Intrusion Detection and Prevention Based on State Context and Hierarchical Trust in Wireless Sensor Networks

被引:0
作者
Maidhili, Siri R. [1 ]
Karthik, G. M. [1 ]
机构
[1] SRM Engn Coll, Dept Informat Technol, Madras, Tamil Nadu, India
来源
2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI) | 2018年
关键词
Wireless sensor networks; Intrusion Detection System; False Communication; LIGHTWEIGHT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This Wireless sensor networks (WSN) comprises of sensor nodes, deployed in a way to gather the information of environmental conditions from the surroundings. The dispersed quality, forwarding nature and their open source communication medium makes the wireless sensor networks deeply vulnerable which paves a way to various security attacks. Intrusion Detection System (IDS) can be an exemplary interpretation to encounter security attacks at various levels if the network. In WSNs a vulnerability is possible in selecting cluster head among the sensor nodes. Once the compromised sensor node is selected as cluster head which will lead to false communication with Base Station. IDS can neither prevent it nor respond to it, but only can detect it. IDS informs the controller to take necessary action by raising alarms if any attack is detected which is good but also leads to resource wastage and time consumption in the detection process. Prevention should be done at the launching state of the attack in order to scale down the resource wastage and time consumption. Initially the attacker launches the attack to get into the selection of cluster heads (CH) by broadcasting the control messages with fake information such as high energy and neighbor count. The false control messages are effectively detected and the attack is prevented which leads to a massive reduction of overall resource overhead while improving network performance. The experimental simulation work outputs, to detect the attacks at the base level and improves the network performance, to prevent the attack in order to reduce the resource overhead and to perform attack resident routing and data aggregation in WSN
引用
收藏
页数:7
相关论文
共 13 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
[Anonymous], 2004, INPROCEEDINGS ACM
[3]  
[Anonymous], 2006, INPROCEEDINGS 3
[4]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[5]  
Dhakne A., P IEEE INT C
[6]   Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J].
Bao, Fenye ;
Chen, Ing-Ray ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE Transactions on Network and Service Management, 2012, 9 (02) :169-183
[7]   An Attack-Resistant Trust Model Based on Multidimensional Trust Metrics in Underwater Acoustic Sensor Network [J].
Han, Guangjie ;
Jiang, Jinfang ;
Shu, Lei ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (12) :2447-2459
[8]   A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (06) :1164-1175
[9]   ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks [J].
He, Daojing ;
Chen, Chun ;
Chan, Sammy ;
Bu, Jiajun ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (04) :623-632
[10]   LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks [J].
Li, Xiaoyong ;
Zhou, Feng ;
Du, Junping .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) :924-935