Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks

被引:7
作者
Prabha, V. Ram [1 ]
Latha, P. [2 ]
机构
[1] VV Coll Engn, Tisaiyanvilai, Tirunelveli, India
[2] Govt Coll Engn, Dept Comp Sci & Engn, Tirunelveli, India
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2017年 / 42卷 / 02期
关键词
Wireless sensor network; intrusion detection; trust management; detection accuracy; false positive; AD HOC; INTRUSION DETECTION; MANAGEMENT; SECURITY;
D O I
10.1007/s12046-016-0588-2
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
There has been a tremendous growth in the field of wireless sensor networks (WSNs) in recent years, which is reflected in various applications. As the use of WSN applications increases, providing security to WSNs becomes a leading issue. This is complex due to the unique features of WSNs. This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node (ETN), correctness (CS) and fairness (FS). In addition to the normal communication-based trust property MSR, this paper uses effective parameters like ETN, which focuses on data and address modification attacks in an effective manner, and two social-interaction-based parameters CS and FS, which address trust-related attacks effectively. Simulation results show that the proposed method has higher performance and provides more security in terms of detection accuracy and false alarm rate.
引用
收藏
页码:143 / 151
页数:9
相关论文
共 19 条
[11]   Intrusion detection for routing attacks in sensor networks [J].
Loo, Chong Eik ;
Ng, Mun Yong ;
Leckie, Christopher ;
Palaniswami, Marimuthu .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2006, 2 (04) :313-332
[12]  
Padmavathi D. G., 2009, Int. J. Comput. Sci. Inf. Secur., V4, P117
[13]  
Qassim Q, 2014, INT ARAB J INF TECHN, V11, P500
[14]  
Ram Prabha V, 2014, INT REV COMPUT SOFTW, V9, P1055
[15]   Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks [J].
Shaikh, Riaz Ahmed ;
Jameel, Hassan ;
d'Auriol, Brian J. ;
Lee, Heejo ;
Lee, Sungyoung ;
Song, Young-Jae .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (11) :1698-1712
[16]   On trust models and trust evaluation metrics for ad hoc networks [J].
Theodorakopoulos, G ;
Baras, JS .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :318-328
[17]   Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning [J].
Wei, Zhexiong ;
Tang, Helen ;
Yu, F. Richard ;
Wang, Maoyu ;
Mason, Peter .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (09) :4647-4658
[18]   An intrusion detection system for cluster based wireless sensor networks [J].
Deng, Xue ;
Wu, Renyong ;
Wang, Wenru ;
Bu, Renfei .
Information Technology Journal, 2013, 12 (09) :1764-1771
[19]   Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures [J].
Yu, Yanli ;
Li, Keqiu ;
Zhou, Wanlei ;
Li, Ping .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) :867-880