Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks

被引:44
|
作者
Anguraj, Dinesh Kumar [1 ]
Smys, S. [2 ]
机构
[1] Koneru Lakshmaiah KL Univ, Koneru Lakshmaiah Educ Fdn, Guntur 522502, Andhra Pradesh, India
[2] RVS Tech Campus Coimbatore, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Wireless body area network; Clustering; Direct trust; Multi-objective firefly algorithm; Malicious nodes; AUTHENTICATION; SECURITY; PRIVACY;
D O I
10.1007/s11277-018-6005-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For most of the tele-health applications body area networks (BANs) have become a favouring and significant technology. This application domain is exclusive so assuring security and obtaining the trustworthy details of the patients' physiological signs is difficult. To rectify this issue, an attack-resilient malicious node detection scheme (BAN-Trust) is brought-in in the current system, which can identify the malignant attacks on BANs. In this BAN-Trust scheme, malignant nodes is identified according to the nature acquired through the nodes by their own and approvals shared by various nodes. Nevertheless, BAN-Trust conceives the common behaviour among the nodes and it doesn't conceive the energy of the nodes and gather the information for measuring the trust. So, here, trust-based intrusion detection and clustering is proposed in order to identify the malignant nodes and broadcast the energy-effective data. In our work, trust-based intrusion detection model is brought-in for identifying the malignant nodes. Different varieties of trusts were conceives, namely energy, data and communication trust, which can be developed among two sensor nodes. Once after identifying the malignant nodes, the rest of the nodes in the network were gathered in order to create the cluster. Every cluster has one cluster head (CH) that is chosen by utilizing the multi objective firefly algorithm. The target function of this system is to reduce the delay, increase the broadcast energy and throughput. The multiple body sensor nodes were in-charge for gathering different varieties of data that were sent to the CH. The CH then forwards the gathered data to the sink and sends the details to the system via gateway. By utilizing a hybrid encryption algorithm, the system's data is encrypted and forwarded to the hospital server. Decrypting is done on the server side to disclose the exact data. The proposed methodology is executed by utilizing an NS-2 simulator. The experimental output provides that the proposed system accomplishes good performance when distinguished with the current system in terms of precision, recall, throughput, packet delivery ratio and end to end delay.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [41] Trust-based routing for ad-hoc wireless networks
    Pirzada, AA
    Datta, A
    McDonald, C
    2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 326 - 330
  • [42] Trust-based intrusion detection with secure key management integrated into MANET
    Shanthi, K.
    Murugan, D.
    Ganesh Kumar, T.
    INFORMATION SECURITY JOURNAL, 2018, 27 (04): : 183 - 191
  • [43] Trust-based QoS Routing Algorithm for Wireless Sensor Networks
    Wang, Junwei
    Wang, Haifeng
    26TH CHINESE CONTROL AND DECISION CONFERENCE (2014 CCDC), 2014, : 2492 - 2495
  • [44] Towards Trust-based Security Mechanism for Wireless Sensor Networks
    Gao, Jianqiao
    Pan, Julong
    Xu, Zhanyi
    Li, Ziyin
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [45] A trust-based probabilistic coverage algorithm for wireless sensor networks
    Taghikhaki, Zahra
    Meratnia, Nirvana
    Havinga, Paul J. M.
    4TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN-2013) AND THE 3RD INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH), 2013, 21 : 455 - 464
  • [46] A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET
    Sen, Biswaraj
    Meitei, Moirangthem Goldie
    Sharma, Kalpana
    Ghose, Mrinal Kanti
    Sinha, Sanku
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 765 - 775
  • [47] Trust-based Strategies for Wireless Networks Under Partial Monitoring
    Ntemos, Konstantinos
    Kalouptsidis, Nicholas
    Kolokotronis, Nicholas
    2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 2591 - 2595
  • [48] TrustLP: A Trust-Based Localization Protocol for Wireless Sensor Networks
    Abbas, Ash Mohammad
    2015 13TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS NETWORKS (WIOPT), 2015, : 529 - 536
  • [49] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [50] Trust-based security for wireless ad hoc and sensor networks
    Boukerch, A.
    Xu, L.
    El-Khatib, K.
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2413 - 2427