2011
DOI: 10.3390/s110201345
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory

Abstract: For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless links, battlefield applications and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to be attacked and compromised. In order to address this network security problem, a novel trust evaluation algorithm defined as NBBTE (Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation Algorithm) is proposed, which integrates the approach of nodes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
95
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 158 publications
(95 citation statements)
references
References 19 publications
0
95
0
Order By: Relevance
“…To overcome the drawbacks of probability and Bayesian theory chen and groups studied the fuzzy logic and the inference rule is established to implement the fuzziness and it cannot provide a specific quantitative method for trust value 7 .Due to the above rule it cannot be suit in UWSNS.…”
Section: Trust Management Based On Fuzzy Logicmentioning
confidence: 99%
“…To overcome the drawbacks of probability and Bayesian theory chen and groups studied the fuzzy logic and the inference rule is established to implement the fuzziness and it cannot provide a specific quantitative method for trust value 7 .Due to the above rule it cannot be suit in UWSNS.…”
Section: Trust Management Based On Fuzzy Logicmentioning
confidence: 99%
“…The proposed protocol is combined with a Fuzzy Logic inference system to aid in the selection of the best route based on a combination of three factors: the path length, the available power and the node reputation resulted from the Intrusion Detection System (IDS). Feng et al (2011) have proposed a node behavioral strategies banding belief theory of trust evaluation algorithm that integrates the approach of nodes behavioral strategies and modified evidence theory. They employed a fuzzy set method temporarily to form the basic input vector of evidence.…”
Section: Problem Statement and Proposed Solutionmentioning
confidence: 99%
“…• Fuzzy matching: the degree to the input fundamental steps and condition of the fuzzy logic are determined • Inference: on the basis of the degree of match, the conclusion of the rule is determined • Combination: the result obtained by every fuzzy rules are merged together into a single overall result (Feng et al, 2011) Rule definition: A fuzzy set A in X is characterized by a membership function which are easily implemented by fuzzy conditional statements. In the case of fuzzy statement if the antecedent is true to some degree of membership then the consequent is also true to that same degree.…”
Section: Fuzzy Logicmentioning
confidence: 99%
“…The probabilistic approach adopted is to consider the opinion given by the expert as soft data that is merged with the hard data according to the laws of probability [52]. In [53], authors proposed a Node Behavioral Strategies Banding Belief Theory of the Trust Evaluation (NBBTE) Algorithm. In this approach, at first, each node establishes the direct and indirect trust values of neighbor nodes by comprehensively considering various trust factors such as packet receive, send, strictness, delivery, consistency and availability, etc, and combining these factors together with network security grade, correlation of context time and rewards degree.…”
Section: Trust and Reputationmentioning
confidence: 99%