{"title":"基于信任的无线传感器网络异常检测","authors":"Renyong Wu, Xue Deng, R. Lu, Xuemin Shen","doi":"10.1109/ICCChina.2012.6356878","DOIUrl":null,"url":null,"abstract":"Due to the openness of the wireless media and frequent interactions among sensor nodes, security has been tightly related to the data credibility and network reliability in wireless sensor networks (WSNs). In this paper, based on fuzzy theory and evidence theory, we present a novel trust model to detect anomaly nodes in WSNs. Specifically, by observing nodes' behaviors with multi-dimensional characteristics, the proposed model can be used to efficiently identify malicious nodes while validating the normal operations. Extensive simulations are conducted, and the simulation results demonstrate the proposed trust model can achieve higher detection rate of malicious nodes in comparison with previously reported ones.","PeriodicalId":154082,"journal":{"name":"2012 1st IEEE International Conference on Communications in China (ICCC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"Trust-based anomaly detection in wireless sensor networks\",\"authors\":\"Renyong Wu, Xue Deng, R. Lu, Xuemin Shen\",\"doi\":\"10.1109/ICCChina.2012.6356878\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the openness of the wireless media and frequent interactions among sensor nodes, security has been tightly related to the data credibility and network reliability in wireless sensor networks (WSNs). In this paper, based on fuzzy theory and evidence theory, we present a novel trust model to detect anomaly nodes in WSNs. Specifically, by observing nodes' behaviors with multi-dimensional characteristics, the proposed model can be used to efficiently identify malicious nodes while validating the normal operations. Extensive simulations are conducted, and the simulation results demonstrate the proposed trust model can achieve higher detection rate of malicious nodes in comparison with previously reported ones.\",\"PeriodicalId\":154082,\"journal\":{\"name\":\"2012 1st IEEE International Conference on Communications in China (ICCC)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 1st IEEE International Conference on Communications in China (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCChina.2012.6356878\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 1st IEEE International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCChina.2012.6356878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust-based anomaly detection in wireless sensor networks
Due to the openness of the wireless media and frequent interactions among sensor nodes, security has been tightly related to the data credibility and network reliability in wireless sensor networks (WSNs). In this paper, based on fuzzy theory and evidence theory, we present a novel trust model to detect anomaly nodes in WSNs. Specifically, by observing nodes' behaviors with multi-dimensional characteristics, the proposed model can be used to efficiently identify malicious nodes while validating the normal operations. Extensive simulations are conducted, and the simulation results demonstrate the proposed trust model can achieve higher detection rate of malicious nodes in comparison with previously reported ones.