TY - JOUR
T1 - An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things
AU - Yu, Yang
AU - Jia, Ziyan
AU - Tao, Weige
AU - Xue, Bo
AU - Lee, Changhoon
N1 - Publisher Copyright:
© 2016, Springer Science+Business Media New York.
PY - 2017/3/1
Y1 - 2017/3/1
N2 - In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.
AB - In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.
KW - Internet of things
KW - Network security
KW - Node behaviors
KW - Trust evaluation
UR - http://www.scopus.com/inward/record.url?scp=84990836949&partnerID=8YFLogxK
U2 - 10.1007/s11277-016-3802-y
DO - 10.1007/s11277-016-3802-y
M3 - Article
AN - SCOPUS:84990836949
SN - 0929-6212
VL - 93
SP - 571
EP - 587
JO - Wireless Personal Communications
JF - Wireless Personal Communications
IS - 2
ER -