Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network


  • Kanchana Devi V School of Computing Science and Engineering, VIT Chennai, Vandalur - Kelambakkam Road Chennai, Tamil Nadu - 600 127,
  • Ganesan R School of Computing Science and Engineering, VIT Chennai, Vandalur - Kelambakkam Road Chennai, Tamil Nadu - 600 127,



Beta Distribution Mathematical Model, Internal Attack, Wireless Sensor Network, Consecutive Failure.


Wireless sensor networks (WSNs) are placed in open environments for the collection of data and are vulnerable to external and internal attacks. The cryptographic mechanisms implemented so far, such as authorization and authentication, are used to restrict external sensor node attacks but cannot prevent internal node attacks. In order to evade internal attacks trust mechanisms are used. In trust mechanisms, firstly, the sensor nodes are monitored using the popular Watchdog mechanism. However, traditional trust models do not pay much attention to selective forwarding and consecutive packet dropping. Sometimes, sensitive data are dropped by internal attackers. This problem is addressed in our proposed model by detecting selective forwarding and consecutive failure of sending packets using the Beta probability density function model.


Download data is not yet available.


Cheng, X., Luo, Y. & Gui, Q., Research on Trust Management Model of Wireless Sensor Networks, in IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 1397-1400, 2018.

Che, S., Feng, R., Liang, X. & Wang, X., A Lightweight Trust Management Based on Bayesian and Entropy for Wireless Sensor Networks, Security and Communication Networks, 8(2), pp. 168-175, 2015.

Marti, S., Giuli, T.J., Lai, K. & Baker, M., Mitigating Routing Misbehavior In Mobile Ad Hoc Networks, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265, 2000.

Varshney, T., Sharma, T. & Sharma, P., Implementation of Watchdog Protocol with AODV in Mobile Ad hoc Network, IEEE Fourth International Conference on on Communication Systems and Network Technologies, pp. 217-221. 2014.

Ammendola, R., Biagioni, A., Frezza, O., Cicero, F.L., Lonardo, A., Paolucci, P.S., Rossetti, D., Simula, F., Tosoratto, L. & Vicini, P., A Hierarchical Watchdog Mechanism for Systemic Fault Awareness on Distributed Systems, Future Generation Computer Systems, 53, pp. 90-99, 2015.

Liu, Y., Zhu, Y., Ni, L. & Xue, G., A Reliability-oriented Transmission Service in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, 22(12), pp. 2100-2107, 2011.

Shen, S., Huang, L., Fan, E., Hu, K., Liu, J. & Cao, Q., Trust Dynamics in WSNs: An Evolutionary Game-Theoretic Approach, Journal of Sensors, Article ID 4254701, 10 pages, 2016.

Sun, B. & Li, D., A Comprehensive Trust-aware Routing Protocol with Multi-Attributes for WSNs, IEEE Access, 6, pp. 4725-4741, 2018.

Ishmanov, F. & Bin Zikria, Y., Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues, Journal of Sensors, 2017.

Meng, W., Li, W., Xiang, Y. & Choo, K.K.R., A Bayesian Inference-Based Detection Mechanism To Defend Medical Smartphone Networks Against Insider Attacks, Journal of Network and Computer Applications, 78, pp. 162-169, 2017.

Alsaedi, N., Hashim, F., Sali, A. & Rokhani, F.Z., Detecting Sybil Attacks in Clustered Wireless Sensor Networks based on Energy Trust System (ETS), Computer Communications, 110, pp. 75-82, 2017.

Li, W., Meng, W., Kwok, L.F. & Horace, H.S., Enhancing Collaborative Intrusion Detection Networks Against Insider Attacks Using Supervised Intrusion Sensitivity-based Trust Management Model, Journal of Network and Computer Applications, 77, pp. 135-145, 2017.

Lin, K., Xu, T., Song, J., Qian, Y. & Sun, Y., Node Scheduling for All-Directional Intrusion Detection in SDR-Based 3D WSNs, IEEE Sensors Journal, 16(20), pp. 7332-7341, 2016.

Farooq, M.U., Wang, X., Yasrab, R. & Qaisar, S., Energy Preserving Detection Model for Collaborative Black Hole Attacks in Wireless Sensor Networks, in 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 395-399, 2016.

Ahmed, A., Bakar, K.A., Channa, M.I., Khan, A.W. & Haseeb, K., Energy-Aware And Secure Routing With Trust For Disaster Response Wireless Sensor Network, Peer-to-Peer Networking and Applica-tions, 10(1), pp. 216-237, 2017.

Chen, H., Wu, H., Zhou, X. & Gao, C., Agent-based Trust Model in Wireless Sensor Networks, IEEE Networking, and Parallel/Distributed Computing, pp. 119-124, 2007.

Otoum, S., Kantarci, B. & Mouftah, H.T., Hierarchical Trust-based Black-hole Detection in WSN-based Smart Grid Monitoring, in IEEE International Conference on Communications (ICC), pp. 1-6, 2017.




How to Cite

V, K. D., & R, G. (2019). Trust-based Selfish Node Detection Mechanism using Beta Distribution in Wireless Sensor Network. Journal of ICT Research and Applications, 13(1), 79-92.