A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier
Detection for Industrial Wireless Sensor Networks
- URL: http://arxiv.org/abs/2207.09936v1
- Date: Wed, 20 Jul 2022 14:23:29 GMT
- Title: A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier
Detection for Industrial Wireless Sensor Networks
- Authors: Liu Yang, Yinzhi Lu, Simon X. Yang, Tan Guo, Zhifang Liang
- Abstract summary: This paper presents a secure clustering protocol with fuzzy trust evaluation and outlier detection.
Experiments verify that our protocol can effectively defend the network against attacks from internal malicious or compromised nodes.
- Score: 9.238298040561173
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Security is one of the major concerns in Industrial Wireless Sensor Networks
(IWSNs). To assure the security in clustered IWSNs, this paper presents a
secure clustering protocol with fuzzy trust evaluation and outlier detection
(SCFTO). Firstly, to deal with the transmission uncertainty in an open wireless
medium, an interval type-2 fuzzy logic controller is adopted to estimate the
trusts. And then a density based outlier detection mechanism is introduced to
acquire an adaptive trust threshold used to isolate the malicious nodes from
being cluster heads. Finally, a fuzzy based cluster heads election method is
proposed to achieve a balance between energy saving and security assurance, so
that a normal sensor node with more residual energy or less confidence on other
nodes has higher probability to be the cluster head. Extensive experiments
verify that our secure clustering protocol can effectively defend the network
against attacks from internal malicious or compromised nodes.
Related papers
- Physical Layer Deception with Non-Orthogonal Multiplexing [52.11755709248891]
We propose a novel framework of physical layer deception (PLD) to actively counteract wiretapping attempts.
PLD combines PLS with deception technologies to actively counteract wiretapping attempts.
We prove the validity of the PLD framework with in-depth analyses and demonstrate its superiority over conventional PLS approaches.
arXiv Detail & Related papers (2024-06-30T16:17:39Z) - Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework [17.919501880326383]
This paper introduces a robust zero-trust architecture (ZTA) tailored for the decentralized system that empowers efficient remote work and collaboration within IoT networks.
Using blockchain-based federated learning principles, our proposed framework includes a robust aggregation mechanism designed to counteract malicious updates from compromised clients.
The framework integrates anomaly detection and trust computation, ensuring secure and reliable device collaboration in a decentralized fashion.
arXiv Detail & Related papers (2024-06-24T23:15:19Z) - Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks [59.43433767253956]
We consider the problem of privately estimating the mean of vectors distributed across different nodes of an unreliable wireless network.
In a semi-decentralized setup, nodes can collaborate with their neighbors to compute a local consensus, which they relay to a central server.
We study the tradeoff between collaborative relaying and privacy leakage due to the data sharing among nodes.
arXiv Detail & Related papers (2024-06-06T06:12:15Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Distributed Information-theoretical Secure Protocols for Quantum Key
Distribution Networks against Malicious Nodes [15.200383830307915]
Quantum key distribution (QKD) networks are expected to enable information-theoretical secure (ITS) communication over a large-scale network.
Current research on QKD networks primarily addresses passive attacks conducted by malicious nodes such as eavesdropping.
We suggest a novel paradigm, inspired by distributed systems, to address the active attack by collaborate malicious nodes in QKD networks.
arXiv Detail & Related papers (2023-02-14T11:53:22Z) - Generative Adversarial Learning for Trusted and Secure Clustering in
Industrial Wireless Sensor Networks [11.56611183738877]
This paper presents a generative adversarial network (GAN) based trust management mechanism for Industrial Wireless Sensor Networks (IWSNs)
It achieves a high detection rate up to 96%, as well as a low false positive rate below 8%.
arXiv Detail & Related papers (2022-10-14T11:20:08Z) - LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in
Beyond 5G [9.63617966257402]
Intrusion detection signifies a central approach to ensuring the security of the communication network.
A Layerwise Graph Theory-Based Intrusion Detection System (LGTBIDS) algorithm is designed to detect the attacked node.
Results validate the better performance, low time computations, and low complexity.
arXiv Detail & Related papers (2022-10-06T05:32:03Z) - An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust
Evaluation and Outlier Detection for Wireless Sensor Networks [8.611020067829509]
A fuzzy trust evaluation method is presented to transform the transmission evidences into trust values.
A K-Means based outlier detection scheme is proposed to further analyze plenty of trust values.
An evolutionary game based secure clustering protocol is presented to achieve a trade-off between security assurance and energy saving.
arXiv Detail & Related papers (2022-07-21T03:24:35Z) - Robustness Certificates for Implicit Neural Networks: A Mixed Monotone
Contractive Approach [60.67748036747221]
Implicit neural networks offer competitive performance and reduced memory consumption.
They can remain brittle with respect to input adversarial perturbations.
This paper proposes a theoretical and computational framework for robustness verification of implicit neural networks.
arXiv Detail & Related papers (2021-12-10T03:08:55Z) - Uncertainty-Aware Deep Calibrated Salient Object Detection [74.58153220370527]
Existing deep neural network based salient object detection (SOD) methods mainly focus on pursuing high network accuracy.
These methods overlook the gap between network accuracy and prediction confidence, known as the confidence uncalibration problem.
We introduce an uncertaintyaware deep SOD network, and propose two strategies to prevent deep SOD networks from being overconfident.
arXiv Detail & Related papers (2020-12-10T23:28:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.