Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks

被引:0
|
作者
Gheorghe, Laura [1 ]
Rughinis, Razvan [1 ]
Tataroiu, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Comp Sci & Engn Dept, Bucharest, Romania
关键词
Wireless Sensor Networks; security; trust; reputation; intrusion detection; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks run critical applications and need to be protected against malicious attacks and faults. In this paper we propose Adaptive Trust Management Protocol, a protocol that adjusts trust and reputation based on node behavior. The protocol includes three phases: the Learning phase, in which experience is computed based on these alerts received from TinyAFD, the Exchanging phase, in which experience associations are exchanged between neighbor nodes, and the Updating phase, in which trust and reputation are updated based on experience. ATMP has been implemented on top of TinyOS and has been tested using TOSSIM in several attack scenarios to evaluate the evolution of experience, trust and reputation. We performed a comparative evaluation of ATMP with other similar solutions and determined that our protocol covers a larger range of attacks, mostly because of the integration with a complex intrusion detection system.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Intrusion Detection in Wireless Sensor Networks
    Mettu, NaveenaReddy
    Sasikala, T.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 84 - 89
  • [22] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [23] Trust Intrusion Detection System Based on Location for Wireless Sensor Network
    Maddar, Hela
    Kammoun, Wafa
    Youssef, Habib
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 831 - 840
  • [24] Distributed Trust based Intrusion Detection Approach in Wireless Sensor Network
    Dhakne, Amol R.
    Chatur, P. N.
    2015 COMMUNICATION, CONTROL AND INTELLIGENT SYSTEMS (CCIS), 2015, : 96 - 101
  • [25] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [26] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [27] Adaptive MAC Protocol in Wireless Sensor Networks for Disaster Detection
    Katiyar, Anshu
    Kumar, Jitendra
    Khilar, Pabitra Mohan
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 95 - 103
  • [28] NL-IDS: Trust Based Intrusion Detection System for Network layer in Wireless Sensor Networks
    Ghugar, Umashankar
    Pradhan, Jayaram
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 512 - 516
  • [29] PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks
    Ghugar U.
    Pradhan J.
    Bhoi S.K.
    Sahoo R.R.
    Panda S.K.
    International Journal of Information Technology, 2018, 10 (4) : 489 - 494
  • [30] A self-adaptive trust management scheme for wireless sensor networks
    Wu, Xu
    Zheng, Qinghua
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2015, 37 (10) : 1197 - 1206