HyperLedger Fabric-Based Proactive Defense against Inside Attackers in the WSN With Trust Mechanism

被引:6
作者
Cho, Kyeongsun [1 ]
Cho, Youngho [1 ]
机构
[1] Korean Natl Def Univ, Grad Sch Def Management, Dept Def Sci Comp Engn, Nonsan 33021, South Korea
关键词
wireless sensor network; trust mechanism; blockchain; HyperLedger Fabric; insider attack defense; WIRELESS SENSOR NETWORKS; MANAGEMENT;
D O I
10.3390/electronics9101659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Wireless Sensor Networks (WSNs), the Trust Mechanism (TM) is used to defend against insider attacks by measuring the trustworthiness of all inside sensor nodes in the network. Thus, each sensor node with TM observes its neighbor nodes' behaviors, evaluates their trustworthiness as numeric trust values, and captures untrustworthy nodes as inside attackers. Although the defense performance of trust mechanisms can be further improved by sharing the information about inside attackers detected by TM with all sensor nodes, the detected inside attacker list must be securely shared with and stored in all sensor nodes in the WSN. However, according to our survey, we observed that most existing studies simply assume that the communication channel for sharing the attacker detection list is reliable and trusted even in the presence of inside attackers in the WSN. In this paper, we propose and implement a proactive defense model that integrates the HyperLedger Fabric and trust mechanism to defend against inside attackers by securely sharing the detected inside attacker list with all sensor nodes in the WSN. In addition, we conduct comparative experiments to show that our proposed model can better defend against inside attackers than an existing trust mechanism. According to our experimental results, our proposed model could lower the attack damage (the number of packet drops) caused by an inside packet drop attacker by 59 to 67% compared to an existing trust mechanism.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 44 条
[1]  
Abu Daia AS., 2018, Annals of Emerging Technologies in Computing, V2, P28, DOI [10.33166/AETiC.2018.04.003, DOI 10.33166/AETIC.2018.04.003]
[2]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[3]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[4]   Wireless sensor networks for healthcare: A survey [J].
Alemdar, Hande ;
Ersoy, Cem .
COMPUTER NETWORKS, 2010, 54 (15) :2688-2710
[5]  
Audun J., 2002, P 15 BLED EL COMM C
[6]  
Bartoletti Massimo, 2017, Financial Cryptography and Data Security. FC 2017 International Workshops WAHC, BITCOIN, VOTING, WTSC, and TA. Revised Selected Papers: LNCS 10323, P494, DOI 10.1007/978-3-319-70278-0_31
[7]  
Chelli K., 2015, P WORLD C ENG LOND U
[8]  
Chen H., 2007, P 8 ACIS INT C SOFTW
[9]  
Cho Y., 2014, 2014 IEEE C COMP
[10]  
Cho Y., 2012, P IEEE S SEC PRIV WO