LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System

被引:26
|
作者
Ghugar, Umashankar [1 ]
Pradhan, Jayaram [1 ]
Bhoi, Sourav Kumar [2 ]
Sahoo, Rashmi Ranjan [2 ]
机构
[1] Berhampur Univ, Dept Comp Sci, Berhampur 760007, Odisha, India
[2] Parala Maharaja Engn Coll, Dept Comp Sci & Engn, Adv Comp & Res Lab, Berhampur 761003, Odisha, India
关键词
MISBEHAVIOR; MANAGEMENT;
D O I
10.1155/2019/2054298
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang's scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang's scheme.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Intelligent Intrusion Detection System in Wireless Sensor Network
    Sardar, Abdur Rahaman
    Sahoo, Rashmi Ranjan
    Singh, Moutushi
    Sarkar, Souvik
    Singh, Jamuna Kanta
    Majumder, Koushik
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 707 - 712
  • [32] A Study of Intrusion Detection System in Wireless Sensor Network
    Agarwal, Atul
    Kaushal, Narottam Chand
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 337 - 343
  • [33] A Trust-Based Formal Model for Fault Detection in Wireless Sensor Networks
    Wang, Na
    Wang, Jiacun
    Chen, Xuemin
    SENSORS, 2019, 19 (08)
  • [34] A Trust-Based Intrusion Detection System for Mitigating Blackhole Attacks in MANET
    Sen, Biswaraj
    Meitei, Moirangthem Goldie
    Sharma, Kalpana
    Ghose, Mrinal Kanti
    Sinha, Sanku
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 765 - 775
  • [35] FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system
    Nivaashini, M.
    Suganya, E.
    Sountharrajan, S.
    Prabu, M.
    Bavirisetti, Durga Prasad
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01)
  • [36] Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network
    Tanya Sood
    Satyartha Prakash
    Sandeep Sharma
    Abhilash Singh
    Hemant Choubey
    Wireless Personal Communications, 2022, 126 : 911 - 931
  • [37] Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network
    Sood, Tanya
    Prakash, Satyartha
    Sharma, Sandeep
    Singh, Abhilash
    Choubey, Hemant
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (01) : 911 - 931
  • [38] FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system
    M. Nivaashini
    E. Suganya
    S. Sountharrajan
    M. Prabu
    Durga Prasad Bavirisetti
    EURASIP Journal on Information Security, 2024
  • [39] Trust-based routing optimization using multi-ant colonies in wireless sensor network
    Hajiee, Maryam
    Fartash, Mehdi
    Eraghi, Nafiseh Osati
    CHINA COMMUNICATIONS, 2021, 18 (11) : 155 - 167
  • [40] Trust-Based Routing Optimization Using Multi-Ant Colonies in Wireless Sensor Network
    Maryam hajiee
    Mehdi Fartash
    Nafiseh Osati Eraghi
    China Communications, 2021, 18 (11) : 155 - 167