9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018, pp.689-692
In this paper, we address the trust management issue in a military IoT networks where nodes are deployed in harsh and hostile area and communicates. In particular, due to the limited resources of the node, it is of great importance to detect and isolate malicious nodes in an energy-efficient way. Most previous work adopts proactive scanning method that periodically exchanges control messages and does computation for updating trust values over the network, which may incur a waste of energy when no attack is being launched in the network. Here, we present an stepwise approach trust evaluation method using a tree structured routing, in which 1) the trust evaluation process is triggered by nodes only when they sense a suspicious behavior of their child nodes; 2) The evaluation process consists of two phases: querying to its parent node, and local computation of the trust value; Via simulation study using OPNET simulator, it is proven that compared to the existing work, the proposed scheme could achieve the same level of security with much less energy consumption.
ACKNOWLEDGMENT This work has been supported by the Future Combat System Network Technology Research Center program of Defense Acquisition Program Administration and Agency for Defense Development (UD160070BD)