Adaptive Trust Management Protocol based on Intrusion Detection for Wireless Sensor Networks

被引:0
|
作者
Gheorghe, Laura [1 ]
Rughinis, Razvan [1 ]
Tataroiu, Razvan [1 ]
机构
[1] Univ Politehn Bucuresti, Comp Sci & Engn Dept, Bucharest, Romania
关键词
Wireless Sensor Networks; security; trust; reputation; intrusion detection; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks run critical applications and need to be protected against malicious attacks and faults. In this paper we propose Adaptive Trust Management Protocol, a protocol that adjusts trust and reputation based on node behavior. The protocol includes three phases: the Learning phase, in which experience is computed based on these alerts received from TinyAFD, the Exchanging phase, in which experience associations are exchanged between neighbor nodes, and the Updating phase, in which trust and reputation are updated based on experience. ATMP has been implemented on top of TinyOS and has been tested using TOSSIM in several attack scenarios to evaluate the evolution of experience, trust and reputation. We performed a comparative evaluation of ATMP with other similar solutions and determined that our protocol covers a larger range of attacks, mostly because of the integration with a complex intrusion detection system.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Integrated UCON-Based Access Control and Adaptive Intrusion Detection for Wireless Sensor Networks
    Wu, Jun
    Shimamoto, Shigeru
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [32] Neighbor-based intrusion detection for wireless sensor networks
    Faculty of Informatics, Masaryk University, Brno, Czech Republic
    Proc. - Int. Conf. Wirel. Mob. Commun., ICWMC, (420-425):
  • [33] Immunity-Based Intrusion Detection for Wireless Sensor Networks
    Liu, Yang
    Yu, Fengqi
    2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 439 - 444
  • [34] Intrusion detection based security architecture for wireless sensor networks
    Xiao, DB
    Chen, C
    Chen, GL
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1365 - 1368
  • [35] An intrusion detection system for cluster based wireless sensor networks
    Deng, Xue
    Wu, Renyong
    Wang, Wenru
    Bu, Renfei
    Information Technology Journal, 2013, 12 (09) : 1764 - 1771
  • [36] Trust management in wireless sensor networks
    Jing, Qi
    Tang, Li-Yong
    Chen, Zhong
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (07): : 1716 - 1730
  • [37] An Intrusion Detection System for Cluster Based Wireless Sensor Networks
    Deng, Xue
    2013 16TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2013,
  • [38] Trust management in wireless sensor networks
    Zahariadis, Theodore
    Leligou, Helen C.
    Trakadas, Panagiotis
    Voliotis, Stamatis
    EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (04): : 386 - 395
  • [39] Key management scheme integrated with intrusion detection in wireless sensor networks
    Zhang, Xing
    He, Jing-Sha
    Ma, Ge
    Wei, Qian
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2010, 31 (SUPPL. 2): : 187 - 190
  • [40] Source redundancy management and host intrusion detection in wireless sensor networks
    Singh V.
    Sharma G.
    Poonia R.C.
    Trivedi N.K.
    Raja L.
    Recent Advances in Computer Science and Communications, 2021, 14 (01) : 43 - 47