime of the network. In addition, the confidence factor is redefined, which can dynamically adjust the node trust value to weaken the harmful effects of the compromised nodes. The simulation results show that the proposed system can more effectively defend the internal attack than the beta-based trust and reputation evaluation system (RFSN) and the binomial-based trust management System (BTMS). The proposed method can be used to strengthen network security by selecting reliable nodes. What is more, the information trust and energy are prone to integrate into ETRES. |
Author | Jifeng Huang Naixue Xiong Jin Zhao |
Author_xml | – sequence: 1 givenname: Jin orcidid: 0000-0002-9414-2696 surname: Zhao fullname: Zhao, Jin – sequence: 2 givenname: Jifeng surname: Huang fullname: Huang, Jifeng – sequence: 3 givenname: Naixue surname: Xiong fullname: Xiong, Naixue |
BookMark | eNpNkU1v1DAQhi1UJErpL-jFEucstuOvHJfVApUqkNgijtYkniAvabzYTqH_HpdUFXOZ0Wiex5be1-RsjjMScsXZhnPWvdvudvvDYSMY7zaiY1JJ-YKcC667plWtPvtvfkUucz6yWraulDknsJ3pfhxxKOEe6f7PqbrnEmBq3kNGT2_TkguF2dOveFoKlBArcA_Tso6Hh1zwjoaZfg8JJ8yZHnDOMdHPWH7H9DO_IS9HmDJePvUL8u3D_nb3qbn58vF6t71pBslsaTwf-96o3kJrRyP4oFGBtmLgXmoldO-lYspI3ttB-26QAKb3wqAfhRfMtxfkevX6CEd3SuEO0oOLENy_RUw_HKQShgkdcG1VNfYMqlVrkGo0UmtpOtt6I6vr7eo6pfhrwVzcMS5prt93Qiql2053vF6169WQYs4Jx-dXOXOP0bg1GvcYjXuKplJXKxUQ8ZmwWuuKtH8BklqMKg |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1016_j_future_2023_02_003 crossref_primary_10_1016_j_asoc_2020_106937 crossref_primary_10_3390_s24092852 crossref_primary_10_3390_electronics12153274 crossref_primary_10_1016_j_cose_2021_102211 crossref_primary_10_1007_s12652_020_02169_7 crossref_primary_10_3390_electronics12183801 crossref_primary_10_1007_s11235_022_00915_0 crossref_primary_10_3390_electronics12122617 crossref_primary_10_3390_electronics11203364 crossref_primary_10_1080_09540091_2023_2299103 crossref_primary_10_1007_s11277_021_08855_9 crossref_primary_10_1007_s11277_022_10165_7 crossref_primary_10_1016_j_ins_2023_119284 crossref_primary_10_1155_2020_2643546 crossref_primary_10_1007_s11277_024_10948_0 crossref_primary_10_1186_s13638_019_1511_4 crossref_primary_10_24136_oc_2019_025 crossref_primary_10_3390_s23125620 crossref_primary_10_1002_cpe_6283 crossref_primary_10_3390_electronics11213504 crossref_primary_10_1016_j_sysarc_2022_102783 crossref_primary_10_3390_electronics12061268 crossref_primary_10_1002_dac_5254 crossref_primary_10_1016_j_iot_2022_100627 crossref_primary_10_1109_ACCESS_2021_3086534 crossref_primary_10_1109_TITS_2021_3086976 crossref_primary_10_1109_JIOT_2024_3382188 crossref_primary_10_3390_s23218744 crossref_primary_10_61187_ita_v1i2_36 crossref_primary_10_3390_electronics11213558 crossref_primary_10_3390_app12042045 crossref_primary_10_3390_electronics12122556 crossref_primary_10_1016_j_future_2021_06_049 crossref_primary_10_1145_3585520 crossref_primary_10_1016_j_ins_2024_120420 crossref_primary_10_3390_electronics13020257 crossref_primary_10_1016_j_jksuci_2020_10_012 crossref_primary_10_3390_app122312432 crossref_primary_10_3390_s20205747 crossref_primary_10_3390_app14104130 crossref_primary_10_1109_JIOT_2020_2966870 crossref_primary_10_1007_s12083_020_00906_5 crossref_primary_10_1016_j_cose_2020_101868 crossref_primary_10_1016_j_adhoc_2023_103212 crossref_primary_10_3390_electronics12030654 crossref_primary_10_1186_s13638_019_1482_5 crossref_primary_10_1002_dac_4582 crossref_primary_10_1007_s11227_021_04231_3 |
