LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System

被引:25
|
作者
Ghugar, Umashankar [1 ]
Pradhan, Jayaram [1 ]
Bhoi, Sourav Kumar [2 ]
Sahoo, Rashmi Ranjan [2 ]
机构
[1] Berhampur Univ, Dept Comp Sci, Berhampur 760007, Odisha, India
[2] Parala Maharaja Engn Coll, Dept Comp Sci & Engn, Adv Comp & Res Lab, Berhampur 761003, Odisha, India
关键词
MISBEHAVIOR; MANAGEMENT;
D O I
10.1155/2019/2054298
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang's scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang's scheme.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Securing Wireless Sensor Networks Enabled Logistics Using a Hybrid Intrusion Detection System
    Mushtaq, Hammad
    Ali, Syed Nouman
    Rasheed, Haroon
    Ramish, Asher
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INNOVATION AND MANAGEMENT, VOLS I & II, 2017, : 921 - 925
  • [22] A Trust-based Intrusion Detection System for Mobile RPL Based Networks
    Medjek, Faiza
    Tandjaoui, Djamel
    Romdhani, Imed
    Djedjig, Nabil
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 735 - 742
  • [23] Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
    Dinesh Kumar Anguraj
    S. Smys
    Wireless Personal Communications, 2019, 104 : 1 - 20
  • [25] Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks
    Anguraj, Dinesh Kumar
    Smys, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 104 (01) : 1 - 20
  • [26] Intrusion detection system using Anomaly technique in Wireless Sensor Network
    Pandey, Sushant Kumar
    Kumar, Prabhat
    Singh, Jyoti Prakash
    Singh, M. P.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 611 - 615
  • [27] Enhancing Security in LLNs Using a Hybrid Trust-Based Intrusion Detection System for RPL
    Remya, S.
    Pillai, Manu J.
    Arjun, C.
    Ramasubbareddy, Somula
    Cho, Yongyun
    IEEE ACCESS, 2024, 12 : 58836 - 58850
  • [28] Intrusion Detection System In wireless Sensor network Based On Mobile Agent
    El Mourabit, Yousef
    Toumanari, Ahmed
    Bouirden, Anouar
    Zougagh, Hicham
    Latif, Rachid
    2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, : 248 - 251
  • [29] Wireless Sensor Network for Community Intrusion Detection System Based on Embedded System
    Gao, Meijuan
    Li, Kai
    Tian, Jingwen
    2008 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-11, 2008, : 4696 - 4699
  • [30] Classification of Intrusion Detection System (IDS) Based on Computer Network
    Effendy, David Ahmad
    Kusrini, Kusrini
    Sudarmawan, Sudarmawan
    2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE): OPPORTUNITIES AND CHALLENGES ON BIG DATA FUTURE INNOVATION, 2017, : 90 - 94