Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks

被引:44
|
作者
Anguraj, Dinesh Kumar [1 ]
Smys, S. [2 ]
机构
[1] Koneru Lakshmaiah KL Univ, Koneru Lakshmaiah Educ Fdn, Guntur 522502, Andhra Pradesh, India
[2] RVS Tech Campus Coimbatore, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Wireless body area network; Clustering; Direct trust; Multi-objective firefly algorithm; Malicious nodes; AUTHENTICATION; SECURITY; PRIVACY;
D O I
10.1007/s11277-018-6005-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients' physiological signs is difficult. To rectify this issue, an attack-resilient malicious node detection scheme (BAN-Trust) is brought-in in the current system, which can identify the malignant attacks on BANs. In this BAN-Trust scheme, malignant nodes is identified according to the nature acquired through the nodes by their own and approvals shared by various nodes. Nevertheless, BAN-Trust conceives the common behaviour among the nodes and it doesn't conceive the energy of the nodes and gather the information for measuring the trust. So, here, trust-based intrusion detection and clustering is proposed in order to identify the malignant nodes and broadcast the energy-effective data. In our work, trust-based intrusion detection model is brought-in for identifying the malignant nodes. Different varieties of trusts were conceives, namely energy, data and communication trust, which can be developed among two sensor nodes. Once after identifying the malignant nodes, the rest of the nodes in the network were gathered in order to create the cluster. Every cluster has one cluster head (CH) that is chosen by utilizing the multi objective firefly algorithm. The target function of this system is to reduce the delay, increase the broadcast energy and throughput. The multiple body sensor nodes were in-charge for gathering different varieties of data that were sent to the CH. The CH then forwards the gathered data to the sink and sends the details to the system via gateway. By utilizing a hybrid encryption algorithm, the system's data is encrypted and forwarded to the hospital server. Decrypting is done on the server side to disclose the exact data. The proposed methodology is executed by utilizing an NS-2 simulator. The experimental output provides that the proposed system accomplishes good performance when distinguished with the current system in terms of precision, recall, throughput, packet delivery ratio and end to end delay.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
    Dinesh Kumar Anguraj
    S. Smys
    Wireless Personal Communications, 2019, 104 : 1 - 20
  • [2] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [3] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    SENSORS, 2017, 17 (06):
  • [4] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [5] TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
    Deb, Novarun
    Chaki, Nabendu
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 80 - 91
  • [6] Multi-agent trust-based intrusion detection scheme for wireless sensor networks
    Jin, Xianji
    Liang, Jianquan
    Tong, Weiming
    Lu, Lei
    Li, Zhongwei
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 262 - 273
  • [7] Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks
    Usman, Muhammad
    Asghar, Muhammad Rizwan
    Ansari, Imran Shafique
    Granelli, Fabrizio
    Qaraqe, Marwa
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [8] A Trust-based Intrusion Detection System for Mobile RPL Based Networks
    Medjek, Faiza
    Tandjaoui, Djamel
    Romdhani, Imed
    Djedjig, Nabil
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 735 - 742
  • [9] A Trust-Based Energy-Efficient and Reliable Communication Scheme (Trust-Based ERCS) for Remote Patient Monitoring in Wireless Body Area Networks
    Mehmood, Gulzar
    Khan, Muhammad Zahid
    Waheed, Abdul
    Zareei, Mahdi
    Mohamed, Ehab Mahmoud
    IEEE ACCESS, 2020, 8 : 131397 - 131413
  • [10] FACID: A trust-based collaborative decision framework for intrusion detection networks
    Fung, Carol J.
    Zhu, Quanyan
    AD HOC NETWORKS, 2016, 53 : 17 - 31