Trust-Based Intrusion Detection in Wireless Sensor Networks

被引:0
作者
Bao, Fenye [1 ]
Chen, Ing-Ray [1 ]
Chang, MoonJeong [1 ]
Cho, Jin-Hee [2 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24061 USA
[2] US Army Res Lab, Adelphi, MD USA
来源
2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2011年
关键词
Trust management; intrusion detection; wireless sensor networks; security; false positives; false negatives;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a trust-based intrusion detection scheme utilizing a highly scalable hierarchical trust management protocol for clustered wireless sensor networks. Unlike existing work, we consider a trust metric considering both quality of service (QoS) trust and social trust for detecting malicious nodes. By statistically analyzing peer-to-peer trust evaluation results collected from sensor nodes, each cluster head applies trust-based intrusion detection to assess the trustworthiness and maliciousness of sensor nodes in its cluster. Cluster heads themselves are evaluated by the base station. We develop an analytical model based on stochastic Petri nets for performance evaluation of the proposed trust-based intrusion detection scheme, as well as a statistical method for calculating the false alarm probability. We analyze the sensitivity of false alarms with respect to the minimum trust threshold below which a node is considered malicious. Our results show that there exists an optimal trust threshold for minimizing false positives and false negatives. Further, the optimal trust threshold differs depending on the anticipated wireless sensor network lifetime.
引用
收藏
页数:6
相关论文
共 50 条
[41]   A Review of Intrusion Detection in 802.15.4-based Wireless Sensor Networks [J].
Khanafer, Mounib ;
Gahi, Youssef ;
Guennoun, Mouhcine ;
Mouftah, Hussein T. .
2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, :95-101
[42]   Signaling game based strategy of intrusion detection in wireless sensor networks [J].
Shen, Shigen ;
Li, Yuanjie ;
Xu, Hongyun ;
Cao, Qiying .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2011, 62 (06) :2404-2416
[43]   Intrusion Detection System Based on Payoff Matrix for Wireless Sensor Networks [J].
Dong, Rongsheng ;
Liu, Lianglong ;
Liu, Jianming ;
Xu, Xuliang .
THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, :3-+
[44]   Fine-grained Trust-based Routing Algorithm for Wireless Sensor Networks [J].
Liangyi Gong ;
Chundong Wang ;
Hong Yang ;
Zhiyuan Li ;
Zhentang Zhao .
Mobile Networks and Applications, 2021, 26 :2515-2524
[45]   A Trust-based Security Aware Congestion Control Algorithm for Wireless Sensor Networks [J].
Pandey, Divya ;
Kushwaha, Vandana .
AD HOC & SENSOR WIRELESS NETWORKS, 2022, 54 (3-4) :249-290
[46]   TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks [J].
Mali, Goutam ;
Misra, Sudip .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) :1978-1991
[48]   Enhanced Trust-based Intrusion Detection System in MANET [J].
Hassan, Kr Lutful ;
Mandal, J. K. ;
Mondal, S. .
JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (08) :509-512
[49]   Distributed Trust based Intrusion Detection Approach in Wireless Sensor Network [J].
Dhakne, Amol R. ;
Chatur, P. N. .
2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, :96-101
[50]   A lightweight intrusion detection framework for wireless sensor networks [J].
Hai, Tran Hoang ;
Huh, Eui-Nam ;
Jo, Minho .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (04) :559-572