LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System

被引:26
|
作者
Ghugar, Umashankar [1 ]
Pradhan, Jayaram [1 ]
Bhoi, Sourav Kumar [2 ]
Sahoo, Rashmi Ranjan [2 ]
机构
[1] Berhampur Univ, Dept Comp Sci, Berhampur 760007, Odisha, India
[2] Parala Maharaja Engn Coll, Dept Comp Sci & Engn, Adv Comp & Res Lab, Berhampur 761003, Odisha, India
关键词
MISBEHAVIOR; MANAGEMENT;
D O I
10.1155/2019/2054298
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang's scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang's scheme.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
    Wang, Jian
    Jiang, Shuai
    Fapojuwo, Abraham O.
    SENSORS, 2017, 17 (06):
  • [2] NL-IDS: Trust Based Intrusion Detection System for Network layer in Wireless Sensor Networks
    Ghugar, Umashankar
    Pradhan, Jayaram
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 512 - 516
  • [3] Trust-Based Intrusion Detection in Wireless Sensor Networks
    Bao, Fenye
    Chen, Ing-Ray
    Chang, MoonJeong
    Cho, Jin-Hee
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [4] PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks
    Ghugar U.
    Pradhan J.
    Bhoi S.K.
    Sahoo R.R.
    Panda S.K.
    International Journal of Information Technology, 2018, 10 (4) : 489 - 494
  • [5] Trust Intrusion Detection System Based on Location for Wireless Sensor Network
    Maddar, Hela
    Kammoun, Wafa
    Youssef, Habib
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 831 - 840
  • [6] Advanced network security with an integrated trust-based intrusion detection system for routing protocol
    Kumar, Ajay
    Budhiraja, Ishan
    Garg, Deepak
    Garg, Sahil
    Choi, Bong Jun
    Alrashoud, Mubarak
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 120 : 378 - 390
  • [7] Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks
    Buccafurri, Francesco
    Coppolino, Luigi
    D'Antonio, Salvatore
    Garofalo, Alessia
    Lax, Gianluca
    Nocera, Antonino
    Romano, Luigi
    COMPUTER SAFETY, RELIABILITY, AND SECURITY (SAFECOMP 2014), 2014, 8666 : 214 - 229
  • [8] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [9] Multi-agent trust-based intrusion detection scheme for wireless sensor networks
    Jin, Xianji
    Liang, Jianquan
    Tong, Weiming
    Lu, Lei
    Li, Zhongwei
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 262 - 273
  • [10] TruFiX: A Configurable Trust-Based Cross-Layer Protocol for Wireless Sensor Networks
    Umar, Idris Abubakar
    Hanapi, Zurina Mohd
    Sali, A.
    Zulkarnain, Zuriati A.
    IEEE ACCESS, 2017, 5 : 2550 - 2562