Cites_doi | 10.1109/ACCESS.2016.2578298 10.1016/j.ins.2017.04.035 10.1016/j.ins.2017.09.036 10.1109/TETC.2014.2364921 10.1016/j.jnca.2016.06.009 10.1016/j.jpdc.2017.08.002 10.1007/s11042-017-5523-y 10.1109/ACCESS.2018.2799681 10.1007/s11432-016-9028-0 10.1109/TII.2017.2738842 10.1109/MCOM.2017.1600822 10.1002/sec.1384 10.3390/s18030751 10.1049/iet-ifs.2012.0145 10.1016/j.jnca.2015.06.013 10.1109/ACCESS.2018.2815039 10.1109/ICIS.2016.7550727 10.1016/j.ins.2016.06.049 10.1109/ACCESS.2018.2809501 10.1109/ACCESS.2018.2810891 10.3390/s18020450 10.1016/j.procs.2016.03.077 10.1145/1362542.1362546 10.1016/j.comcom.2017.11.006 10.3390/s17030553 10.1109/TII.2017.2740571 10.1016/j.jcss.2013.06.014 10.3390/s18041216 10.1109/ISPS.2015.7244958 10.1109/TCC.2017.2649525 10.1109/MCOM.2018.1700592 10.3390/s17102166 10.1109/ICICES.2016.7518888 10.3390/s18051422 10.1155/2013/952905 10.1007/s11227-017-2150-3 10.3390/s16020245 10.1155/2015/678926 10.1109/ICESS.2008.31 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2019.2904544 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 33869 |
ExternalDocumentID | oai_doaj_org_article_a16856bdb0ad4566a45f746647983d74 10_1109_ACCESS_2019_2904544 8666110 |
Genre | orig-research |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABVLG ACGFS ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IFIPE IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RIG RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-d1fbb75b8a38f721c6e5a682c1d46526bd4505741b8c6d9c4aa7bd27edf2d20d3 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Fri Oct 04 13:04:20 EDT 2024 Fri Sep 13 04:13:38 EDT 2024 Fri Aug 23 01:48:53 EDT 2024 Wed Jun 26 19:28:05 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-d1fbb75b8a38f721c6e5a682c1d46526bd4505741b8c6d9c4aa7bd27edf2d20d3 |
ORCID | 0000-0002-9414-2696 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/8666110 |
PQID | 2455639691 |
PQPubID | 4845423 |
PageCount | 11 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_a16856bdb0ad4566a45f746647983d74 crossref_primary_10_1109_ACCESS_2019_2904544 ieee_primary_8666110 proquest_journals_2455639691 |
PublicationCentury | 2000 |
PublicationDate | 20190000 2019-00-00 20190101 2019-01-01 |
PublicationDateYYYYMMDD | 2019-01-01 |
PublicationDate_xml | – year: 2019 text: 20190000 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref35 ref13 ref34 ref37 ref15 ref36 ref14 ref31 ref30 ref11 ref32 ref10 dong (ref19) 2012; 9 ref2 ref1 ref39 ref17 ref38 ref16 zhao (ref12) 0 fang (ref18) 2017; 28 ref24 ref23 ref26 ref25 ref20 ref42 ref41 ref22 ref21 ref43 wang (ref33) 2014; 18 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
