Loading…
BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks
With the emergence of WSNs in the recent times, providing trustworthy and reliable data delivery is challenging task due to unique characteristics and constraints of nodes. Malicious node can easily disrupt the integrity of network through the inclusion of false and malicious data and initiate inter...
Saved in:
Published in: | Future generation computer systems 2019-07, Vol.96, p.605-616 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | With the emergence of WSNs in the recent times, providing trustworthy and reliable data delivery is challenging task due to unique characteristics and constraints of nodes. Malicious node can easily disrupt the integrity of network through the inclusion of false and malicious data and initiate internal attacks. Detection of malicious nodes using trust-based security is an effective and lightweight countermeasure as compared to key based security schemes which incurs higher overhead costs. The WSNs will play greater role in the next-generation IoT systems and a compromised node can jeopardize the availability and authenticity of sensory layer. In this paper, an efficient Belief based trust evaluation mechanism (BTEM) is proposed which isolates the malicious node from trust-worthy nodes and defend against Bad-mouth, On–Off and Denial of Service (DoS) attacks. Bayesian estimation approach is used in gathering direct and In-direct trust values of the sensor nodes which further considers the correlation of the data collected over the time and then estimate imprecise knowledge in decision making for secure delivery of data thus avoiding the malicious nodes. Compared with existing approaches, the proposed BTEM performs better in the detection of malicious node (MN), with lesser delay and improved network throughput.
•The use of Bayesian belief based malicious node detection and isolation mechanism for WSNs.•Adopting proposed trust mechanism under varying number of malicious nodes and attacks.•Evaluation and validation of the effectiveness of the proposed mechanism. |
---|---|
ISSN: | 0167-739X 1872-7115 |
DOI: | 10.1016/j.future.2019.02.004 |