An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust
Evaluation and Outlier Detection for Wireless Sensor Networks
- URL: http://arxiv.org/abs/2207.10282v1
- Date: Thu, 21 Jul 2022 03:24:35 GMT
- Title: An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust
Evaluation and Outlier Detection for Wireless Sensor Networks
- Authors: Liu Yang, Yinzhi Lu, Simon X. Yang, Yuanchang Zhong, Tan Guo, Zhifang
Liang
- Abstract summary: A fuzzy trust evaluation method is presented to transform the transmission evidences into trust values.
A K-Means based outlier detection scheme is proposed to further analyze plenty of trust values.
An evolutionary game based secure clustering protocol is presented to achieve a trade-off between security assurance and energy saving.
- Score: 8.611020067829509
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Trustworthy and reliable data delivery is a challenging task in Wireless
Sensor Networks (WSNs) due to unique characteristics and constraints. To
acquire secured data delivery and address the conflict between security and
energy, in this paper we present an evolutionary game based secure clustering
protocol with fuzzy trust evaluation and outlier detection for WSNs. Firstly, a
fuzzy trust evaluation method is presented to transform the transmission
evidences into trust values while effectively alleviating the trust
uncertainty. And then, a K-Means based outlier detection scheme is proposed to
further analyze plenty of trust values obtained via fuzzy trust evaluation or
trust recommendation. It can discover the commonalities and differences among
sensor nodes while improving the accuracy of outlier detection. Finally, we
present an evolutionary game based secure clustering protocol to achieve a
trade-off between security assurance and energy saving for sensor nodes when
electing for the cluster heads. A sensor node which failed to be the cluster
head can securely choose its own head by isolating the suspicious nodes.
Simulation results verify that our secure clustering protocol can effectively
defend the network against the attacks from internal selfish or compromised
nodes. Correspondingly, the timely data transfer rate can be improved
significantly.
Related papers
- Privacy Preserving Semi-Decentralized Mean Estimation over Intermittently-Connected Networks [59.43433767253956]
We consider the problem of privately estimating the mean of vectors distributed across different nodes of an unreliable wireless network.
In a semi-decentralized setup, nodes can collaborate with their neighbors to compute a local consensus, which they relay to a central server.
We study the tradeoff between collaborative relaying and privacy leakage due to the data sharing among nodes.
arXiv Detail & Related papers (2024-06-06T06:12:15Z) - FLoW3 -- Web3 Empowered Federated Learning [0.0]
Federated Learning is susceptible to various kinds of attacks like Data Poisoning, Model Poisoning and Man in the Middle attack.
validation is done through consensus by employing Novelty Detection and Snowball protocol.
System is realized by implementing in python and Foundry for smart contract development.
arXiv Detail & Related papers (2023-12-09T04:05:07Z) - TrustGuard: GNN-based Robust and Explainable Trust Evaluation with
Dynamicity Support [59.41529066449414]
We propose TrustGuard, a GNN-based accurate trust evaluation model that supports trust dynamicity.
TrustGuard is designed with a layered architecture that contains a snapshot input layer, a spatial aggregation layer, a temporal aggregation layer, and a prediction layer.
Experiments show that TrustGuard outperforms state-of-the-art GNN-based trust evaluation models with respect to trust prediction across single-timeslot and multi-timeslot.
arXiv Detail & Related papers (2023-06-23T07:39:12Z) - KGTrust: Evaluating Trustworthiness of SIoT via Knowledge Enhanced Graph
Neural Networks [63.531790269009704]
Social Internet of Things (SIoT) is a promising and emerging paradigm that injects the notion of social networking into smart objects (i.e., things)
Due to the risks and uncertainty, a crucial and urgent problem to be settled is establishing reliable relationships within SIoT, that is, trust evaluation.
We propose a novel knowledge-enhanced graph neural network (KGTrust) for better trust evaluation in SIoT.
arXiv Detail & Related papers (2023-02-22T14:24:45Z) - Generative Adversarial Learning for Trusted and Secure Clustering in
Industrial Wireless Sensor Networks [11.56611183738877]
This paper presents a generative adversarial network (GAN) based trust management mechanism for Industrial Wireless Sensor Networks (IWSNs)
It achieves a high detection rate up to 96%, as well as a low false positive rate below 8%.
arXiv Detail & Related papers (2022-10-14T11:20:08Z) - A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier
Detection for Industrial Wireless Sensor Networks [9.238298040561173]
This paper presents a secure clustering protocol with fuzzy trust evaluation and outlier detection.
Experiments verify that our protocol can effectively defend the network against attacks from internal malicious or compromised nodes.
arXiv Detail & Related papers (2022-07-20T14:23:29Z) - TrustGNN: Graph Neural Network based Trust Evaluation via Learnable
Propagative and Composable Nature [63.78619502896071]
Trust evaluation is critical for many applications such as cyber security, social communication and recommender systems.
We propose a new GNN based trust evaluation method named TrustGNN, which integrates smartly the propagative and composable nature of trust graphs.
Specifically, TrustGNN designs specific propagative patterns for different propagative processes of trust, and distinguishes the contribution of different propagative processes to create new trust.
arXiv Detail & Related papers (2022-05-25T13:57:03Z) - Provably Robust Detection of Out-of-distribution Data (almost) for free [124.14121487542613]
Deep neural networks are known to produce highly overconfident predictions on out-of-distribution (OOD) data.
In this paper we propose a novel method where from first principles we combine a certifiable OOD detector with a standard classifier into an OOD aware classifier.
In this way we achieve the best of two worlds: certifiably adversarially robust OOD detection, even for OOD samples close to the in-distribution, without loss in prediction accuracy and close to state-of-the-art OOD detection performance for non-manipulated OOD data.
arXiv Detail & Related papers (2021-06-08T11:40:49Z) - Uncertainty-Aware Deep Calibrated Salient Object Detection [74.58153220370527]
Existing deep neural network based salient object detection (SOD) methods mainly focus on pursuing high network accuracy.
These methods overlook the gap between network accuracy and prediction confidence, known as the confidence uncalibration problem.
We introduce an uncertaintyaware deep SOD network, and propose two strategies to prevent deep SOD networks from being overconfident.
arXiv Detail & Related papers (2020-12-10T23:28:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.