Skip to main content
Top

2019 | OriginalPaper | Chapter

TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs

Authors : Na Dang, Xiaowu Liu, Jiguo Yu, Xiaowei Zhang

Published in: Wireless Algorithms, Systems, and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The efficiency and reliability are crucial indexes when a trust system is applied into Wireless Sensor Networks (WSNs). In this paper, an efficient and reliable Trusted Intrusion Detection System (TIDS) with double cluster heads for WSNs is proposed. Firstly, an intrusion detection scheme based on trust is discussed. The monitoring nodes are responsible for evaluating the credibility of Cluster Member (CM) instead of depending on the feedback between CMs, which is suitable for decreasing the energy consumption of WSNs and reducing the influence of malicious nodes. Secondly, a new trust evaluation method is defined in TIDS and it takes the data forwarding and communication tasks into consideration which may enhance the reliability of Cluster Head (CH). The theoretical and simulation results show that our solution can effectively reduce the system overhead and improve the robustness of WSNs.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014) Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)
2.
go back to reference Parmar, K., Jinwala, D.C.: Concealed data aggregation in wireless sensor networks. Comput. Netw. 103(C), 207–227 (2016) Parmar, K., Jinwala, D.C.: Concealed data aggregation in wireless sensor networks. Comput. Netw. 103(C), 207–227 (2016)
3.
go back to reference Baker, D.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans. Commun. 29(11), 1694–1701 (2003) Baker, D.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans. Commun. 29(11), 1694–1701 (2003)
4.
go back to reference Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE, Maui (2000) Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE, Maui (2000)
5.
go back to reference Zhang, H., Arora, A.: Gs3: scalable self-configuration and self-healing in wireless sensor networks. Comput. Netw. 43(4), 459–480 (2003) Zhang, H., Arora, A.: Gs3: scalable self-configuration and self-healing in wireless sensor networks. Comput. Netw. 43(4), 459–480 (2003)
6.
go back to reference Wei, D., Jin, Y., Vural, S., Moessner, K., Tafazolli, R.: An energy-efficient clustering solution for wireless sensor networks. IEEE Trans. Wirel. Commun. 10(11), 3973–3983 (2011) Wei, D., Jin, Y., Vural, S., Moessner, K., Tafazolli, R.: An energy-efficient clustering solution for wireless sensor networks. IEEE Trans. Wirel. Commun. 10(11), 3973–3983 (2011)
7.
go back to reference Fu, J.S., Liu, Y.: Double cluster heads model for secure and accurate data fusion in wireless sensor networks. Sensors 15(1), 2021–2040 (2015) Fu, J.S., Liu, Y.: Double cluster heads model for secure and accurate data fusion in wireless sensor networks. Sensors 15(1), 2021–2040 (2015)
8.
go back to reference Bao, F., Chen, I.R., Chang, M.J., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012) Bao, F., Chen, I.R., Chang, M.J., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)
9.
go back to reference Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM, Washington DC (2004) Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM, Washington DC (2004)
10.
go back to reference Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Comput. Soc. 9(2), 184–197 (2012) Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Comput. Soc. 9(2), 184–197 (2012)
11.
go back to reference Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5), 1493–1510 (2010) Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5), 1493–1510 (2010)
12.
go back to reference Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications, pp. 411–414. IEEE, Sydney (2006) Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications, pp. 411–414. IEEE, Sydney (2006)
13.
go back to reference Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008) Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008)
14.
go back to reference Liu, C.X., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–11 (2013) Liu, C.X., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–11 (2013)
15.
go back to reference Su, X., Boppana, R.V.: On mitigating in-band wormhole attacks in mobile ad hoc networks. In: Proceedings of IEEE International Conference on Communications, pp. 1136–1141. IEEE, Glasgow (2007) Su, X., Boppana, R.V.: On mitigating in-band wormhole attacks in mobile ad hoc networks. In: Proceedings of IEEE International Conference on Communications, pp. 1136–1141. IEEE, Glasgow (2007)
16.
go back to reference Karlof, C., Wangner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003) Karlof, C., Wangner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)
17.
go back to reference Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in WSN. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 134–141. IEEE, San Francisco (2012) Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in WSN. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 134–141. IEEE, San Francisco (2012)
18.
go back to reference Cho, Y., Qu, G.: Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs. Int. J. Distrib. Sens. Netw. 1–16 (2013) Cho, Y., Qu, G.: Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs. Int. J. Distrib. Sens. Netw. 1–16 (2013)
19.
go back to reference Kefayati, M., Talebi, M.S., Rabiee, H.R., Khalaj, B.H.: On secure consensus information fusion over sensor networks. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 108–115. IEEE, Amman (2007) Kefayati, M., Talebi, M.S., Rabiee, H.R., Khalaj, B.H.: On secure consensus information fusion over sensor networks. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 108–115. IEEE, Amman (2007)
20.
go back to reference Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, Florence (2006) Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, Florence (2006)
21.
go back to reference Sen, J.: Secure and energy-efficient data aggregation in wireless sensor networks. In: Proceedings of the 2nd IEEE Computational Intelligence and Signal Processing. IEEE, Guwahati (2012) Sen, J.: Secure and energy-efficient data aggregation in wireless sensor networks. In: Proceedings of the 2nd IEEE Computational Intelligence and Signal Processing. IEEE, Guwahati (2012)
22.
go back to reference Xiaomei, D.: Secure data aggregation approach based on monitoring in wireless sensor networks. China Commun. 3(3), 101–148 (2012) Xiaomei, D.: Secure data aggregation approach based on monitoring in wireless sensor networks. China Commun. 3(3), 101–148 (2012)
23.
go back to reference Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018) Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)
Metadata
Title
TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs
Authors
Na Dang
Xiaowu Liu
Jiguo Yu
Xiaowei Zhang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-23597-0_6

Premium Partner