Intrusion detection scheme based node trust value in WSNs

被引:7
作者
Tong, Wei-Ming [1 ]
Liang, Jian-Quan [1 ]
Lu, Lei [1 ]
Jin, Xian-Ji [1 ]
机构
[1] School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin
来源
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | 2015年 / 37卷 / 07期
关键词
Beta distribution; Intrusion detection; Node trust value; Wireless sensor networks (WSNs);
D O I
10.3969/j.issn.1001-506X.2015.07.27
中图分类号
学科分类号
摘要
In order to achieve a higher detection rate and a lower false positive rate of internal nodes intrusion detection in wireless sensor networks (WSNs), an intrusion detection scheme of cluster WSNs based node trust value is proposed. In this scheme, variety of typical trust attributes of nodes are defined by analyzing the typical network attack characteristics in WSNs, and the theory of Mahalanobis distance is used to judge whether the trust attributes are abnormal to determine whether the nodes are abnormal. Finally, the node trust value which is used to judge the intrusion detection is calculated and updated based on the Beta distribution theory combined with the abnormal discount factor. The simulation results show that the scheme can detect common intrusion and has a higher detection rate and a lower false positive rate. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1644 / 1649
页数:5
相关论文
共 18 条
[1]  
Sedjelmaci H., Senouci S.M., Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks, Proc. of the IEEE International Conference on Global Information Infrastructure Symposium, pp. 1-6, (2013)
[2]  
Bao F., Chen R., Chang M.J., Et al., Trust-based intrusion detection in wireless sensor networks, Proc. of the IEEE International Conference on Communications, pp. 1-6, (2011)
[3]  
Estiri M., Khademzadeh A., A game-theoretical model for intrusion detection in wireless sensor networks, Proc. of the 23rd Canadian Conference on Electrical and Computer Engineering, pp. 1-5, (2010)
[4]  
Tian J.W., Gao M.J., Zhou S.R., Wireless sensor network for community intrusion detection system based on classify support vector machine, Proc. of the IEEE International Conference on Information and Automation, pp. 1217-1221, (2009)
[5]  
Ponomarchuk Y., Seo D.W., Intrusion detection based on traffic analysis in wireless sensor networks, Proc. of the 19th Wireless and Optical Communications Conference, pp. 1-7, (2010)
[6]  
Wang L.M., Liao W.J., The Survival Theory and Technology Research of Wireless Sensor Networks, pp. 172-173, (2011)
[7]  
Hu X.D., Wei Q.F., Tang H., Model and simulation of creditability-based data aggregation for the internet of things, Chinese Journal of Scientific Instrument, 31, 11, pp. 2636-2640, (2010)
[8]  
Lopez J., Roman R., Agudo I., Et al., Trust management system for wireless sensor networks: Best practices, Computer Communication, 33, 9, pp. 1086-1093, (2010)
[9]  
Liu C., Liu Y., Zhang Z., Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks, International Journal of Distributed Sensor Networks, 2013, pp. 1-11, (2013)
[10]  
Gerrigagoitia K., Uribeetxeberria R., Zurutuza U., Et al., Reputation-based intrusion detection system for wireless sensor networks, Proc. of the IEEE International Conference on Complexity in Engineering, pp. 1-5, (2012)