Skip to main content
Top

2020 | OriginalPaper | Chapter

Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless Sensor Networks are ubiquitous. The use of WSN saves a lot of man-power and instrumentation for a lot of healthcare and especially industrial applications. This paper describes the work done on securing cluster based WSNs using IDP mechanism. An Intrusion Detection and Prevention Mechanism is proposed here based on State Context and Hierchical Trust in cluster based WSNs. An IDP system will prevent and detect attacks on WSN nodes before they happen and jeopardize the whole network. The paper proposes a system which is flexible and is suitable for the WSNs that are constantly changing, characterized by changes in their perceptual environment, transitions of state of nodes and variation in trust value. A multilevel 2-tier hierarchical trust mechanism at the level of SNs and CHs evaluated on the basis of interactive trust, honesty trust and content trust is put forward, which is a combination of direct evaluation and feed-back based evaluation in the fixed-hop range. The calculation of interactive trust and honesty trust is done based on the interaction and behavior of the sensor nodes during routing. While the calculation of content trust is done based on the deviation of data transferred with respect to the rest of the members in the cluster during data aggregation. CHs evaluates the trust of the cluster member SNs, while the trust of the CH is evaluated by its neighboring SNs. When the trust evaluation process is done, then the data from low trust cluster members are avoided. Forwarding of data through low trust cluster members is avoided. Initially the attacker node tries to communicate to the rest of the nodes via fake control messages for getting itself elected to the level of CH. The mechanism proposed here in this paper will not only prevent the attacker node but also reduce the overall resource overhead while improving network performance. This paper tries to give its small contribution in the security of cluster based WSNs using IDP mechanisms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)CrossRef Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)CrossRef
3.
go back to reference He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012) He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012)
4.
go back to reference He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)CrossRef He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)CrossRef
5.
go back to reference Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)CrossRef Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)CrossRef
6.
go back to reference Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)CrossRef Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)CrossRef
7.
go back to reference Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004) Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004)
8.
go back to reference Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006) Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006)
9.
go back to reference Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015) Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015)
10.
go back to reference Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015) Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015)
11.
go back to reference Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)CrossRef
Metadata
Title
Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs
Authors
Abhishek Vyas
Satheesh Abimannan
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_25