SCIENCE CHINA Information Sciences, Volume 60, Issue 4: 040305(2017) https://doi.org/10.1007/s11432-016-9028-0

## A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution

• AcceptedJan 23, 2017
• PublishedMar 6, 2017
Share
Rating

### Abstract

Compared with the encryption and the authentication which can prevent the external attacks, the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network (WSN). The reputation time-varying (RTV) attacks are internal attacks. In the reputation time-varying attacks, the reputation value of nodes is manipulated to adjust dynamically by the compromised nodes or malicious attackers. Hence, these attacks have greater covert and invasive. In this paper, we propose a Time-window-based Resilient Trust Management Scheme (TRTMS) to defend against the reputation time-varying attacks in wireless sensor network. In this scheme, based on BETA distribution, the behaviors of compromised nodes are analyzed for a period of time, and then the difference judgment and the trend analysis are utilized to identify the abnormality of nodes' reputation value, meanwhile, the control factor $F_c$ and the time window are introduced to verify and remove the compromised modes from the suspected malicious nodes, which refer to those nodes' reputation value changes are caused by the wireless channel changes. The result of simulation shows that our proposed scheme can defend reputation time-varying attacks effectively and it is convenient to implement.

### Acknowledgment

Acknowledgments

This work was partially supported by National Natural Science Foundation of China (Grant No. 61471346), Shanghai Natural Science Foundation (Grant No. 17ZR1429100), International Science and Technology Cooperation Program of China (Grant No. 2014DFA11640), National Program of International Science and Technology Cooperation (Grant No. 2014DFE10160), National Science and Technology Major Project (Grant No. 2014ZX03005001), and National Natural Science Foundation and Shanxi Provincial People's Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115).

### References

[1] Guo M J, Liu Y H, Yu H B, et al. An overview of smart city in China. China Commun, 2016, 13: 203-211 Google Scholar

[2] Xiong Z, Sheng H, Rong W G, et al. Intelligent transportation systems for smart cities: a progress review. Sci China Inf Sci, 2012, 55: 2908-2914 CrossRef Google Scholar

[3] Mois G, Sanislav T, Folea S C. A cyber-physical system for environmental monitoring. IEEE Trans Instrum Meas, 2016, 65: 1463-1471 CrossRef Google Scholar

[4] Yang Y, Zhao C, Yao S, et al. Delay performance of network-coding-based epidemic routing. IEEE Trans Veh Technol, 2016, 65: 3676-3684 CrossRef Google Scholar

[5] Chen W, Jiang X R, Tang Z B, et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks. Artif Intell Rev, 2015, 43: 579-591 CrossRef Google Scholar

[6] Tao X F, Xu X D, Cui Q M. An overview of cooperative communications. IEEE Commun Mag, 2012 50: 65--71. Google Scholar

[7] Yang Y, Zhang W X, Wei K, et al. Power reduction for mobile devices by deploying low-power base stations. IET Commun, 2014, 8: 3372-3380 CrossRef Google Scholar

[8] Saurabh G, Mani B S. Reputation-based framework for high integrity sensor network. In: Proceedings of ACM Workshop on Security of ad hoc and Sensor Network. New York: ACM, 2004. 66--77. Google Scholar

[9] Yang G, Yin G S, Yang W, et al. A reputation-based model for malicious node detection in WSNs (in Chinese). J Harbin Inst Technol, 2009, 41: 158-162 Google Scholar

[10] Jiang J F, Han G J, Wang F, et al. An efficient distributed trust model for wireless sensor network. IEEE Trans Parall Distrib Syst, 2015, 26: 1228-1337 CrossRef Google Scholar

[11] He D J, Chen C, Chan S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inform Technol Biomed, 2012, 16: 1164-1175 CrossRef Google Scholar

[12] Meghanathan N. A distributed trust evaluation model for wireless mobile sensor networks. In: Proceedings of International Conference on Information Technology: New Generations (ITNG), Las Vegas, 2014. 186--191. Google Scholar

[13] UmaRani V, Sundaram K S, Jayashree D. Enhanced beta trust model in wireless sensor networks. In: Proceedings of International Conference on Information Communication and Embedded Systems (ICICES), Tamil Nadu, 2016. 1--5. Google Scholar

[14] Wang N, Liu D Q. Trust model based on changeable sampling frequency for wireless sensor network. In: Proceedings of IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, 2016. 1--4. Google Scholar

[15] Xia H, Jia Z P, Sha E H-M. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 2014, 8: 88-103 CrossRef Google Scholar

[16] Gheorghe L, Rughinis R, Tataroiu R. Adaptive trust management protocol based on intrusion detection for wireless sensor network. In: Proceedings of RoEduNet International Conference on Networking in Education and Research, Constanta, 2013. 1--7. Google Scholar

[17] Fang F, Li J F, Li J. A reputation management scheme based on multi-factor in WSN. In: Proceeding of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). Shenyang, 2013. 3843--3848. Google Scholar

[18] Labraoui N. A reliable trust management scheme in wireless sensor networks. In: Proceedings of IEEE International Symposium on Programming and Systems (ISPS), Algiers, 2015. 1--6. Google Scholar

[19] Su W G, Liao Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun, 2015, 12: 119-126 CrossRef Google Scholar

[20] Ren Y, Zadorozhny V I, Oleshchuk V A, et al. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans Mob Comput, 2014, 13: 1409-1423 CrossRef Google Scholar

[21] Reshmi V, Sajitha M. Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks. In: Proceeding of IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015. 1--6. Google Scholar

[22] Zhu C S, Nicanfar H, Leung V C M, et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur, 2015, 10: 118-131 CrossRef Google Scholar

[23] Fang W D, Zhang C L, Shi Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl, 2016, 59: 88-94 CrossRef Google Scholar

[24] Shafer G. A Mathematical Theory of Evidence. Princeton: Princeton University, 1976. Google Scholar

[25] J{\o}sang A. A logic for uncertain probabilities. Int J Uncertain Fuzz Knowl-Based Syst, 2011, 9: 279-311 Google Scholar

• #### 7

Citations

• Altmetric

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有