Skip to main content

2020 | OriginalPaper | Buchkapitel

Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks are ubiquitous. The use of WSN saves a lot of man-power and instrumentation for a lot of healthcare and especially industrial applications. This paper describes the work done on securing cluster based WSNs using IDP mechanism. An Intrusion Detection and Prevention Mechanism is proposed here based on State Context and Hierchical Trust in cluster based WSNs. An IDP system will prevent and detect attacks on WSN nodes before they happen and jeopardize the whole network. The paper proposes a system which is flexible and is suitable for the WSNs that are constantly changing, characterized by changes in their perceptual environment, transitions of state of nodes and variation in trust value. A multilevel 2-tier hierarchical trust mechanism at the level of SNs and CHs evaluated on the basis of interactive trust, honesty trust and content trust is put forward, which is a combination of direct evaluation and feed-back based evaluation in the fixed-hop range. The calculation of interactive trust and honesty trust is done based on the interaction and behavior of the sensor nodes during routing. While the calculation of content trust is done based on the deviation of data transferred with respect to the rest of the members in the cluster during data aggregation. CHs evaluates the trust of the cluster member SNs, while the trust of the CH is evaluated by its neighboring SNs. When the trust evaluation process is done, then the data from low trust cluster members are avoided. Forwarding of data through low trust cluster members is avoided. Initially the attacker node tries to communicate to the rest of the nodes via fake control messages for getting itself elected to the level of CH. The mechanism proposed here in this paper will not only prevent the attacker node but also reduce the overall resource overhead while improving network performance. This paper tries to give its small contribution in the security of cluster based WSNs using IDP mechanisms.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)CrossRef Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)CrossRef
3.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012) He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012)
4.
Zurück zum Zitat He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)CrossRef He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)CrossRef
5.
Zurück zum Zitat Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)CrossRef Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)CrossRef
6.
Zurück zum Zitat Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)CrossRef Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)CrossRef
7.
Zurück zum Zitat Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004) Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004)
8.
Zurück zum Zitat Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006) Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006)
9.
Zurück zum Zitat Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015) Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015)
10.
Zurück zum Zitat Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015) Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015)
11.
Zurück zum Zitat Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)CrossRef
Metadaten
Titel
Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs
verfasst von
Abhishek Vyas
Satheesh Abimannan
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_25