A hybrid trust based intrusion detection system for wireless sensor networks

In Wireless Sensor Networks (WSNs), detecting malicious nodes and discarding their sensed data have a significant importance to carry out the mission critical tasks. Traditional security measures such as authentication and encryption cannot be implemented directly to WSNs due to the limited resources of sensor nodes. Hence, novel energy efficient methods are needed to minimize the effect of malicious nodes. In this paper, a hybrid Intrusion Detection System (IDS) for clustered WSNs is proposed. The proposed IDS is based on functional reputation and misuse detection rules. The main idea is that each sensor node computes functional reputation values for its neighbors by observing their activities. Base Station (BS) detects malicious nodes by combining functional reputation values and misuse detection rules. According to the simulation results, the proposed approach increases the network lifetime and improves sensed data freshness by detecting malicious nodes in a centralized way without surging energy consumption.

[1]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[2]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[3]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[4]  Subhash Challa,et al.  Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks , 2010, J. Networks.

[5]  Tarek S. Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art , 2006, Comput. Stand. Interfaces.

[6]  Kablosuz Algilayici,et al.  SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS VIA HOMOMORPHIC ENCRYPTION , 2008 .

[7]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[8]  Chuanlei Zhang,et al.  BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[9]  Yassine MALEH,et al.  Lightweight Intrusion Detection Scheme for Wireless Sensor Networks , 2022 .

[10]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[11]  Miroslav Voznák,et al.  Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks , 2015, Wireless Personal Communications.

[12]  W. Marsden I and J , 2012 .

[13]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[14]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[15]  Stephen A. Szygenda,et al.  Security for Wireless Sensor Networks using Identity-Based Cryptography , 2012 .

[16]  Ricardo Alexandre Reinaldo De Moraes,et al.  People , 2019, Veterinary Record.

[17]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[18]  王淑卿,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .

[19]  Suat Ozdemir,et al.  Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .

[20]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[21]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[22]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.