References_xml | – ident: ref3 doi: 10.1109/ACCESS.2016.2578298 – ident: ref20 doi: 10.1016/j.ins.2017.04.035 – ident: ref10 doi: 10.1016/j.ins.2017.09.036 – volume: 18 start-page: 57 year: 2014 ident: ref33 article-title: An improved light-weight trust model in WSN publication-title: Comput Model New Technol contributor: fullname: wang – ident: ref43 doi: 10.1109/TETC.2014.2364921 – ident: ref8 doi: 10.1016/j.jnca.2016.06.009 – ident: ref28 doi: 10.1016/j.jpdc.2017.08.002 – ident: ref4 doi: 10.1007/s11042-017-5523-y – volume: 9 start-page: 89 year: 2012 ident: ref19 article-title: Attack-resistant trust management model based on beta function for distributed routing in Internet of Things publication-title: China Commun contributor: fullname: dong – ident: ref29 doi: 10.1109/ACCESS.2018.2799681 – ident: ref37 doi: 10.1007/s11432-016-9028-0 – ident: ref16 doi: 10.1109/TII.2017.2738842 – ident: ref26 doi: 10.1109/MCOM.2017.1600822 – ident: ref36 doi: 10.1002/sec.1384 – ident: ref14 doi: 10.3390/s18030751 – ident: ref32 doi: 10.1049/iet-ifs.2012.0145 – ident: ref35 doi: 10.1016/j.jnca.2015.06.013 – ident: ref15 doi: 10.1109/ACCESS.2018.2815039 – ident: ref34 doi: 10.1109/ICIS.2016.7550727 – ident: ref31 doi: 10.1016/j.ins.2016.06.049 – ident: ref13 doi: 10.1109/ACCESS.2018.2809501 – ident: ref6 doi: 10.1109/ACCESS.2018.2810891 – ident: ref24 doi: 10.3390/s18020450 – ident: ref2 doi: 10.1016/j.procs.2016.03.077 – ident: ref41 doi: 10.1145/1362542.1362546 – ident: ref7 doi: 10.1016/j.comcom.2017.11.006 – ident: ref11 doi: 10.3390/s17030553 – ident: ref5 doi: 10.1109/TII.2017.2740571 – ident: ref1 doi: 10.1016/j.jcss.2013.06.014 – volume: 28 start-page: 703 year: 2017 ident: ref18 article-title: Binomial-based trust management system in wireless sensor networks publication-title: Chin J Sens Actuators contributor: fullname: fang – ident: ref23 doi: 10.3390/s18041216 – ident: ref40 doi: 10.1109/ISPS.2015.7244958 – ident: ref27 doi: 10.1109/TCC.2017.2649525 – ident: ref22 doi: 10.1109/MCOM.2018.1700592 – ident: ref9 doi: 10.3390/s17102166 – ident: ref39 doi: 10.1109/ICICES.2016.7518888 – ident: ref21 doi: 10.3390/s18051422 – ident: ref38 doi: 10.1155/2013/952905 – year: 0 ident: ref12 article-title: PTMS: Poisson-based Trust Management System in Wireless Sensor Networks contributor: fullname: zhao – ident: ref25 doi: 10.1007/s11227-017-2150-3 – ident: ref30 doi: 10.3390/s16020245 – ident: ref17 doi: 10.1155/2015/678926 – ident: ref42 doi: 10.1109/ICESS.2008.31 |
SSID | ssj0000816957 |
Score | 2.4366472 |
Snippet | Wireless sensor networks (WSNs) are vulnerable to many security threats from compromised nodes, and because the WSNs are resource-constrained, the traditional... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Publisher |
StartPage | 33859 |
