Abstract
In wireless sensor networks, the characteristics of the openness and vulnerability can lead to communication failure and node capture more easily. To cope with the deviation problem caused by the compromised nodes, this paper proposes a situation data fusion mechanism which can enhance reliability and integrality. It makes a reliability assurance scheme, which not only establishes a project distinguishing purposive and purposeless acts, but also builds a trust awareness rule based on historical trust and the correlations among current nodes. Furthermore, the data integrality is ensured in three stages, respectively. Firstly, in event detection stage, the proposed mechanism detects events and pretreats data to improve accuracy through most trust majority rule after collecting data. Moreover, during data fusion stage, data filtration is adopted to extract credible data. Additionally, the fusion weights of transactions depend on trust, so that they will change with the passage of time. As a result, the final fusion data will be closer to real value. Finally, in consistency detection stage, the detection rule with lower communication traffic is utilized to judge whether the centers are credible. Theory analyses and simulation results verify that the new mechanism can reduce the deviation. Meanwhile, reliability and stability have been validly enhanced.
1. Introduction
Owing to the wide coverage, the sharp increase of network flow, the huge amounts of data [1], and the frequent interactions and communications among network resources, future wireless sensor networks need situation data fusion mechanism to manage. Situation awareness [2, 3], such as security and survival situation awareness, regards data fusion as center, so that its model depends on fusion model [4, 5]. Its system structure can be classified into 5 sections: detection, perception, prediction, evaluation, and decision. Those networks with limited sources and store capacities, such as P2P, MANETs, and ad hoc, joining data fusion, can lead to the characteristics of openness, dynamics, and vulnerability, which can easily cause communication failure and node capture. The captured issues affecting the output of aggregators can be classified into two categories: (1) information is falsified in the process of transmission and (2) after information arrives at node, data is falsified by node. Encryption and authentication techniques can deal with the problem in transit, while this paper mainly considers how to fuse the situation data after nodes are compromised. The adversaries want to cause the deviation between fusion value and real value by 3 ways in [6]: (1) fabricating terminal data to misadvise higher center, (2) falsifying or tampering fusion data of center, and (3) hiding information and not telling other nodes related information.
It is an effective measurement building trust model to reduce the influence caused by capture attacks. As a result, many methods based on trust come into being, whereas there is a focus on finding a secure and credible aggregation model. At present, many data fusion researches based on trust [7, 8] hardly consider historical and time correlation. They fuse data with the same transaction weight or with fixed weight.
The aggregation method proposed in [9] regards MEDIAN function as reference to fuse data, which is more reliable than MAX, MIN, AVG [10], and SUM fusion function, because adversary can easily affect the SUM, MAX, and MIN value by changing some data reports. The network aggregation scheme in [11, 12] ensures data integrity and reliability, but it depends on SUM, MAX, or MIN and fusion weights are fixed. It cannot cope with sortie attacks and needs to tackle the detectable evil nodes. The aggregation method based on reputation in [13] supposes true and false data number yield to beta distribution, assuming that only terminals can be captured, which is unpractical, because center also can be captured. The average fusion method (AFR) proposed in [10] refers to AVG as benchmark. After handling data, it uses AVG to fuse data. Heterogeneous neuron fusion (BPR) in [14] regards terminals as neurons and considers fusion as the processing of handling neuron data by primary function. But after fusion, the deviation is big. Above methods can respond known attack and hardly consider time and historical correlation, which also lack consistency rule to detect reliability of node.
This paper proposes a fusion mechanism MCMR based on trust, not only supposing that terminals can be captured, but also considering that centers can be compromised. It considers historical and time correlation and draws up situation trust awareness rule on historical trust and current data correlation. The mechanism contains 3 periods: when detecting events, relative nodes upload data reports to centers, and then, centers judge whether events have happened by most trust majority rule MMR. If they ensure that given events have happened, they will pretreat data before fusing data. Next, they fuse data with the transaction fusion weights related to trusts. Finally, during consistency detection, it utilizes consistence detection rule
This paper is organized as follows. Section 2 introduces the system model. Then, Section 3 introduces situation data fusion mechanism MCMR. In Section 4, we introduce the reliability assurance scheme of mechanism. Section 5 analyzes simulation and evaluates performance. At last, we summarize the paper and point out future directions.
2. System Model
This situation fusion mechanism has 3 steps: event detection, situation data fusion, and consistency detection. At first, the mechanism picks up the relative terminal sensor nodes and central nodes of event. Then, after all relative sensor nodes collect data, they will send data to their upper centers. Next, after centers have fused and tackled data, they will send data to base station. Finally, base station detects consistency of centers and issues the fusion value. The mechanism network model is presented in Figure 1. There are only 3 kinds of nodes in the network: terminal node, center, and base station. The detection coverage of terminal node

