4.6 Article

Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks

Journal

SENSORS
Volume 20, Issue 6, Pages -

Publisher

MDPI
DOI: 10.3390/s20061592

Keywords

cross-validation; anti-collaborative attack; resource-saving; trust computing; wireless sensor networks

Funding

  1. National Nature Science Foundation of China [61872110, 61672111]
  2. Joint Fund of NSFC-General Technology Fundamental Research [U1836215]
  3. Capital Science and Technology Leading Talent Training Project, China [Z191100006119030]

Ask authors/readers for more resources

The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service

Xiaoyong Li, Jie Yuan, Erxia Li, Wenbin Yao, Junping Du

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Article Computer Science, Information Systems

An Efficient and Credible Multi-Source Trust Fusion Mechanism Based on Time Decay for Edge Computing

Wenping Kong, Xiaoyong Li, Liyang Hou, Yanrong Li

ELECTRONICS (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Expanding Training Set for Graph-Based Semi-supervised Classification

Li Tan, Wenbin Yao, Xiaoyong Li

DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT II (2020)

Proceedings Paper Computer Science, Artificial Intelligence

CTransE: An Effective Information Credibility Evaluation Method Based on Classified Translating Embedding in Knowledge Graphs

Yunfeng Li, Xiaoyong Li, Mingjian Lei

DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT II (2020)

Proceedings Paper Computer Science, Cybernetics

Information Eye: A Hybrid Visualization Approach of Exploring Relational Information Space

L. Yang, F. Zhou, X. Y. Li

2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2020)

Proceedings Paper Computer Science, Information Systems

VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode

Ning Guo, Xiaoyong Li, Hui Yin, Yali Gao

INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019) (2020)

Proceedings Paper Computer Science, Software Engineering

Transfer Learning on Natural YES/NO Questions

Heju Yin, Feng Zhou, Xiaoyong Li, Junqiang Zheng, Kai Liu

PROCEEDINGS OF 2020 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2020) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Cross-Scale Correlation Stereo Network

Chao Yang, Wenbin Yao, Xiaoyong Li

2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2020)

Proceedings Paper Automation & Control Systems

Dynamic Music emotion recognition based on CNN-BiLSTM

Pengfei Du, Xiaoyong Li, Yali Gao

PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020) (2020)

Proceedings Paper Engineering, Electrical & Electronic

An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation

Binsi Cai, Xiaoyong Li, Yali Gao

ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2020)

Proceedings Paper Automation & Control Systems

Scene-Edge GRU for Video Caption

Xin Hao, Feng Zhou, Xiaoyong Li

PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020) (2020)

Proceedings Paper Automation & Control Systems

An efficient intrusion detection model based on deepFM

Yuchen Ji, Xiaoyong Li

PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020) (2020)

Proceedings Paper Automation & Control Systems

An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence

Han Wu, Xiaoyong Li, Yali Gao

PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020) (2020)

Article Computer Science, Information Systems

Unsupervised Anomaly Detection for Network Data Streams in Industrial Control Systems

Limengwei Liu, Modi Hu, Chaoqun Kang, Xiaoyong Li

INFORMATION (2020)

No Data Available