Trust-Based Intrusion Detection in Wireless Sensor Networks

被引:0
|
作者
Bao, Fenye [1 ]
Chen, Ing-Ray [1 ]
Chang, MoonJeong [1 ]
Cho, Jin-Hee [2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2011年
关键词
Trust management; intrusion detection; wireless sensor networks; security; false positives; false negatives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, as well as a statistical method for calculating the false alarm probability. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Our results show that there exists an optimal trust threshold for minimizing false positives and false negatives. Further, the optimal trust threshold differs depending on the anticipated wireless sensor network lifetime.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    SENSORS, 2017, 17 (06):
  • [2] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [3] Multi-agent trust-based intrusion detection scheme for wireless sensor networks
    Jin, Xianji
    Liang, Jianquan
    Tong, Weiming
    Lu, Lei
    Li, Zhongwei
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 262 - 273
  • [4] Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
    Dinesh Kumar Anguraj
    S. Smys
    Wireless Personal Communications, 2019, 104 : 1 - 20
  • [5] Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
    Anguraj, Dinesh Kumar
    Smys, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) : 1 - 20
  • [6] A Trust-Based Formal Model for Fault Detection in Wireless Sensor Networks
    Wang, Na
    Wang, Jiacun
    Chen, Xuemin
    SENSORS, 2019, 19 (08)
  • [7] TIDS: Trust-Based Intrusion Detection System for Wireless Ad-hoc Networks
    Deb, Novarun
    Chaki, Nabendu
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 80 - 91
  • [8] A Hybrid Trust Based Intrusion Detection System for Wireless Sensor Networks
    Ozcelik, Mert Melih
    Irmak, Erdal
    Ozdemir, Suat
    2017 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2017,
  • [9] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [10] Trust-based backpressure routing in wireless sensor networks
    Venkataraman, Revathi
    Moeller, Scott
    Krishnamachari, Bhaskar
    Rao, T. Rama
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2015, 17 (01) : 27 - 39