scholarly journals An Enhanced Trust Mechanism with Consensus-Based False Information Filtering Algorithm against Bad-Mouthing Attacks and False-Praise Attacks in WSNs

Electronics ◽  
2019 ◽  
Vol 8 (11) ◽  
pp. 1359 ◽  
Author(s):  
Suh ◽  
Cho

To defend against insider attacks in wireless sensor networks (WSNs), trust mechanisms (TMs) using the notion of trust in human society have been proposed and are still actively researched. In the WSN with a trust mechanism (TM), each sensor node evaluates the trustworthiness of its neighbor sensors based on their behaviors, for example packet forwarding, and collaborates only with trustworthy neighbors while removing untrustworthy neighbor from its neighbor list. The reputation system (RS) is an advanced type of trust mechanism that evaluates the trustworthiness of a node by additionally considering neighbor nodes’ observations or evaluations about it. However, intelligent inside attackers in WSNs can discover the security vulnerabilities of trust mechanisms by examining the operations of TM (or RS), because the software modules of the TM (or RS) are installed and operating in their local storage and memory, and thus, they can avoid detection by the trust mechanisms. Bad-mouthing attacks and false-praise attacks are well-known examples of such intelligent insider attacks. We observed that existing trust mechanisms do not have effective countermeasures to defend against such attacks. In this paper, we propose an enhanced trust mechanism with a consensus-based false information filtering algorithm (TM-CFIFA) that can effectively defend against bad-mouthing attacks and false-praise attacks. According to our experiment results, compared with an existing representative RS model, our TM-CFIFA shortened the detection time of a packet drop attacker, which is supported by a false-praise attacker by at least 83%, and also extended the lifetime of a victim sensor node that is under bad-mouthing attacks by at least 15.8%.

2011 ◽  
Vol 308-310 ◽  
pp. 1740-1745 ◽  
Author(s):  
Xiao Lan Xie ◽  
Liang Liu ◽  
Ying Zhong Cao

Aiming at the existing trust issues under manufacturing environment. This paper proposes a trust model based on feedback evaluation, TMBFCM, from the characteristics of human of trust relationship of human society. The model proposed a set of evaluation indicators of cloud manufacturing services properties, introduced the dynamic trust mechanism for attenuation by time,established the service which cloud manufacturing services providers provided and the feedback evaluation and incentive mechanism given by the user of cloud manufacturing service, improved the dynamic adaptability of the model. The results show that, compared with the existing trust model, the evaluation results are closer to the true service behavior of cloud manufacturing services provider, it can resist all kinds of malicious attacks acts effectively, demonstrated good robustness and recognition.


Author(s):  
Wasan Awad ◽  
Hanin Mohammed Abdullah

Developing security systems to protect the storage systems are needed. The main objective of this paper is to study the security of file storage server of an organization. Different kinds of security threats and a number of security techniques used to protect information will be examined. Thus, in this paper, an assessment plan for evaluating cyber security of local storage systems in organizations is proposed. The assessment model is based on the idea of cyber security domains and risk matrix. The proposed assessment model has been implemented on two prestigious and important organizations in the Kingdom of Bahrain. Storage systems of the assessed organizations found to have cyber security risks of different scales. This conclusion gives certainty to the fact that organizations are not capable of following the cyber security evolution and secure their storage systems from cyber security vulnerabilities and breaches. Organizations with local storage systems can improve the cyber security of their storage systems by applying certain techniques.


2013 ◽  
Vol 330 ◽  
pp. 1028-1031
Author(s):  
Jian Yi Li ◽  
Hui Juan Wang ◽  
Quan Bo Yuan

This paper analyzes the problems of Research and application of filtering algorithm in internet of things.Internet of things is composed of multiple components, to form a distributed network in the Internet, the purpose of this distributed network information filtering algorithm is increasing filter algorithm efficiency, and combinating the laboratory intelligent monitoring platform,it can effectively solve the problem caused by defects of filtering algorithm in internet of things.


2020 ◽  
Vol 1 (3) ◽  
pp. 141-148
Author(s):  
R. Ramalakshmi ◽  
S. Subash Prabhu ◽  
C. Balasubramanianb

The sensor network is used to observe surrounding area gathered and spread the information to other sink.The advantage of this network is used to improve life time and energy. The first sensor node or group of sensor nodesin the network runs out of energy. The aggregator node can send aggregate value to the base station. The sensornode can be used to assign initial weights for each node. This sensor node calculates weight for each node. Whichsensor node weight should be lowest amount they can act as a cluster head. The joint node can send false data to theaggregator node and then these node controls to adversary. The dependability at any given instant represents ancomprehensive behavior of participate to be various types of defects and misconduct. The adversary can sendinformation to aggregator node then complexity will be occurred. These nodes are used to reduce the energy andband width.


2019 ◽  
Vol 134 ◽  
pp. 198-206 ◽  
Author(s):  
Noshina Tariq ◽  
Muhammad Asim ◽  
Zakaria Maamar ◽  
M. Zubair Farooqi ◽  
Noura Faci ◽  
...  

2014 ◽  
Vol 687-691 ◽  
pp. 2224-2228 ◽  
Author(s):  
Li Zhu ◽  
Lan Bai

The popularity of Internet application makes web page illegal information filtering an important work. Based on mutual information model study of illegal information filtering in web page, this article first elaborated the theoretical basis of mutual information filtering algorithm, then designed a mutual information filtering algorithm based on improved formula, and designed and implemented illegal web page filtering system by using the algorithm and related technology and did a series of experiments, which effectively reduced the impact of negative factors on healthy development of network culture industry, and it is advantageous to the purification of social morality and social stability.


2019 ◽  
Vol 93 ◽  
pp. 105310 ◽  
Author(s):  
Shuai Zhang ◽  
Yang Guo ◽  
Zhaoxing Lu ◽  
Shicheng Wang ◽  
Zhiguo Liu

Sign in / Sign up

Export Citation Format

Share Document