Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks

A Saidi, K Benahmed, N Seddiki - Ad Hoc Networks, 2020 - Elsevier
A Saidi, K Benahmed, N Seddiki
Ad Hoc Networks, 2020Elsevier
Trust management is an effective technique for dealing with malicious and compromised
nodes in Wireless Sensor Networks (WSNs). It has demonstrated its benefits in various
issues such as secure cluster head (CH) election, secure localization, secure routing and
misbehavior detection. This work presents a secure CH election algorithm and a
misbehavior detection approach. Multiple metrics were used for the CH election, including
the key metric for the election which is the trust degree of the sensor node. The problem of …
Abstract
Trust management is an effective technique for dealing with malicious and compromised nodes in Wireless Sensor Networks (WSNs). It has demonstrated its benefits in various issues such as secure cluster head (CH) election, secure localization, secure routing and misbehavior detection. This work presents a secure CH election algorithm and a misbehavior detection approach. Multiple metrics were used for the CH election, including the key metric for the election which is the trust degree of the sensor node. The problem of selecting the most trustworthy node as CH was also addressed. In addition, a monitoring strategy to evaluate the behavior of sensor nodes using multiple trust types was developed. Thus, the aim was to keep only the trustworthy nodes in the network and eliminate the malicious nodes. The case of a compromised CH was considered; a trust evaluation mechanism at the cluster members level and a local clustering algorithm were adopted to isolate the malicious CH without affecting the network performance. The simulation results indicate that the proposed scheme prevents the malicious nodes from becoming CHs and protects the network from compromised CH after the election. With respect to the misbehavior detection, the proposed scheme achieved a high detection rate of malicious nodes with a low number of false positive and false negative alarms.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果