Neighbor Node Trust Based Intrusion Detection System for WSN

被引:35
作者
Sajjad, Syed Muhammad [1 ]
Bouk, Safdar Hussain [2 ]
Yousaf, Muhammad [1 ]
机构
[1] Riphah Int Univ, Riphah Inst Syst Engn, Islamabad, Pakistan
[2] Comsats Inst Informat Technol, Dept Elect Engn, Islamabad, Pakistan
来源
6TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2015)/THE 5TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2015) | 2015年 / 63卷
关键词
Intrusion Detection System; Risk; Trust; Trusted Node; Wireless Sensor Network; SENSOR NETWORKS;
D O I
10.1016/j.procs.2015.08.331
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Timely detection of anomalous activity in wireless sensor network is critical for the smooth working of the network. This paper presents an intrusion detection technique based on the calculation of trust of the neighboring node. In the proposed IDS, each node observes the trust level of its neighboring nodes. Based on these trust values, neighboring nodes may be declared as trustworthy, risky or malicious. Trustworthy nodes are recommended to the forwarding engine for packet forwarding purposes. The proposed scheme successfully detects Hello flood attack, jamming attack and selective forwarding attack by analyzing the network statistics and malicious node behavior. The simulation results show that network performs better when neighbor node trust management based anomaly detection technique is in place. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 27 条
[1]  
[Anonymous], 2003, P 12 INT C WORLD WID
[2]  
Azziden F., 2002, IEEE CAN C EL COMP E
[3]  
Bojkovic Zoran S., 2008, INT J COMMUNICATIONS, V2
[4]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[5]   Sensor networks: Evolution, opportunities, and challenges [J].
Chong, CY ;
Kumar, SP .
PROCEEDINGS OF THE IEEE, 2003, 91 (08) :1247-1256
[6]  
Deng H., 2010, IEEE GLOB 2010 WORKS
[7]  
EBINGER P, 2009, COMM NETW SERV RES, P378
[8]   Intrusion Detection Systems for Wireless Sensor Networks: A Survey [J].
Farooqi, Ashfaq Hussain ;
Khan, Farrukh Aslam .
COMMUNICATION AND NETWORKING, 2009, 56 :234-241
[9]   A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory [J].
Feng, Renjian ;
Xu, Xiaofeng ;
Zhou, Xiang ;
Wan, Jiangwen .
SENSORS, 2011, 11 (02) :1345-1360
[10]  
Furong Wang, 2008, 2008 22nd International Conference on Advanced Information Networking and Applications - Workshops, P978, DOI 10.1109/AINA.2008.124