2019
DOI: 10.3390/electronics8111359
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs

Abstract: To defend against insider attacks in wireless sensor networks (WSNs), trust mechanisms (TMs) using the notion of trust in human society have been proposed and are still actively researched. In the WSN with a trust mechanism (TM), each sensor node evaluates the trustworthiness of its neighbor sensors based on their behaviors, for example packet forwarding, and collaborates only with trustworthy neighbors while removing untrustworthy neighbor from its neighbor list. The reputation system (RS) is an advanced type… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…The database manipulation attack can be performed as a form of insider attack [21]. Alternatively, similar to the 2015 Ukraine power grid cyber-attack [18], an attacker can seize SCADA under control and manipulate the energy system database to falsify the operational decisions.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The database manipulation attack can be performed as a form of insider attack [21]. Alternatively, similar to the 2015 Ukraine power grid cyber-attack [18], an attacker can seize SCADA under control and manipulate the energy system database to falsify the operational decisions.…”
Section: Resultsmentioning
confidence: 99%
“…During a topological database attack, the attacker may or may not have prior knowledge of the topological connectivity or associated configuration information. For example, an insider with the knowledge of the power system DB connectivity, structure of the database and electric parameter information [21] may launch an attack . In the case when the attacker is not an insider, the adversary may gain the access externally and launch structured (has domain knowledge) or unstructured attacks (lack of domain knowledge).…”
Section: Problem Statementmentioning
confidence: 99%
“…In addition, there are three representative types of consensus algorithms such as Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS) [41]. A consensus algorithm in the blockchain refers to a procedure through which all the peers in the network can reach a common agreement on the states of certain data among distributed nodes [37,41]. There are many studies on advancing existing consensus algorithms in terms of security, fault tolerance, or efficiency [43,44]; in [43], authors proposed a PoS-based consensus protocol in which a meta node can maintain a consistent sub-chain in the Bitcoin blockchain.…”
Section: Blockchain Technology and Hyperledger Fabricmentioning
confidence: 99%
“…The evaluated trust rating is encrypted and broadcasted to their neighbor nodes. In [37], the authors proposed Consensus-based False Information Filtering Algorithm (CFIFA) to show better defense performance against bad-mouthing and false-praise attacks than an existing trust mechanism. In CFIFA, inaccurate or malicious observations information can be filtered out by a consensus algorithm based on a majority voting method, and thus overall trust evaluation process can be guaranteed.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation