Open Access Open Access  Restricted Access Subscription or Fee Access

A Wireless Sensor Network Intrusion Detection System with Parameters and Distributed Trust

B. M. Rajesh, Antony Selvadoss Thanamani, B. Chithra, A. Finny Belwin, A. Linda Sherin

Abstract


Wireless sensor networks (WSN) are a significant part of today's communication frameworks, and the faith detecting steering convention is used to increase security in WSN. Already, a Trust Sensing based Secure Routing Mechanism (TSSRM) has been developed, which will reduce overhead steering and increase the system's unchanging quality of data transmission. In any case, changing the rules in Control Panel can disable the security tools for this technique. To structure a distributed intrusion detection system for WSN, this could offer a swap approach for the examination of trust degree and omnipresent directing. Notwithstanding that, to manage outside aggressors, attacks by bargained or malevolent hubs, the trust executive framework is generally prescribed by a few specialists in the region of the remote sensor organize. As a result, a parameterized and disbursed trust-primarily based totally intrusion detection system (PDTB-IDS) with a stable conversation shape and a trust-theboard framework for far off sensor structures is defined on this paper. The important commitment is to separate different metrics and trust variables that influence trust in WSN. These factors include vitality, unshakable quality, information, and so on. Following that, direct trust, recommendation trust, and circuit trust from those components are identified, and the sensor hub's overall trust estimation is calculated by adding the separate trust esteems together. By comparing trust derived from the suggested technique, the trust model may determine whether or not a given node is malicious. The numerical evaluation of the research work is done using the NS2 simulation environment, which demonstrates that the suggested method outperforms the current TSSRM method.


Full Text:

PDF

References


Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks, 38, 393-422.

Ishmanov, F., Malik, A.S., Kim, S.W. and Begalov, B. (2013) Trust Management System in Wireless Sensor Networks: Design Considerations and Research Challenges. Transactions on Emerging Telecommunications Technologies

Bao, F.Y., Chen, I.-R., Chang, M.J. and Cho, J.-H. (2012) Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrustion Detection. IEEE Transactions on Network and Service Management, 9, 169-183.

Chen, H.G., Wu, H.F., Hu, J.C. and Gao. C.S. (2008) Event-Based Trust Framework Model in Wireless Sensor Networks. Proceedings of International Conference on Neworking, Architecture, and Storage, 359-364. 5. N. Shao, Z. Zhou, and Z. Sun, “A lightweight and dependable trust model for clustered wireless sensor networks,” in Lecture Notes in Computer Science, pp. 157–168, Springer, Berlin, Germany, 2016. 6. R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory,” Sensors, vol. 11, no. 2, pp. 1345–1360, 2011. 7. W. Luo, W. Ma, and Q. Gao, “A dynamic trust management system for wireless sensor networks,” Security and Communication Networks, vol. 9, no. 7, pp. 613–621, 2015. 8. R. Wu, X. Deng, R. Lu, and X. Shen, “Trust-based anomaly detection in wireless sensor networks,” in Proceedings of 2012 1st IEEE International Conference on Communications in China (ICCC), pp. 203–207, Beijing, China, August 2012.

F. Ishmanov, S. Kim, and S. Nam, “A robust trust establishment scheme for wireless sensor networks,” Sensors, vol. 15, no. 3, pp. 7040–7061, 2015. 10. F. Bao, R. Chen, M.J. Chang, and J.-H. Cho, “Trust-based intrusion detection in wireless sensor networks,” in Proceedings of 2011 IEEE International Conference on Communications (ICC), pp. 1–6, Kyoto, Japan, June 2011. 11. T. Zhang, L. Yan, and Y. Yang, “Trust evaluation method for clustered wireless sensor networks based on cloud model,” Wireless Networks, vol. 24, no. 3, pp. 777–797, 2016. 12. G. Rajeshkumar and K. R. Valluvan, “An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network,” Wireless Personal Communications, vol. 94, no. 4, pp. 1993–2007, 2016. 13. U. Ghugar, J. Pradhan, S. K. Bhoi, R. R. Sahoo, and S. K. Panda, “PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks,” International Journal of Information Technology, vol. 10, no. 4, pp. 489–494, 2018. 14. X. Li, F. Zhou, and J. Du, “LDTS: a lightweight and dependable trust system for clustered wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 924–935, 2013.




DOI: https://doi.org/10.37591/ijowns.v7i2.731

Refbacks

  • There are currently no refbacks.