A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

被引:21
作者
Wang, Jian [1 ]
Jiang, Shuai [1 ]
Fapojuwo, Abraham O. [2 ]
机构
[1] Natl Univ Def Technol, Sch Elect Sci & Engn, Changsha 410073, Hunan, Peoples R China
[2] Univ Calgary, Dept Elect & Comp Engn, Calgary, AB T2N 1N4, Canada
关键词
protocol layer; intrusion detection; wireless sensor networks; SYSTEM; ATTACKS; DEFENSE;
D O I
10.3390/s17061227
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.
引用
收藏
页数:19
相关论文
共 41 条
[1]  
Abdullah Md Ibrahim, 2015, International Journal of Computer Network and Information Security, V7, P50, DOI 10.5815/ijcnis.2015.03.07
[2]  
Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
[3]  
Aliahmadipour L., 2011, SCI RES ESSAYS, V31, P6535
[4]  
[Anonymous], 2004, INPROCEEDINGS ACM
[5]  
[Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
[6]  
[Anonymous], 2003, P SENSYS, DOI DOI 10.1145/958491.958494
[7]  
[Anonymous], 2016, P IEEE WIPDA
[8]  
[Anonymous], 2006, INPROCEEDINGS 3
[9]  
Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836
[10]  
Bian K., 2006, P 2006 US KOR C SCI, P228