Trust Evaluation Model against Insider Attack in Wireless Sensor Networks

Insider attack is one of the key attacks in wireless sensor networks (WSNs). Despite its destructive force to network functions is huge, insider attackers are difficult to be detected only by the traditional techniques. Meanwhile, existing secure routing schemes are also vulnerable to insider attack and low energy-efficient due to their deterministic nature. Once a normal node is compromised or captured, the adversary can endanger all information transmitting through this node. In this paper, we propose a novel trust evaluation model to enhance the data security in WSNs. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behavior evaluation with no requirement on a prior knowledge about normal/compromised sensor activities and build a trust management. Moreover, our scheme is application friendly, which can be employed to monitor many aspects of sensor networking behaviors and build the secure routing. In our secure routing, besides security, high energy-efficiency is also considered. Simulation results indicate that data shares can bypass most compromised nodes in the transmission path.

[1]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[2]  Tamar Frankel [The theory and the practice...]. , 2001, Tijdschrift voor diergeneeskunde.

[3]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  Yu Hen Hu,et al.  Detection, classification, and tracking of targets , 2002, IEEE Signal Process. Mag..

[6]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[7]  Bing He,et al.  An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[10]  Anil K. Jain,et al.  Unsupervised Learning of Finite Mixture Models , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  R. F.,et al.  Mathematical Statistics , 1944, Nature.

[12]  Fang Liu,et al.  Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[13]  Fang Liu,et al.  WSN09-2: On the Performance of In-Situ Key Establishment Schemes for Wireless Sensor Networks , 2006, IEEE Globecom 2006.

[14]  G Kiran Kumar,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2014 .

[15]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[16]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[17]  Ran Wolff,et al.  In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.

[18]  Rituparna Chaki,et al.  Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .

[19]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[20]  Nitin H. Vaidya,et al.  Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[21]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[22]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[23]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.