Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks

被引:7
作者
Prabha, V. Ram [1 ]
Latha, P. [2 ]
机构
[1] VV Coll Engn, Tisaiyanvilai, Tirunelveli, India
[2] Govt Coll Engn, Dept Comp Sci & Engn, Tirunelveli, India
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2017年 / 42卷 / 02期
关键词
Wireless sensor network; intrusion detection; trust management; detection accuracy; false positive; AD HOC; INTRUSION DETECTION; MANAGEMENT; SECURITY;
D O I
10.1007/s12046-016-0588-2
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
There has been a tremendous growth in the field of wireless sensor networks (WSNs) in recent years, which is reflected in various applications. As the use of WSN applications increases, providing security to WSNs becomes a leading issue. This is complex due to the unique features of WSNs. This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node (ETN), correctness (CS) and fairness (FS). In addition to the normal communication-based trust property MSR, this paper uses effective parameters like ETN, which focuses on data and address modification attacks in an effective manner, and two social-interaction-based parameters CS and FS, which address trust-related attacks effectively. Simulation results show that the proposed method has higher performance and provides more security in terms of detection accuracy and false alarm rate.
引用
收藏
页码:143 / 151
页数:9
相关论文
共 19 条
[1]  
[Anonymous], 2004, INPROCEEDINGS ACM
[2]  
[Anonymous], 2008, INT J ELECT COMPUTER
[3]  
[Anonymous], 2006, INPROCEEDINGS 3
[4]   Trust-based security for wireless ad hoc and sensor networks [J].
Boukerch, A. ;
Xu, L. ;
El-Khatib, K. .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2413-2427
[5]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[6]  
Cayirci Erdal., 2009, Security in wireless ad hoc and sensor networks
[7]  
Fuchsberger A., 2005, Information Security Technical Report, V10, P134, DOI 10.1016/j.istr.2005.08.001
[8]   Research on Trust Model of Sensor Nodes in WSNs [J].
Gu Xiang ;
Qiu Jianlin ;
Wang Jin .
2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 :909-913
[9]  
Hongbing Hu, 2009, International Journal of Information and Computer Security, V3, P132, DOI 10.1504/IJICS.2009.028810
[10]   Location verification and trust management for resilient geographic routing [J].
Liu, Ke ;
Abu-Ghazaleh, Nael ;
Kang, Kyoung-Don .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2007, 67 (02) :215-228