Skip to main content
Top
Published in: Wireless Personal Communications 4/2017

04-05-2016

An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network

Authors: G. Rajeshkumar, K. R. Valluvan

Published in: Wireless Personal Communications | Issue 4/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today modern and innovative applications for health care environment based on Wireless Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor networks are rapidly becoming a fundamental part of medical solutions due to increase in accessibility for healthcare professionals/patients and ultimately leading to reduced healthcare costs. Health watch is becoming popular, however securing data becomes critical as privacy issues are a major concern in wireless systems. Finding threats and blocking them without affecting the network is essential without increasing the processing overheads and energy. In this paper, a Trust Based Adaptive Acknowledgment (TRAACK) Intrusion-Detection System for WSN based on number of active successful deliveries, and Kalman filter to predict node trust is proposed. In TRAACK the entire route based trust strength for multi hop sensor networks is reverted to nodes acting as Security Agent. Based on trust value of entire route, Acknowledgement is initiated on select packets to decrease control overhead. It is observed that the packet delivery ratio for the proposed TRAACK method improves even when malicious nodes are present, the proposed technique TRAACK is able to detect malicious nodes and avoid them in the route discovery process. Simulations show improved performance in the presence of malicious nodes without compromise in energy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.CrossRef Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52(12), 2292–2330.CrossRef
2.
go back to reference Omogbadegun, Z. O., & Ayo, C. K. (2007). Impact of mobile and wireless technology on healthcare delivery services. In 3G GSM & mobile computing: An emerging growth engine for national development (pp. 164–171). Omogbadegun, Z. O., & Ayo, C. K. (2007). Impact of mobile and wireless technology on healthcare delivery services. In 3G GSM & mobile computing: An emerging growth engine for national development (pp. 164–171).
3.
go back to reference Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010, September). WSN-based solutions for security and surveillance. In 2010 European microwave conference (EuMC) (pp. 1762–1765). IEEE. Viani, F., Oliveri, G., Donelli, M., Lizzi, L., Rocca, P., & Massa, A. (2010, September). WSN-based solutions for security and surveillance. In 2010 European microwave conference (EuMC) (pp. 1762–1765). IEEE.
4.
go back to reference Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9(5), 1103–1113.CrossRef Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9(5), 1103–1113.CrossRef
5.
go back to reference Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.CrossRef Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.CrossRef
6.
go back to reference Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.CrossRef Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880.CrossRef
7.
go back to reference Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.CrossRefMATH Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.CrossRefMATH
8.
go back to reference Athmani, S., Boubiche, D. E., & Bilami, A. (2013, June). Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–5). IEEE. Athmani, S., Boubiche, D. E., & Bilami, A. (2013, June). Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs. In 2013 World Congress on Computer and Information Technology (WCCIT) (pp. 1–5). IEEE.
9.
go back to reference Shi, Y., & Hou, Y. T. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.CrossRef Shi, Y., & Hou, Y. T. (2009). Optimal base station placement in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 5(4), 32.CrossRef
10.
go back to reference Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.CrossRef Sun, B., Osborne, L., Xiao, Y., & Guizani, S. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communications, 14(5), 56–63.CrossRef
11.
go back to reference Scarfone, K., Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). Special publication 800-94. Scarfone, K., Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). Special publication 800-94.
12.
go back to reference Chenguang, H., & Xuejun, S. (2008). An energy-efficient message passing approach in MAC design for wireless sensor networks. In 4th IEEE international conference on circuits and systems for communications, 2008. ICCSC 2008 (pp. 550–554). IEEE. Chenguang, H., & Xuejun, S. (2008). An energy-efficient message passing approach in MAC design for wireless sensor networks. In 4th IEEE international conference on circuits and systems for communications, 2008. ICCSC 2008 (pp. 550–554). IEEE.
