Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks

被引:44
|
作者
Anguraj, Dinesh Kumar [1 ]
Smys, S. [2 ]
机构
[1] Koneru Lakshmaiah KL Univ, Koneru Lakshmaiah Educ Fdn, Guntur 522502, Andhra Pradesh, India
[2] RVS Tech Campus Coimbatore, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Wireless body area network; Clustering; Direct trust; Multi-objective firefly algorithm; Malicious nodes; AUTHENTICATION; SECURITY; PRIVACY;
D O I
10.1007/s11277-018-6005-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients' physiological signs is difficult. To rectify this issue, an attack-resilient malicious node detection scheme (BAN-Trust) is brought-in in the current system, which can identify the malignant attacks on BANs. In this BAN-Trust scheme, malignant nodes is identified according to the nature acquired through the nodes by their own and approvals shared by various nodes. Nevertheless, BAN-Trust conceives the common behaviour among the nodes and it doesn't conceive the energy of the nodes and gather the information for measuring the trust. So, here, trust-based intrusion detection and clustering is proposed in order to identify the malignant nodes and broadcast the energy-effective data. In our work, trust-based intrusion detection model is brought-in for identifying the malignant nodes. Different varieties of trusts were conceives, namely energy, data and communication trust, which can be developed among two sensor nodes. Once after identifying the malignant nodes, the rest of the nodes in the network were gathered in order to create the cluster. Every cluster has one cluster head (CH) that is chosen by utilizing the multi objective firefly algorithm. The target function of this system is to reduce the delay, increase the broadcast energy and throughput. The multiple body sensor nodes were in-charge for gathering different varieties of data that were sent to the CH. The CH then forwards the gathered data to the sink and sends the details to the system via gateway. By utilizing a hybrid encryption algorithm, the system's data is encrypted and forwarded to the hospital server. Decrypting is done on the server side to disclose the exact data. The proposed methodology is executed by utilizing an NS-2 simulator. The experimental output provides that the proposed system accomplishes good performance when distinguished with the current system in terms of precision, recall, throughput, packet delivery ratio and end to end delay.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [31] Distributed Intrusion Detection Using Mobile Agents in Wireless Body Area Networks
    Odesile, Adedayo
    Thamilarasu, Geethapriya
    2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 144 - 149
  • [32] Trust-based clustering and best route selection strategy for energy efficient wireless sensor networks
    Sudha, G.
    Tharini, C.
    AUTOMATIKA, 2023, 64 (03) : 634 - 641
  • [33] A trust-based clustering approach to form stable clusters in vehicular ad hoc networks
    Singh D.
    Maurya A.K.
    Ranvijay
    Yadav R.S.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (12) : 16209 - 16228
  • [34] An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
    Zawaideh, Firas
    Salamah, Muhammed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [35] AutoTrust: A privacy-enhanced trust-based intrusion detection approach for internet of smart things
    Awan, Kamran Ahmad
    Din, Ikram Ud
    Almogren, Ahmad
    Rodrigues, Joel J. P. C.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 137 : 288 - 301
  • [36] Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
    Zhang, Zhihua
    Zhu, Hongliang
    Luo, Shoushan
    Xin, Yang
    Liu, Xiaoming
    IEEE ACCESS, 2017, 5 : 12088 - 12102
  • [37] Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks
    Gheorghe, Laura
    Rughinis, Razvan
    Tataroiu, Razvan
    2013 ROEDUNET INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH, 12TH EDITION, 2013,
  • [39] A Trust-based Secure Routing Algorithm for Wireless Sensor Networks
    Liu Wei
    Ye Qing
    Yang Nan
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 7726 - 7729
  • [40] Passive Intrusion Detection in Wireless Networks by Exploiting Clustering-based Learning
    Yang, Jie
    Chen, Yingying
    Desai, Sachi
    Quoraishee, Shafik
    WIRELESS SENSING, LOCALIZATION, AND PROCESSING V, 2010, 7706