Trust-Based Intrusion Detection in Wireless Sensor Networks

被引:0
作者
Bao, Fenye [1 ]
Chen, Ing-Ray [1 ]
Chang, MoonJeong [1 ]
Cho, Jin-Hee [2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2011年
关键词
Trust management; intrusion detection; wireless sensor networks; security; false positives; false negatives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, as well as a statistical method for calculating the false alarm probability. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Our results show that there exists an optimal trust threshold for minimizing false positives and false negatives. Further, the optimal trust threshold differs depending on the anticipated wireless sensor network lifetime.
引用
收藏
页数:6
相关论文
共 50 条
[21]   A novel Rule Based Intrusion Detection Framework for Wireless Sensor Networks [J].
Eswari, T. ;
Vanitha, V. .
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, :1019-1022
[22]   On Blockchain Architectures for Trust-based Collaborative Intrusion Detection [J].
Kolokotronis, Nicholas ;
Brotsis, Sotirios ;
Germanos, Georgios ;
Vassilakis, Costas ;
Shiaeles, Stavros .
2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019), 2019, :21-28
[23]   Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks [J].
Gong, Liangyi ;
Wang, Chundong ;
Yang, Hong ;
Li, Zhiyuan ;
Zhao, Zhentang .
MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06) :2515-2524
[24]   Intrusion Detection in Wireless Sensor Networks [J].
Mettu, NaveenaReddy ;
Sasikala, T. .
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, :84-89
[25]   Hybrid intrusion detection system for wireless sensor networks [J].
Hai, Tran Hoang ;
Khan, Faraz ;
Huh, Eui-Nam .
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 :383-396
[26]   Efficient monitoring for intrusion detection in wireless sensor networks [J].
Abdellatif, Takoua ;
Mosbah, Mohamed .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (15)
[27]   Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks [J].
Maidhili, Siri R. ;
Karthik, G. M. .
2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
[28]   Cellular automata trust-based energy drainage attack detection and prevention in Wireless Sensor Networks [J].
Shahid, Jahanzeb ;
Muhammad, Zia ;
Iqbal, Zafar ;
Almadhor, Ahmad S. ;
Javed, Abdul Rehman .
COMPUTER COMMUNICATIONS, 2022, 191 :360-367
[29]   An intrusion detection system for cluster based wireless sensor networks [J].
Deng, Xue ;
Wu, Renyong ;
Wang, Wenru ;
Bu, Renfei .
Information Technology Journal, 2013, 12 (09) :1764-1771
[30]   Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach [J].
Reddy, Yenumula B. ;
Selmic, Rastko .
PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, :218-223