{"title":"Trust-based anomaly detection in wireless sensor networks","authors":"Renyong Wu, Xue Deng, R. Lu, Xuemin Shen","doi":"10.1109/ICCChina.2012.6356878","DOIUrl":null,"url":null,"abstract":"Due to the openness of the wireless media and frequent interactions among sensor nodes, security has been tightly related to the data credibility and network reliability in wireless sensor networks (WSNs). In this paper, based on fuzzy theory and evidence theory, we present a novel trust model to detect anomaly nodes in WSNs. Specifically, by observing nodes' behaviors with multi-dimensional characteristics, the proposed model can be used to efficiently identify malicious nodes while validating the normal operations. Extensive simulations are conducted, and the simulation results demonstrate the proposed trust model can achieve higher detection rate of malicious nodes in comparison with previously reported ones.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 1st IEEE International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCChina.2012.6356878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 21
Abstract
Due to the openness of the wireless media and frequent interactions among sensor nodes, security has been tightly related to the data credibility and network reliability in wireless sensor networks (WSNs). In this paper, based on fuzzy theory and evidence theory, we present a novel trust model to detect anomaly nodes in WSNs. Specifically, by observing nodes' behaviors with multi-dimensional characteristics, the proposed model can be used to efficiently identify malicious nodes while validating the normal operations. Extensive simulations are conducted, and the simulation results demonstrate the proposed trust model can achieve higher detection rate of malicious nodes in comparison with previously reported ones.