Abstract | ||
---|---|---|
In this paper, we propose a secure and efficient trust scheme with Bayesian theory to detect whether a node is malicious or not. In order to improve the correctness of detecting behavior, we aim to consider the influence with respect to the internal attacks of compromised nodes as many as possible. Moreover, the information of malicious behaviors is collected by their neighboring nodes and fused by the foregoing hop nodes. And then, the trust value concerning some node is computed by its father node in a route. Moreover, the key exchange of a secure route is implemented by the modified Diffie-Hellman key agreement protocol to guard against man-in-the-middle attack. The simulation results show that, with the increase of trust ratio, the Bayesian theorem can make more credible judgment on whether the network nodes are secure than the Beta function and the efficient clustering scheme for group key management in the present of malicious nodes. © 2012 Springer Science+Business Media, LLC. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/s11277-012-0541-6 | Wireless Personal Communications |
Keywords | Field | DocType |
bayesian theorem,distributed network,internal attacks,secure access control,selfish behavior | Key exchange,Computer science,Computer security,Correctness,Node (networking),Computer network,Access control,Guard (information security),Key-agreement protocol,Cluster analysis,Bayes' theorem | Journal |
Volume | Issue | ISSN |
68 | 4 | 1572-834X |
Citations | PageRank | References |
2 | 0.37 | 19 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jiwen Guo | 1 | 14 | 1.64 |
Xianwei Zhou | 2 | 263 | 45.66 |
Junling Yuan | 3 | 16 | 6.52 |
Haitao Xu | 4 | 95 | 27.38 |