Loading [a11y]/accessibility-menu.js
Securing Software-Defined WSNs Communication via Trust Management | IEEE Journals & Magazine | IEEE Xplore

Scheduled Maintenance: On Tuesday, May 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (6:00-10:00 PM UTC). During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Securing Software-Defined WSNs Communication via Trust Management


Abstract:

Software-defined wireless sensor networks (SDWSNs) can be functionally affected by malicious sensor nodes that perform arbitrary actions, e.g., message dropping or floodi...Show More

Abstract:

Software-defined wireless sensor networks (SDWSNs) can be functionally affected by malicious sensor nodes that perform arbitrary actions, e.g., message dropping or flooding. The malicious nodes can degrade the availability of the network due to in-band communications and the inherent lack of secure channels in SDWSNs. In this article, we design a hierarchical trust management scheme for SDWSNs (namely, TSW) to detect potential threats inside SDWSNs while promoting node cooperation and supporting decision making in the forwarding process. TSW evaluates the trustworthiness of involved nodes and enables the detection of malicious behavior at various levels of the SDWSN architecture. We develop sensitive trust computational models to detect several malicious attacks. Furthermore, we propose separate trust scores and parameters for control and data traffic, respectively, to enhance the detection performance against attacks directed at the crucial traffic of the control plane. Furthermore, we develop an acknowledgment-based trust recording mechanism by exploiting some built-in SDN control messages. To ensure the resilience and honesty of the trust scores, a weighted averaging approach is adopted, and a reliability trust metric is defined. Through extensive analyses and numerical simulations, we demonstrate that TSW is efficient in detecting malicious nodes that launch several communications and trust management threats, such as black-hole, selective forwarding, denial of service, bad mouthing, and ON–OFF attacks.
Published in: IEEE Internet of Things Journal ( Volume: 9, Issue: 22, 15 November 2022)
Page(s): 22230 - 22245
Date of Publication: 05 August 2021

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.