Attack Resilient Trust and Signature-based Intrusion Detection Systems

被引:0
|
作者
Kabaso, Boniface [1 ]
Aradeh, Saber A. [1 ]
Abidoye, Ademola P. [1 ]
机构
[1] Cape Peninsula Univ Technol, Dept Informat Technol, Cape Town, South Africa
关键词
Wireless sensor network; routing attacks; public-key cryptography; packet dropping; denial of service attacks; WIRELESS SENSOR NETWORKS; INFORMATION; PROTOCOLS;
D O I
10.14569/IJACSA.2021.0120381
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks have been widely applied in many areas due to their unique characteristics. These have exposed them to different types of active and passive attacks. In the literature, several solutions have been proposed to mitigate these attacks. Most of the proposed solutions are too complex to be implemented in wireless sensor networks considering the resource-constraint of sensor nodes. In this work, we proposed a hierarchical trust mechanism based on clustering approach to detect and prevent denial of service attacks in wireless sensor networks. The approach was validated through simulation using Network Simulator (NS2). The following metrics were used to evaluation the proposed scheme: packet delivery ratio, network lifetime, routing delay, overhead, and number of nodes. The proposed approach is capable of detecting compromised sensor nodes vulnerable to a denial of service attacks. Moreover, it is able to detect all sensed data that have been compromised during transmission to the base station. The results show that our method can effectively detect and defend against denial of service attacks in sensor wireless sensor networks.
引用
收藏
页码:701 / 707
页数:7
相关论文
共 50 条
  • [31] Machine Learning Architecture for Signature-based IoT Intrusion Detection in Smart Energy Grids
    Yadav, Nikhil
    Truong, Laura
    Troja, Erald
    Aliasgari, Mehrdad
    [J]. 2022 IEEE 21ST MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (IEEE MELECON 2022), 2022, : 671 - 676
  • [32] A memory-based NFA regular expression match engine for signature-based intrusion detection
    Pao, Derek
    Or, Nga Lam
    Cheung, Ray C. C.
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1255 - 1267
  • [33] MapReduce Accelerated Signature-Based Intrusion Detection Mechanism (IDM) with Pattern Matching Mechanism
    Rao, Chinta Someswara
    Raju, K. Butchi
    [J]. SOFT COMPUTING IN DATA ANALYTICS, SCDA 2018, 2019, 758 : 157 - 164
  • [34] Signature-Based Intrusion Detection System (IDS) for In-Vehicle CAN Bus Network
    Jin, Shiyi
    Chung, Jin-Gyun
    Xu, Yinan
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [35] Signature-based multi-layer distributed intrusion detection system using mobile agents
    [J]. Uddin, M. (mueenmalik9516@gmail.com), 1600, Femto Technique Co., Ltd. (15):
  • [36] An attack signature model to computer security intrusion detection
    Cansian, AM
    da Silva, ARA
    de Souza, M
    [J]. 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1368 - 1373
  • [37] Mdlcompress for intrusion detection: Signature inference and masquerade attack
    Evans, Scott
    Eiland, Earl
    Markham, Stephen
    Impson, Jeremy
    Laczo, Adam
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1652 - +
  • [38] Identity-based intrusion-resilient signature
    Li, Hongwei
    Sun, Shixin
    [J]. 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 442 - 446
  • [39] Multiresolution signature-based SAR target detection
    McClure, M
    Bharadwaj, P
    Carin, L
    [J]. ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 318 - 329
  • [40] A Review on Signature-Based Detection for Network Threats
    Li, Jing
    Li, Qinyuan
    Zhou, Sheng
    Yao, Ying
    Ou, Jing
    [J]. 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1117 - 1121