A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks

07/20/2022
by   Liu Yang, et al.
6

Security is one of the major concerns in Industrial Wireless Sensor Networks (IWSNs). To assure the security in clustered IWSNs, this paper presents a secure clustering protocol with fuzzy trust evaluation and outlier detection (SCFTO). Firstly, to deal with the transmission uncertainty in an open wireless medium, an interval type-2 fuzzy logic controller is adopted to estimate the trusts. And then a density based outlier detection mechanism is introduced to acquire an adaptive trust threshold used to isolate the malicious nodes from being cluster heads. Finally, a fuzzy based cluster heads election method is proposed to achieve a balance between energy saving and security assurance, so that a normal sensor node with more residual energy or less confidence on other nodes has higher probability to be the cluster head. Extensive experiments verify that our secure clustering protocol can effectively defend the network against attacks from internal malicious or compromised nodes.

READ FULL TEXT

page 9

page 11

research
07/21/2022

An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks

Trustworthy and reliable data delivery is a challenging task in Wireless...
research
10/14/2022

Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks

Traditional machine learning techniques have been widely used to establi...
research
11/19/2020

TrustSense: An energy efficient trust scheme for clustered wireless sensor networks

Designing security systems for wireless sensor networks presents a chall...
research
11/26/2021

An Intelligent Vice Cluster Head Election Protocol in WSN

Wireless sensor networks (WSNs) has a practical ability to link a set of...
research
01/16/2020

Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

Wireless sensor networks (WSNs) have been vastly employed in the collect...
research
09/15/2022

Fuzzy-based forest fire prevention and detection by wireless sensor networks

Forest fires may cause considerable damages both in ecosystems and lives...
research
12/03/2019

Prolonging Network Lifetime in Wireless Sensor Networks with Path-Constrained Mobile Sink

Many studies in recent years have considered the use of mobile sinks (MS...

Please sign up or login with your details

Forgot password? Click here to reset