A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks †
Abstract
:1. Introduction
2. Related Works
2.1. Gateway-Assisted Trust Evaluation
2.2. Gateway-Independent Trust Evaluation
3. Proposed Scheme
3.1. A Stepwise and Hybrid Trust Evaluation System
3.2. Observation Phase
3.2.1. Local Observation
3.2.2. Collaborative Observation
Algorithm 1 Algorithm for Observation Phase |
Input: The number of packets received from the child node |
The moving average number of packets received from the child node |
The set of child nodes v |
Output: Result of observation phase |
//Local Observation |
for each node u calculates about its child nodes v do |
for each node c ∈ v do |
if node c’s < then |
node c becomes suspicious node |
else |
node c becomes normal node |
end if |
end for |
end for |
//Collaborative Observation |
node u send query to parent node p about suspicious node w |
while query reaches to Gateway do |
if node p has information about node suspicious node w then |
node p sends response to node u about suspicious node w |
break |
else |
node p sends query to its parent node |
end if |
end while |
if Gateway has information about node w then |
gateway sends response to node u about suspicious node w |
else |
gateway determines trust evaluation about suspicious node w |
end if |
3.3. Trust Evaluation Phase
Algorithm 2 Algorithm for Trust Evaluation Phase |
Input: The trustiness of the node k |
The node u is who sends a query against suspicious node w |
Output: Determine how to perform trust evaluation for suspicious node w |
if there are no nodes around suspicious node w to perform the trust evaluation then |
gateway determine Gateway-assisted trust evaluation through physical inspection |
else |
if node w’s trustiness is higher than 0.6 then |
gateway determine Gateway-independent trust evaluation through collaborative inspection |
else |
gateway determine Gateway-assisted trust evaluation through logical inspection |
end if |
end if |
3.3.1. Gateway-Independent Trust Evaluation
3.3.2. Gateway-Assisted Trust Evaluation
3.4. Inspection Result Sharing Phase
Algorithm 3 Algorithm for Gateway-independent and Gateway-assisted Trust Evaluation |
Input: The trustiness of the node k |
The node u is who sends a query against suspicious node w |
The forwarding ratio of the node k |
The malicious node threshold of suspicious node w |
The set of child nodes v |
The logical inspection node l |
Output: Whether the suspicious node is malicious or normal |
//Collaborative inspection |
gateway sends collaborative inspection response to node u |
node u relay response to child nodes v except suspicious node w |
for node c ∈ v do |
node c collects transmission/reception information |
node c reports to node u |
end for |
node u calculates about suspicious node w |
if < then |
suspicious node w becomes malicious node |
else |
suspicious node w becomes normal node |
end if |
//Logical inspection |
gateway selects node l with the highest trustiness T among 1-hop nodes of suspicious node w |
gateway sends logical inspection response to node l |
fori = 1 to 5 do |
node l selects random interval time |
node l calculates in seconds about suspicious node w |
if < then |
++ |
end if |
end for |
if > 2 then |
suspicious node w becomes malicious node |
else |
suspicious node w becomes normal node |
end if |
//Physical inspection |
gateway sends physical inspection response to drone node |
drone node goes to suspicious node w area |
drone node collects transmission/reception information about suspicious node w |
fori = 1 to 10 do |
gateway calculates in t seconds about suspicious node w |
if < then |
++ |
end if |
end for |
if > 4 then |
suspicious node w becomes malicious node |
else |
suspicious node w becomes normal node |
end if |
4. Performance Evaluation
4.1. Simulation Environment
4.2. Simulation Results
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Augustin, A.; Yi, J.; Clausen, T.; Townsley, W. A study of LoRa: Long range & low power networks for the internet of things. Sensors 2016, 16, 1466. [Google Scholar]
- McQueary, C.E. DOT&E FY 2008 Annual Report; DOT&E: Washington, DC, USA, 2008. [Google Scholar]