Mechanism network model.
As is shown in Figure 1, events x and y occurred simultaneously. The relative sensor nodes of event y are
3. Situation Trust Data Aggregation Mechanism
3.1. Event Detection
Event detection mainly decides whether the contingent event uploaded by sensors has happened or not. Generally, if an event has happened, we can consider its state as 1, or we will consider its state 0. There are several methods to decide the state of event, such as “AND” rule, “OR” rule, “majority” rule. To “AND” rule, only if a sensor says the state is 1, it judges state as 1. To “OR” rule, only if a sensor says the state is 0, it judges state as 0. To common majority rule (CMR), if more than half of sensors say the state is 1, it judges state as 1. In persistent period t, the arrival number of events yields to the random Poisson distribution, so that several events that occur at the same time can be considered as events occurring in slot time
In this part, this mechanism judges the state of event by MMR, which is an improved rule of “majority” rule as follows.
First, trust filtration: the filtration function is
Second, individual detection: the individual detection function is
Finally, base station decision: decision function is f:
(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (14) (15) (16) (17) (18) (19)
In system model,
In event detection, because of the application of MMR, the probability of misrepresentation attack success reduces.
Proposition 1.
If the probability of evil nodes eliminated by MMR is
Proof.
To w concurrence events, the false detection probability [15] can be expressed as
When
When
When
Therefore,
3.2. Data Resilient Aggregation
Data fusion is intended to know the concrete data of event. If the event is fire emergency, the data may be the temperature and smoke scope. Fusion methods in [9, 10, 13, 14, 16] presented how to fuse data but did not pretreat data before data fusion. Situation data fusion proposed in this paper considers how to pretreat data, which contains 3 stages: prior judgment, data filtration, and data fusion.
The first stage is prior judgment: when there are several events that happened simultaneously. It processes event data in chronological order. If several events have occurred, the base station will preferentially tackle event with biggest prior. Other events with lower prior will wait until that has been finished. If only one event has happened, it can enter data filtration directly.
Definition 2 (prior judgment rule).
To concurrence events in
In system model, to events x and y, if
The second stage is data filtration: pretreatment of event data.
Definition 3 (data filtration rule).
To current event e, if all relative nodes in
To the center
(1) (2) (3) (4) (5) (6) (7)
In system model, to event y, we can get
The third stage is data fusion: the data fusion rule is as follows.
Definition 4 (data fusion rule).
The data yields to uniform distribution, according to equilibrium theory, multiplying data inverse function,
3.3. Consistency Detection
Definition 5 (consistency detection rule (RSR)).
After base station accepts the fusion value of relative centers in
(1) (2) base station selects λ terminal nodes of centers in data randomly (3) λ nodes send data to base station (4) station computes (5) (6) base station considers all centers in regards (7) (8) (9) station regards (10) (11) (12) station reduces the trust of center (13) (14) (15) (16)
In system model, to event y, at the consistency detection stage, the base station will select λ terminal nodes from the lower level nodes
Presently, most researches hardly have considered consistency detection. This mechanism has used consistency detection

Mechanism flow chat.
4. Reliability Assurance Scheme of Mechanism
In order to ensure its reliability, this mechanism especially builds reliability assurance scheme from two aspects as follows:
establishing trust awareness rule on historical value and current data correlation; building project distinguishing purposive acts and nonpurposive acts.
4.1. Trust Awareness Rule of Mechanism
According to historical trust and current data correlation, the mechanism adjusts trust. If several events occur at the same time, the trust renewal will refer to prior judgment. If there is a new event, it will wait until current event has finished. Owing to evil acts of terminal node, the trust will be reduced by 0.1, but for that of center the trust will be decreased by 0.2. The initial trust of terminal sensor node is 0.8, but that of central node is 1. If the current event is not in the coverage of nodes, the mechanism will retain their trusts. All trusts return initial states, every executing fusion 20 times. In several stages, trust updating is as follows.
To event e, owing to the existence of concealed attack, in event detection, to all relative nodes, only relative nodes in To event e, owing to the existence of concealed attack, in event detection, only relative nodes in To event e, in consistency detection, the base station compares After the mechanism has released the final fusion value, it begins to adjust trust. To all nodes having joined the fusion of current event e, the association degree of arbitrary two nodes between i,
4.2. Distinguishing the Purposive Acts and Nonpurposive Acts
We call the accidental false actions nonpurposive act, while the false reports based on the equipment failure and compromising nodes we call them purposive act. The probability of normal node appearing m consecutive errors is
Therefore, it can distinguish the two kinds of acts based on the consecutive error number. Generally, it defines s consecutive errors as the purposive act. s can be adjusted.
5. Performance Evaluation and Simulation Analysis
In order to evaluate the mechanism performance and prove the applicability and reliability, we simulate the situation data fusion mechanism relying on the above theoretical frame. We consider shadow fading and free path loss when communicating in wireless environment. The hardware experiment environment is Intel Core (TM) Duo 2.66 GHz CPU, 2 GB Memory, Windows XP operating system, MATLAB 7.0 simulation platform. Nodes distribute in 110 m*110 m area symmetrically, with cluster-class method in [18]. Nodes distribution is approximate to uniform distribution. The parameter setting is as in Table 1.
Parameter setting.
We analyze overall and local performance. Overall performance: damage degree, stability, and trust situation. Local performance: probability of attack success of MMR in event detection, complexity, and reliability of RSR in consistency detection.
5.1. Overall Performance Evaluation of Mechanism
We chose algorithms which are as follows: average function fusion rule (AFR) [10] and heterogeneous situation neuron fusion rule (BPR) [14]. Comparing MCMR with above two rules, we describe deviation degree and stability in Figures 3 and 4, respectively. Moreover, we operate them to compute data with recommended parameters and primary function.

