| Literature DB >> 24451471 |
Farruh Ishmanov1, Sung Won Kim2, Seung Yeob Nam3.
Abstract
Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.Entities:
Year: 2014 PMID: 24451471 PMCID: PMC3926644 DOI: 10.3390/s140101877
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Parameters to emulate persistent misbehavior.
| Measured misbehavior | Fixed from 0.1 to 0.4 |
| Random between 0.1 and 0.4 | |
| Forgetting factor ( | 0.6 |
| Trust estimation time interval | Δ |
| Trust threshold ( | 0.6 and 0.5 (60 and 50 for GTMS) |
| Experiment time | 50 Δ |
| Initial trust value | 1 |
Figure 1.Persistent malicious behavior detection under random misbehavior.
Figure 2.Persistent malicious behavior detection under constant misbehavior.
Figure 3.Persistent malicious behavior detection under constant misbehavior.
Figure 4.On-off attack cycle.
Parameters to emulate an on-off attack.
|
| ||
|---|---|---|
| Duration of the on period | Randomly generated between [1;5] Δ | |
| Duration of the off period | Randomly generated between [1;5] Δ | |
| Number of instances of good behavior | On period | Randomly generated between [5;10] |
| Off period | Randomly generated between [1;10] | |
| Number of instances of bad behavior | On period | Randomly generated between [1;5] |
| Off period | 0 | |
| Forgetting factor | 0.6 and 0.7(60 and 70 for GTMS) | |
| Trust estimation time interval | Δ | |
| Experiment time | 75 Δ | |
| Initial trust value | 1 | |
| Trust threshold | 0.6 and 0.7 | |
Figure 5.On-off attack detection.
Parameters to emulate bad mouthing attack.
|
| |
|---|---|
| Number of recommendations in each aggregation | 10 |
| Value of sincere recommendations | Randomly generated between [0.6;0.9] |
| Value of dishonest recommendations | Randomly generated between [0.3;0.5] |
| Trust threshold( | 0.6 and 0.5 (60 and 50 for GTMS) |
| Number of aggregation experiments | 50 |
| Outlier detection threshold | K = 1 and K = 2 |
Figure 6.Recommendation aggregation in the presence of dishonest recommendations.
Figure 7.Dishonest recommendation detection.
Figure 8.Recommendation aggregation in the presence of dishonest recommendations.
Figure 9.Dishonest recommendation detection.