13.
go back to reference Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.CrossRef
14.
go back to reference Madhavi, S. (2008). An intrusion detection system in mobile adhoc networks. In International conference on information security and assurance, 2008. ISA 2008 (pp. 7–14). IEEE. Madhavi, S. (2008). An intrusion detection system in mobile adhoc networks. In International conference on information security and assurance, 2008. ISA 2008 (pp. 7–14). IEEE.
15.
go back to reference Abduvaliyev, A., Pathan, A. S. K., Zhou, J., Roman, R., & Wong, W. C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. Communications Surveys & Tutorials, IEEE, 15(3), 1223–1237.CrossRef Abduvaliyev, A., Pathan, A. S. K., Zhou, J., Roman, R., & Wong, W. C. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. Communications Surveys & Tutorials, IEEE, 15(3), 1223–1237.CrossRef
16.
go back to reference Sourour, M., Adel, B., & Tarek, A. (2009). Adaptive IDS alerts correlation according to the traffic type and the attacks properties. In IEEE international advance computing conference, 2009. IACC 2009 (pp. 1653–1658). IEEE. Sourour, M., Adel, B., & Tarek, A. (2009). Adaptive IDS alerts correlation according to the traffic type and the attacks properties. In IEEE international advance computing conference, 2009. IACC 2009 (pp. 1653–1658). IEEE.
17.
go back to reference Bensefia, H., & Ghoualmi, N. (2011). A new approach for adaptive intrusion detection. In 2011 Seventh international conference on computational intelligence and security (CIS) (pp. 983–987). IEEE. Bensefia, H., & Ghoualmi, N. (2011). A new approach for adaptive intrusion detection. In 2011 Seventh international conference on computational intelligence and security (CIS) (pp. 983–987). IEEE.
18.
go back to reference Yi, P., Zhu, T., Zhang, Q., Wu, Y., & Li, J. (2012). Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. In 2012 IEEE global communications conference (GLOBECOM) (pp. 3037–3042). IEEE. Yi, P., Zhu, T., Zhang, Q., Wu, Y., & Li, J. (2012). Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. In 2012 IEEE global communications conference (GLOBECOM) (pp. 3037–3042). IEEE.
19.
go back to reference Hsieh, C.-F., Chen, R.-C., & Huang, Y.-F. (2014). Applying an ontology to a patrol intrusion detection system for wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 14. doi:10.1155/2014/634748. Hsieh, C.-F., Chen, R.-C., & Huang, Y.-F. (2014). Applying an ontology to a patrol intrusion detection system for wireless sensor networks. International Journal of Distributed Sensor Networks, 2014, 14. doi:10.​1155/​2014/​634748.
20.
go back to reference Chowdhury, C., & Neogy, S. (2011). Mobile agent security based on trust model in MANET. In A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki & S. M. Thampi (Eds.), Advances in computing and communications (pp. 129–140). Berlin: Springer. Chowdhury, C., & Neogy, S. (2011). Mobile agent security based on trust model in MANET. In A. Abraham, J. L. Mauri, J. F. Buford, J. Suzuki & S. M. Thampi (Eds.), Advances in computing and communications (pp. 129–140). Berlin: Springer.
21.
go back to reference Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigate black hole attack in MANET. In 2012 international conference on computing sciences (ICCS) (pp. 281–285). IEEE. Thachil, F., & Shet, K. C. (2012). A trust based approach for AODV protocol to mitigate black hole attack in MANET. In 2012 international conference on computing sciences (ICCS) (pp. 281–285). IEEE.
22.
go back to reference Biswas, S., Nag, T., & Neogy, S. (2014). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and innovations in mobile computing (AIMoC), 2014 (pp. 157–164). IEEE. Biswas, S., Nag, T., & Neogy, S. (2014). Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In Applications and innovations in mobile computing (AIMoC), 2014 (pp. 157–164). IEEE.
23.
go back to reference Dave, D., & Dave, P. (2014). An effective black hole attack detection mechanism using permutation based acknowledgement in MANET. In International conference on advances in computing, communications and informatics ICACCI, 2014 (pp. 1690–1696). IEEE. Dave, D., & Dave, P. (2014). An effective black hole attack detection mechanism using permutation based acknowledgement in MANET. In International conference on advances in computing, communications and informatics ICACCI, 2014 (pp. 1690–1696). IEEE.
24.