Situation of damage degree (MADDP).

The mean square error, nodes, and capture ratio.
5.1.1. Average Function Fusion Rule (AFR)
AFR [10] considers average as primary value when fusing data. After that, it computes fusion value by AVG function. AFR may eliminate some malicious nodes but fail to detect adversaries with abnormal data, which can cause reference average increasing, finally provoking sharp deviation. Meanwhile, the fluctuation of error happens. MCMR can reject abnormal data to improve stability.
5.1.2. Heterogeneous Situation Neuron Fusion Rule (BPR)
BPR [14] regards lower nodes as neurons, defining fusion computing as a process from input to output. The input is processed by primary function, geometric mean function. The weights of neurons adjustment and thresholds adjustment based on last value and error both continuously change. Moreover, there is no strategy to cope with sudden data change due to the lack of data filtration and preprocessing. The deviation also uncontrollably fluctuates.
5.1.3. Damage Degree Evaluation
Owing to many uncertain factors, the mechanism may have damage error inevitably. We define damage degree as the deviation between fusion value and real data. The bigger the damage degree is, the bigger the deviation is. The measure norm is mean absolute degree of damage percentage (MADDP). Consider
The simulation result is like Figure 3, after simulating MCMR, MFR [9], AFR [10], and BPR [14] for 25 times under attack and no attack environment, respectively. From Figure 3(a), we know when there is no attack, MADDP of MFR will be lowest, being close to 0. There are heaves at 13th and 19th events, because terminals without communication have been selected in consistence detection, thus causing damage degree increasing. From Figure 3(b), we can see when there are attacks, MADDP of MCMR will be lowest. AFR is from 0.2 to 0.5. MFR is from 0 to 0.5, but BPR is from 0.6 to 0.95. Because attacks lie in 3rd, 8th, 13th, 15th, and 18th events, MADDP of these four methods increases. Therefore, when there are attacks, MADDP of MCMR is the lowest. When there is no attack, MADDP of MFR is the lowest.
5.1.4. Stability Evaluation
The mechanism regards the minimum mean square error (MMSE) [19, 20] as norm to evaluate stability. Adversaries want to capture nodes to cause MMSE increasing. MCMR can filter out abnormal ones to reduce MMSE of mechanism. According to MADDP of MCMR, MFR, AFR, and BPR, we can obtain variances under attack environment, respectively, as follows: 0.026, 0.073, 0.144, and 0.652. In summary, we can get the performance comparison as in Table 2.
Performance comparison.
According to the detection error of per node
5.1.5. Trust Situation of Mechanism
The mechanism depends on trust to assign weight during data fusion, and it evaluates trust by historical trust and data correlation. It separates trusts into ABCD levels like Table 3.
Trust levela.
aIf the trust level of node is A, it will be eliminated. Only nodes trust level higher than B can access.
The simulation visualizes the misrepresentation and data outlier as in Figure 5. Figure 5(a) shows trust situation after simulating 25 events without attack by MCMR. The gray areas in the upper left are the learning process. Figure 5(b) is trust situation after simulating 25 events with misrepresentations by MCMR. There are always misrepresentations in 14th and 21st nodes, so their trusts reduce from 0.8 to 0.3, gradually. And finally, after their trusts are lower than

Trust situation with attacks and no attack.
Hence, trust situation of the mechanism is the representation of node action. It may skip over some outliers but can visualize trusts of nodes with misrepresentations and data outliers, accurately. The intendant can handle the evil actions and encourage honest actions with the trust situation.
5.2. Local Performance of Mechanism
5.2.1. Probability of Attack Success of MMR in Event Detection Stage
If parameters are

The probability of attack success comparison; l is the probability of rejecting abnormal nodes.
5.2.2. Complexity and Reliability Evaluation of RSR in Consistency Detection
If the maximum number of nodes joining data fusion is

The relationship between complexity and reliability.
6. Conclusion
To cope with the deviation problem caused by compromised nodes in distributed network, this paper proposes situation data fusion mechanism based on trust, making trust awareness rule to improve reliability and processing data from 3 stages: event detection, data fusion, and consistency detection. The deviation between fusion value and real value can be reduced when there are attacks. Because of the application of MMR and the additional consideration about RSR, the reliability can be enhanced. In general, if combining with encryption techniques [6], it can improve performance, especially in big data domain, such as environmental monitoring. How to take strategy to handle abnormal actions may be the research of future work.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
This work is supported by the National Nature Science Foundation of China (no. 61271260, no. 61102062, no. 61301122), NSF of Chongqing (no. cstc2014jcyjA40052), the Research Program of Chongqing Municipal Education Commission (no. KJ1400405), Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), the special fund of Chongqing key laboratory (CSTC), NSF of CQUPT (no. A2013-30), and the Doctor Science Research Starting Foundation of CQUPT (no. A2013-23).