- Hu, Y.C.; Perrig, A.; Johnson, D.B. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wirel. Networks 2005, 11, 21–38. [Google Scholar] [CrossRef]
- Xiao, B.; Yu, B.; Gao, C. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 2007, 67, 1218–1230. [Google Scholar] [CrossRef]
- Tajeddine, A.; Kayssi, A.; Chehab, A.; Elhajj, I.; Itani, W. CENTERA: A centralized trust-based efficient routing protocol with authentication for wireless sensor networks. Sensors 2015, 15, 3299–3333. [Google Scholar] [CrossRef] [Green Version]
- Bao, F.; Chen, R.; Chang, M.; Cho, J.H. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 2012, 9, 169–183. [Google Scholar] [CrossRef]
- Misra, S.; Bhattarai, K.; Xue, G. BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In Proceedings of the 2011 IEEE International Conference on Communications (ICC 2011), Kyoto, Japan, 5–9 June 2011; pp. 1–5. [Google Scholar]
- Asai, N.; Goka, S.; Shigeno, H. A Trust Model Focusing on Node Usage in Mobile Ad Hoc Networks. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2019), Kyoto, Japan, 11–15 March 2019; pp. 517–522. [Google Scholar]
- Jhaveri, R.H.; Patel, N.M. Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks. Int. J. Commun. Syst. 2017, 30, 3148. [Google Scholar] [CrossRef]
- Mohanapriya, M.; Krishnamurthi, I. Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput. Electr. Eng. 2014, 40, 530–538. [Google Scholar] [CrossRef]
- Marchang, N.; Datta, R. Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf. Secur. 2012, 6, 77–83. [Google Scholar] [CrossRef]
- Lim, J.; Ko, Y.B.; Kim, D.; Kim, D. A Stepwise Approach for Energy Efficient Trust Evaluation in Military IoT Networks. In Proceedings of the 2018 IEEE International Conference on Information and Communication Technology Convergence (ICTC 2018), Jeju Island, Korea, 17–19 October 2018; pp. 689–692. [Google Scholar]
- Johnson, D.B.; Maltz, D.A. Dynamic source routing in ad hoc wireless networks. In Mobile Computing; Springer: Boston, MA, USA, 1996; pp. 153–181. [Google Scholar]
- Perkins, C.E.; Royer, E.M. Ad-hoc on-demand distance vector routing. In Proceedings of the 1999 IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 1999), New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
- Cai, G.; Dias, J.; Seneviratne, L. A survey of small-scale unmanned aerial vehicles: Recent advances and future development trends. Unmanned Syst. 2014, 2, 175–199. [Google Scholar] [CrossRef] [Green Version]
- Gurung, S.; Chauhan, S. A dynamic threshold based approach for mitigating black-hole attack in MANET. Wirel. Networks 2018, 24, 2957–2971. [Google Scholar] [CrossRef]
- Muralidharan, S.; Roy, A.; Saxena, N. MDP-IoT: MDP based interest forwarding for heterogeneous traffic in IoT-NDN environment. Future Gener. Comput. Syst. 2018, 79, 892–908. [Google Scholar] [CrossRef]
- Zheng, D.E.; Carter, W.A. Leveraging the Internet of Things for a More Efficient and Effective Military; Rowman & Littlefield: Lanham, MD, USA, 2015. [Google Scholar]
Parameters | Values |
---|---|
Simulator | OPNET 18.0 |
Network size | 6000 × 6000 m |
Simulation time | 200 s |
Number of nodes | 30 (including 1 gateway) |
Number of malicious nodes | 0-4 |
Attack model | Gray-hole or smart gray-hole |
Gray-hole attack ratio | 10–90% |
Traffic type | Lighting sensor (100 bytes) |
Chemical and biological sensors (120 bytes) | |
Video surveillance H.264 (500 bytes) | |
Packet generation rate | 110 Kbps |
Threshold weight () | 0.5 |
Time Window (t) | 2 s |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lim, J.; Keum, D.; Ko, Y.-B. A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks. Sensors 2020, 20, 1108. https://doi.org/10.3390/s20041108
Lim J, Keum D, Ko Y-B. A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks. Sensors. 2020; 20(4):1108. https://doi.org/10.3390/s20041108
Chicago/Turabian StyleLim, Jihun, Dooho Keum, and Young-Bae Ko. 2020. "A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks" Sensors 20, no. 4: 1108. https://doi.org/10.3390/s20041108
APA StyleLim, J., Keum, D., & Ko, Y. -B. (2020). A Stepwise and Hybrid Trust Evaluation Scheme for Tactical Wireless Sensor Networks. Sensors, 20(4), 1108. https://doi.org/10.3390/s20041108