go back to reference Manoj, V., Raghavendiran, N., Aaqib, M., & Vijayan, R. (2012). Trust based certificate authority for detection of malicious nodes in MANET. In P. Venkata Krishna, M. Rajasekhara Babu & E. Ariwa (Eds.), Global trends in computing and communication systems (pp. 392–401). Berlin: Springer. Manoj, V., Raghavendiran, N., Aaqib, M., & Vijayan, R. (2012). Trust based certificate authority for detection of malicious nodes in MANET. In P. Venkata Krishna, M. Rajasekhara Babu & E. Ariwa (Eds.), Global trends in computing and communication systems (pp. 392–401). Berlin: Springer.
25.
go back to reference Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 634–640). IEEE. Al-Roubaiey, A., Sheltami, T., Mahmoud, A., Shakshuki, E., & Mouftah, H. (2010). AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement. In 2010 24th IEEE international conference on advanced information networking and applications (AINA) (pp. 634–640). IEEE.
26.
go back to reference Sheltami, T., Basabaa, A., & Shakshuki, E. (2014). A3ACKs: Adaptive three acknowledgments intrusion detection system for MANETs. Journal of Ambient Intelligence and Humanized Computing, 5(4), 611–620.CrossRef Sheltami, T., Basabaa, A., & Shakshuki, E. (2014). A3ACKs: Adaptive three acknowledgments intrusion detection system for MANETs. Journal of Ambient Intelligence and Humanized Computing, 5(4), 611–620.CrossRef
27.
go back to reference Archana, T., & Rajkumar, N. (2014). Enhanced acknowledgement based intrusion detection for MANETs. In 2014 international conference on information communication and embedded systems (ICICES) (pp. 1–5). IEEE. Archana, T., & Rajkumar, N. (2014). Enhanced acknowledgement based intrusion detection for MANETs. In 2014 international conference on information communication and embedded systems (ICICES) (pp. 1–5). IEEE.
28.
go back to reference Zhao, Y. Z., Miao, C., Ma, M., Zhang, J. B., & Leung, C. (2012). A survey and projection on medium access control protocols for wireless sensor networks. ACM Computing Surveys (csuR), 45(1), 7.CrossRefMATH Zhao, Y. Z., Miao, C., Ma, M., Zhang, J. B., & Leung, C. (2012). A survey and projection on medium access control protocols for wireless sensor networks. ACM Computing Surveys (csuR), 45(1), 7.CrossRefMATH
29.
go back to reference Ye, W., Heidemann, J., & Estrin, D. (2004). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, 12(3), 493–506.CrossRef Ye, W., Heidemann, J., & Estrin, D. (2004). Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE/ACM Transactions on Networking, 12(3), 493–506.CrossRef
30.
go back to reference Pham, H., & Jha, S. (2005). Addressing mobility in wireless sensor media access protocol. International Journal of Distributed Sensor Networks, 1(2), 269–280.CrossRef Pham, H., & Jha, S. (2005). Addressing mobility in wireless sensor media access protocol. International Journal of Distributed Sensor Networks, 1(2), 269–280.CrossRef
31.
go back to reference Thangaraj, M., Anuradha, S., & Grace, P. S. (2014). A study of energy model in wsn routing using omnet++. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3. Thangaraj, M., Anuradha, S., & Grace, P. S. (2014). A study of energy model in wsn routing using omnet++. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3.
32.
go back to reference Otero, A., Gazca, L., Huerta, M., & Sagbay, G. (2015). A flooding routing algorithm for a wireless sensor network for seismic events. In 2015 international conference on computing systems and telematics (ICCSAT) (pp. 1–6). IEEE. Otero, A., Gazca, L., Huerta, M., & Sagbay, G. (2015). A flooding routing algorithm for a wireless sensor network for seismic events. In 2015 international conference on computing systems and telematics (ICCSAT) (pp. 1–6). IEEE.
33.
go back to reference Somasundaram, K. K., & Baras, J. S. (2009). Performance improvements in distributed estimation and fusion induced by a trusted core. In 12th international conference on information fusion, 2009. FUSION’09 (pp. 1942–1949). IEEE. Somasundaram, K. K., & Baras, J. S. (2009). Performance improvements in distributed estimation and fusion induced by a trusted core. In 12th international conference on information fusion, 2009. FUSION’09 (pp. 1942–1949). IEEE.
34.
go back to reference Ishmanov, F., Kim, S. W., & Nam, S. Y. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061.CrossRef Ishmanov, F., Kim, S. W., & Nam, S. Y. (2015). A robust trust establishment scheme for wireless sensor networks. Sensors, 15(3), 7040–7061.CrossRef
35.
go back to reference Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK—A secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.CrossRef
Metadata
Title
An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network
Authors
G. Rajeshkumar
K. R. Valluvan
Publication date
04-05-2016
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2017
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3349-y

Other articles of this Issue 4/2017

Wireless Personal Communications 4/2017 Go to the issue