SubjectTerms | Evaluation Exponential distribution internal attacks Network security Nodes Probability distribution functions Reliability Reputations Resists Sensors trust and reputation evaluation system Trust management Trustworthiness Uncertainty Wireless networks Wireless sensor networks |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA7iSQ-iTnE6JQeP1rVpfh7nmIjgLirsFpK-FITRiW7gn-9L042JBy9eS2iS77Xvva99-R4h10j9g5C1zmoQkHEQPHMBqgyqoGvvSyhNPO_8NJUPr_xxJmZbrb5iTViSB07ADV0htZAefO4Ag710XNQqaqIro0tQSQm0EFtkqvXBupBGqE5mqMjNcDQe445iLZe5ZSYKz_EfoahV7O9arPzyy22wuT8kB12WSEdpdUdkJzTHZH9LO7BH3KihSXoY_RWdfL0vmlj44-bZHQYmoC_xMAV1DVDMsVfphzudbLS9aZIqp28NjQWwc3R49Bkp7eKDTlNl-OcJeb2fvIwfsq5fQlbxXC8zKBBdJbx2pa6R2VUyCCc1qwrgUjAEkUc6wguvKwmm4s4pD0wFqBmwHMpTstvgYs8IzVmAYCQ3pXbc4OBaoW_wVc5BglOsT27W0Nn3JIthWzqRG5uQthFp2yHdJ3cR3s3QqGndXkBL287S9i9L90kvGmdzE43MCyfsk8HaWLZ7_z4t41H4zEhTnP_H1BdkL24nfXoZkN3lxypcYjKy9Fftc_cNZ9baYg priority: 102 providerName: Directory of Open Access Journals |
Title | An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks |
URI | https://ieeexplore.ieee.org/document/8666110 https://www.proquest.com/docview/2455639691/abstract/ https://doaj.org/article/a16856bdb0ad4566a45f746647983d74 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1La9wwEBZpTu2hr7R02zTo0GO8sWU9j5tlQygklyaQm5A0MpQGb0h2ofTXd8bymqTtoTdjZDHWJ41mRjOfGPuCrn9WurNVBwoqCUpWIUOqIGXbxdhC66je-eJSn1_LrzfqZo8dT7UwOech-SzP6XE4y4d12lKo7MSird1QPdUzW4tSqzXFU-gCCafMSCzU1O5ksVziP1D2lpsLR1Rz8snmM3D0j5eq_KWJh-3l7BW72AlWskp-zLebOE-__uBs_F_JX7OXo53JF2VivGF7uX_LXjxiHzxgYdHzQl6MGo-vft6te0odCrfVKW5twK-oHIOHHjha6dtyZM9XEzs4L2Tn_HvPKYX2FlUm_4ZO8fqeX5bc8od37PpsdbU8r8YbF6oka7upoEF8jIo2tLZD3zDprIK2IjUgtRI6giSHRjbRJg0uyRBMBGEydAJEDe17tt-jsB8Yr0WG7LR0rQ3SYePOoHaJqZagIRgxY8c7KPxdIdbwg0NSO1-Q84ScH5GbsVOCa2pKrNjDCxxmPy4yHxptFQoZ64CCah2k6gzx5xtnWzDYyQFBM3UyojJjhzvw_biCH7yQRJ3mtGs-_vurT-w5CVjCMYdsf3O_zZ_RQNnEo8GxPxrm529nJ-Wo |
link.rule.ids | 315,786,790,802,870,2115,4043,27956,27957,27958,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Nb9MwFLem7QAcGDAQZQN84Lh0iePPY1d1KrD2QiftZtl-joQ2pdPWSoi_nuc4jcbHgVuUONZLfvb7sN_7mZBPGPpHIRtdNCCg4CB44SKEAkLUjfc11CbVOy-Wcn7Fv1yL6z1yOtTCxBi75LM4TpfdXj6swzYtlZ1p9LWrVE91gHa-NLlaa1hRSUdIGKF6aiF8fjaZTvErUv6WGTOTyOb4b-anY-nvj1X5Sxd3BubikCx2ouW8kpvxduPH4ecfrI3_K_sL8rz3NOkkD42XZC-2r8izR_yDR8RNWprpi1Hn0dmPu3WbkofcbXGOxg3oKhVkUNcCRT99mzft6WzgB6eZ7px-b2lKor1FpUm_YVi8vqfLnF3-8JpcXcxW03nRn7lQBF7qTQEVIqSE167WDUaHQUbhpGahAi4Fkx54Cml45XWQYAJ3TnlgKkLDgJVQvyH7LQr7ltCSRYhGclNrxw02bhTqFx9KDhKcYiNyuoPC3mVqDduFJKWxGTmbkLM9ciNynuAamiZe7O4G_mbbTzPrKqkFCulLh4JK6bhoVGLQV0bXoLCTowTN0EmPyoic7MC3_Rx-sIwn8jQjTfXu3299JE_mq8Wlvfy8_HpMniZh8-LMCdnf3G_je3RXNv5DN0p_AT806Ak |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Effective+Exponential-Based+Trust+and+Reputation+Evaluation+System+in+Wireless+Sensor+Networks&rft.jtitle=IEEE+access&rft.au=Jin+Zhao&rft.au=Jifeng+Huang&rft.au=Naixue+Xiong&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=33859&rft.epage=33869&rft_id=info:doi/10.1109%2FACCESS.2019.2904544&rft.externalDocID=8666110 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |