IDEAS home Printed from https://ideas.repec.org/a/igg/jthi00/v12y2016i2p48-59.html
   My bibliography  Save this article

D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks

Author

Listed:
  • Kai Yang

    (Department of Electronics Technology, Engineering University of Chinese Armed Police Force, Xi'an, China)

  • Shuguang Liu

    (Department of Electronics Technology, Engineering University of Chinese Armed Police Force, Xi'an, China)

  • Xiuguang Li

    (Department of Electronics Technology, Engineering University of Chinese Armed Police Force, Xi'an, China)

  • Xu An Wang

    (Department of Electronics Technology, Engineering University of Chinese Armed Police Force, Xi'an, China)

Abstract

Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, the authors present a novel detection scheme based on Dempster-Shafer (D-S) evidence theory in WSN to detect and isolate misbehavior sensors. However, when the scheme is operated, counter-intuitive results may appear. To overcome this problem, this paper improves the original D-S evidence theory, which defines a new variable to modify the collected evidence before combination and then combines these evidences according to Dempster combination rule. Simulation results show that this scheme can detect and isolate misbehavior sensors effectively and accurately, suppress nodes collusion and improve network performance. Compared with other existing detection scheme, this scheme has more security, robustness and accuracy.

Suggested Citation

  • Kai Yang & Shuguang Liu & Xiuguang Li & Xu An Wang, 2016. "D-S Evidence Theory Based Trust Detection Scheme in Wireless Sensor Networks," International Journal of Technology and Human Interaction (IJTHI), IGI Global, vol. 12(2), pages 48-59, April.
  • Handle: RePEc:igg:jthi00:v:12:y:2016:i:2:p:48-59
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJTHI.2016040104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jthi00:v:12:y:2016:i:2:p:48-59. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.