Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Today modern and innovative applications for health care environment based on Wireless Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor networks are rapidly becoming a fundamental part of medical solutions due to increase in accessibility for healthcare professionals/patients and ultimately leading to reduced healthcare costs. Health watch is becoming popular, however securing data becomes critical as privacy issues are a major concern in wireless systems. Finding threats and blocking them without affecting the network is essential without increasing the processing overheads and energy. In this paper, a Trust Based Adaptive Acknowledgment (TRAACK) Intrusion-Detection System for WSN based on number of active successful deliveries, and Kalman filter to predict node trust is proposed. In TRAACK the entire route based trust strength for multi hop sensor networks is reverted to nodes acting as Security Agent. Based on trust value of entire route, Acknowledgement is initiated on select packets to decrease control overhead. It is observed that the packet delivery ratio for the proposed TRAACK method improves even when malicious nodes are present, the proposed technique TRAACK is able to detect malicious nodes and avoid them in the route discovery process. Simulations show improved performance in the presence of malicious nodes without compromise in energy.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks,52(12), 2292–2330. CrossRef
Omogbadegun, Z. O., & Ayo, C. K. (2007). Impact of mobile and wireless technology on healthcare delivery services. In 3G GSM & mobile computing: An emerging growth engine for national development (pp. 164–171).
Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010, September). WSN-based solutions for security and surveillance. In 2010 European microwave conference (EuMC) (pp. 1762–1765). IEEE.
Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks,9(5), 1103–1113. CrossRef
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing,12(1), 98–110. CrossRef
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications,35(3), 867–880. CrossRef
Athmani, S., Boubiche, D. E., & Bilami, A. (2013, June). Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–5). IEEE.
Shi, Y., & Hou, Y. T. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN),5(4), 32. CrossRef
Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications,14(5), 56–63. CrossRef
Scarfone, K., Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). Special publication 800-94.
Chenguang, H., & Xuejun, S. (2008). An energy-efficient message passing approach in MAC design for wireless sensor networks. In 4th IEEE international conference on circuits and systems for communications, 2008. ICCSC 2008 (pp. 550–554). IEEE.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing,6(5), 536–550. CrossRef
Madhavi, S. (2008). An intrusion detection system in mobile adhoc networks. In International conference on information security and assurance, 2008. ISA 2008 (pp. 7–14). IEEE.
Abduvaliyev, A., Pathan, A. S. K., Zhou, J., Roman, R., & Wong, W. C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. Communications Surveys & Tutorials, IEEE,15(3), 1223–1237. CrossRef
Sourour, M., Adel, B., & Tarek, A. (2009). Adaptive IDS alerts correlation according to the traffic type and the attacks properties. In IEEE international advance computing conference, 2009. IACC 2009 (pp. 1653–1658). IEEE.
Bensefia, H., & Ghoualmi, N. (2011). A new approach for adaptive intrusion detection. In 2011 Seventh international conference on computational intelligence and security (CIS) (pp. 983–987). IEEE.
Yi, P., Zhu, T., Zhang, Q., Wu, Y., & Li, J. (2012). Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. In 2012 IEEE global communications conference (GLOBECOM) (pp. 3037–3042). IEEE.
Hsieh, C.-F., Chen, R.-C., & Huang, Y.-F. (2014). Applying an ontology to a patrol intrusion detection system for wireless sensor networks. International Journal of Distributed Sensor Networks,2014, 14. doi: 10.1155/2014/634748.
Chowdhury, C., & Neogy, S. (2011). Mobile agent security based on trust model in MANET. In A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki & S. M. Thampi (Eds.), Advances in computing and communications (pp. 129–140). Berlin: Springer.
Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigate black hole attack in MANET. In 2012 international conference on computing sciences (ICCS) (pp. 281–285). IEEE.
Biswas, S., Nag, T., & Neogy, S. (2014). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and innovations in mobile computing (AIMoC), 2014 (pp. 157–164). IEEE.
Dave, D., & Dave, P. (2014). An effective black hole attack detection mechanism using permutation based acknowledgement in MANET. In International conference on advances in computing, communications and informatics ICACCI, 2014 (pp. 1690–1696). IEEE.
Manoj, V., Raghavendiran, N., Aaqib, M., & Vijayan, R. (2012). Trust based certificate authority for detection of malicious nodes in MANET. In P. Venkata Krishna, M. Rajasekhara Babu & E. Ariwa (Eds.), Global trends in computing and communication systems (pp. 392–401). Berlin: Springer.
Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 634–640). IEEE.
Sheltami, T., Basabaa, A., & Shakshuki, E. (2014). A3ACKs: Adaptive three acknowledgments intrusion detection system for MANETs. Journal of Ambient Intelligence and Humanized Computing,5(4), 611–620. CrossRef
Archana, T., & Rajkumar, N. (2014). Enhanced acknowledgement based intrusion detection for MANETs. In 2014 international conference on information communication and embedded systems (ICICES) (pp. 1–5). IEEE.
Ye, W., Heidemann, J., & Estrin, D. (2004). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking,12(3), 493–506. CrossRef
Pham, H., & Jha, S. (2005). Addressing mobility in wireless sensor media access protocol. International Journal of Distributed Sensor Networks,1(2), 269–280. CrossRef
Thangaraj, M., Anuradha, S., & Grace, P. S. (2014). A study of energy model in wsn routing using omnet++. International Journal of Application or Innovation in Engineering & Management (IJAIEM),3.
Otero, A., Gazca, L., Huerta, M., & Sagbay, G. (2015). A flooding routing algorithm for a wireless sensor network for seismic events. In 2015 international conference on computing systems and telematics (ICCSAT) (pp. 1–6). IEEE.
Somasundaram, K. K., & Baras, J. S. (2009). Performance improvements in distributed estimation and fusion induced by a trusted core. In 12th international conference on information fusion, 2009. FUSION’09 (pp. 1942–1949). IEEE.
Ishmanov, F., Kim, S. W., & Nam, S. Y. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors,15(3), 7040–7061. CrossRef
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics,60(3), 1089–1098. CrossRef
- An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network
K. R. Valluvan
- Springer US
Jäger, Effizienzsteigerung Magnetlagertechnik/© froxx | istockphotos.com