Skip to main content

2016 | OriginalPaper | Buchkapitel

KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network

verfasst von : Moutushi Singh, Rupayan Das, Mrinal Kanti Sarkar, Koushik Majumder, Subir Kumar Sarkar

Erschienen in: Proceedings of the Second International Conference on Computer and Communication Technologies

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The air and ambience of Wireless Sensor Network (WSN) are always suitable for intruders and they always gear up to hit this network. So the safety of WSN is very much essential and extremely challenging. Lots of intrusion detection schemes have been proposed and trust management is a significant part of them. The traditional trust management schemes were developed on the basis of calculation of trust value of nodes and provide one or few levels of intrusion detection within the network. This paper has a new Key-based Two-Tier Trust Management Filtering Scheme (KT3F), which not only allows us to spot intruder several times but also strictly filters the network by using filtering and key management scheme. By serving strict filtering, this scheme boosts the security factor much higher than the previous techniques. This approach is simple and strict filtering of network helps to mark the intruder more accurately and provides high level of security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rajabhushanam, C., Kathirvel, A.: Survey of wireless MANET application in battlefield operations. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(1), (2011) Rajabhushanam, C., Kathirvel, A.: Survey of wireless MANET application in battlefield operations. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(1), (2011)
2.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRef Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRef
3.
Zurück zum Zitat Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52, 2292–2330 (2008)CrossRef Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52, 2292–2330 (2008)CrossRef
4.
Zurück zum Zitat Dwivedi, A.K., Tiwari, M.K., Vyas, O.P.: Operating systems for tiny networked sensors: a survey. Int. J. Recent Trends Eng. 1(2), (2009) Dwivedi, A.K., Tiwari, M.K., Vyas, O.P.: Operating systems for tiny networked sensors: a survey. Int. J. Recent Trends Eng. 1(2), (2009)
5.
Zurück zum Zitat Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 102–114 (2002) Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 102–114 (2002)
6.
Zurück zum Zitat Singh, M., Das, R.: Survey of different techniques to detect wormhole attack in wireless sensor network. Publ. Int. J. Sci. Eng. Res. (IJSER) 3(10), (2012). ISSN:2229-5518 Singh, M., Das, R.: Survey of different techniques to detect wormhole attack in wireless sensor network. Publ. Int. J. Sci. Eng. Res. (IJSER) 3(10), (2012). ISSN:2229-5518
7.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. – - –c. Springer (2006) Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. – - –c. Springer (2006)
8.
Zurück zum Zitat Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional Conference (2004) Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional Conference (2004)
9.
Zurück zum Zitat Aristides, M., et al.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials II(4), (2009). Fourth Quarter Aristides, M., et al.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials II(4), (2009). Fourth Quarter
10.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and counter measures. Ad Hoc Netw. 1(2–3), 293–315 (2003). Sens. Netw. Protoc. Appl. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and counter measures. Ad Hoc Netw. 1(2–3), 293–315 (2003). Sens. Netw. Protoc. Appl.
11.
Zurück zum Zitat Godwin Ponsam, J., Srinivasan, R., A survey on MANET security challenges, attacks and its countermeasures. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(1), (2014). ISSN:2278-6856 Godwin Ponsam, J., Srinivasan, R., A survey on MANET security challenges, attacks and its countermeasures. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(1), (2014). ISSN:2278-6856
12.
Zurück zum Zitat Yeh, C.-H.: A secure shared group model of cloud storage. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops Yeh, C.-H.: A secure shared group model of cloud storage. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops
13.
Zurück zum Zitat Shaikh, R.A., Jameel, H., d’Auriol, B.J., Member, IEEE Computer Society, Lee, H., Member, IEEE, Lee, S., Member, IEEE, Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), (2009) Shaikh, R.A., Jameel, H., d’Auriol, B.J., Member, IEEE Computer Society, Lee, H., Member, IEEE, Lee, S., Member, IEEE, Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), (2009)
14.
Zurück zum Zitat Özdemir, S., Meghdadi, M., Güler. Ý.: A time and trust based wormhole detection algorithm for wireless sensor networks (manuscript in Turkish). In: 3rd Information Security and Cryptology Conference (ISC′08), pp. 139−4, (2008) Özdemir, S., Meghdadi, M., Güler. Ý.: A time and trust based wormhole detection algorithm for wireless sensor networks (manuscript in Turkish). In: 3rd Information Security and Cryptology Conference (ISC′08), pp. 139−4, (2008)
15.
Zurück zum Zitat Bao, F., Chen, I.-R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. (2012) Bao, F., Chen, I.-R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. (2012)
16.
Zurück zum Zitat Zhou, Y., Huang, T., Wang, W.: A trust establishment scheme for cluster based sensor networks. Int. Conf. Wireless Commun. Netw. Mob. Comput. (2009) Zhou, Y., Huang, T., Wang, W.: A trust establishment scheme for cluster based sensor networks. Int. Conf. Wireless Commun. Netw. Mob. Comput. (2009)
17.
Zurück zum Zitat Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., Luk, J.A.: Trust-Aware In-network Aggregation for Wireless Sensor Networks. Intelligent Automation Inc. (2009) Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., Luk, J.A.: Trust-Aware In-network Aggregation for Wireless Sensor Networks. Intelligent Automation Inc. (2009)
18.
Zurück zum Zitat Stelte, B., Matheus, A.: Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation. IEEE Trans. Netw. Serv. Manage. (2011) Stelte, B., Matheus, A.: Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation. IEEE Trans. Netw. Serv. Manage. (2011)
Metadaten
Titel
KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network
verfasst von
Moutushi Singh
Rupayan Das
Mrinal Kanti Sarkar
Koushik Majumder
Subir Kumar Sarkar
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2517-1_65