Trust-Based Intrusion Detection in Wireless Sensor Networks

被引:0
作者
Bao, Fenye [1 ]
Chen, Ing-Ray [1 ]
Chang, MoonJeong [1 ]
Cho, Jin-Hee [2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2011年
关键词
Trust management; intrusion detection; wireless sensor networks; security; false positives; false negatives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, as well as a statistical method for calculating the false alarm probability. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Our results show that there exists an optimal trust threshold for minimizing false positives and false negatives. Further, the optimal trust threshold differs depending on the anticipated wireless sensor network lifetime.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Secure Packet Transfer in Wireless Sensor Networks - A Trust-based Approach [J].
Reddy, Yenumula B. ;
Selmic, Rastko .
PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON NETWORKS (ICN 2011), 2011, :218-223
[32]   An Algorithm of Trust-based Secure Data Aggregation for Wireless Sensor Networks [J].
Ye Z.-W. ;
Wen T. ;
Liu Z.-Y. ;
Fu C.-G. .
Dongbei Daxue Xuebao/Journal of Northeastern University, 2019, 40 (06) :789-794
[33]   Optimized deep learning-based intrusion detection for wireless sensor networks [J].
Vembu, Gowdhaman ;
Ramasamy, Dhanapal .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2023, 36 (13)
[34]   Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm [J].
Tan, Xiaopeng ;
Su, Shaojing ;
Huang, Zhiping ;
Guo, Xiaojun ;
Zuo, Zhen ;
Sun, Xiaoyong ;
Li, Longqing .
SENSORS, 2019, 19 (01)
[35]   Cooperative Intrusion Detection in Wireless Sensor Networks [J].
Krontiris, Ioannis ;
Benenson, Zinaida ;
Giannetsos, Thanassis ;
Freiling, Felix C. ;
Dimitriou, Tassos .
WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2009, 5432 :263-+
[36]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[37]   Intrusion Detection for Wireless Sensor Networks Using Ant Colony [J].
Gul, Murat .
2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, :1453-1456
[38]   Key Management Integrated with Intrusion Detection in Wireless Sensor Networks [J].
Zhang, Xing ;
He, Jingsha ;
Wei, Qian .
2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, :744-+
[39]   Group-based intrusion detection system in wireless sensor networks [J].
Li, Guorui ;
He, Jingsha ;
Fu, Yingfang .
COMPUTER COMMUNICATIONS, 2008, 31 (18) :4324-4332
[40]   An Intrusion Detection Model Based on Danger Theory for Wireless Sensor Networks [J].
Li, Linlin ;
Sun, Liangxu ;
Wang, Gang .
INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (09) :53-65