{"title":"基于AI技术的无线传感器网络安全路由信任模型","authors":"U. V, J. J., Rajan John, Deepa J","doi":"10.1109/ICSSS54381.2022.9782276","DOIUrl":null,"url":null,"abstract":"This paper proposes a Recommendation Filtering based Trust Model (RFTM) for securing a route between source to sink and filter out dishonest malicious nodes. RFTM filters the dishonest recommendations which are given by malicious neighboring nodes. It is a challenging problem due to the attacks like ballot and bad mouthing attack. This paper also explains the problem of attacks caused by malicious node while propagating trust information in the existing trust models. RFTM uses one of the artificial intelligence technique Dempster Shafer theory and deviation test scheme to avoid false recommendations from trust evaluation. The test results show their efficiency in improving throughput, packet delivery ratio of the network. The nodes are chosen in the test procedure randomly to check the performance of the filtering procedure against neighboring nodes.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Trust Model for Secure Routing in Wireless Sensor Network using AI Technique\",\"authors\":\"U. V, J. J., Rajan John, Deepa J\",\"doi\":\"10.1109/ICSSS54381.2022.9782276\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a Recommendation Filtering based Trust Model (RFTM) for securing a route between source to sink and filter out dishonest malicious nodes. RFTM filters the dishonest recommendations which are given by malicious neighboring nodes. It is a challenging problem due to the attacks like ballot and bad mouthing attack. This paper also explains the problem of attacks caused by malicious node while propagating trust information in the existing trust models. RFTM uses one of the artificial intelligence technique Dempster Shafer theory and deviation test scheme to avoid false recommendations from trust evaluation. The test results show their efficiency in improving throughput, packet delivery ratio of the network. The nodes are chosen in the test procedure randomly to check the performance of the filtering procedure against neighboring nodes.\",\"PeriodicalId\":186440,\"journal\":{\"name\":\"2022 8th International Conference on Smart Structures and Systems (ICSSS)\",\"volume\":\"142 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 8th International Conference on Smart Structures and Systems (ICSSS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSSS54381.2022.9782276\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSS54381.2022.9782276","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust Model for Secure Routing in Wireless Sensor Network using AI Technique
This paper proposes a Recommendation Filtering based Trust Model (RFTM) for securing a route between source to sink and filter out dishonest malicious nodes. RFTM filters the dishonest recommendations which are given by malicious neighboring nodes. It is a challenging problem due to the attacks like ballot and bad mouthing attack. This paper also explains the problem of attacks caused by malicious node while propagating trust information in the existing trust models. RFTM uses one of the artificial intelligence technique Dempster Shafer theory and deviation test scheme to avoid false recommendations from trust evaluation. The test results show their efficiency in improving throughput, packet delivery ratio of the network. The nodes are chosen in the test procedure randomly to check the performance of the filtering procedure against neighboring nodes.