An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for Wireless Sensor Network

Today modern and innovative applications for health care environment based on Wireless Sensor Network (WSN) are being developed in the commercial sector. The emerging sensor networks are rapidly becoming a fundamental part of medical solutions due to increase in accessibility for healthcare professionals/patients and ultimately leading to reduced healthcare costs. Health watch is becoming popular, however securing data becomes critical as privacy issues are a major concern in wireless systems. Finding threats and blocking them without affecting the network is essential without increasing the processing overheads and energy. In this paper, a Trust Based Adaptive Acknowledgment (TRAACK) Intrusion-Detection System for WSN based on number of active successful deliveries, and Kalman filter to predict node trust is proposed. In TRAACK the entire route based trust strength for multi hop sensor networks is reverted to nodes acting as Security Agent. Based on trust value of entire route, Acknowledgement is initiated on select packets to decrease control overhead. It is observed that the packet delivery ratio for the proposed TRAACK method improves even when malicious nodes are present, the proposed technique TRAACK is able to detect malicious nodes and avoid them in the route discovery process. Simulations show improved performance in the presence of malicious nodes without compromise in energy.

[1]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[2]  Yiwei Thomas Hou,et al.  Optimal base station placement in wireless sensor networks , 2009, TOSN.

[3]  R. Vijayan,et al.  Trust Based Certificate Authority for Detection of Malicious Nodes in MANET , 2011 .

[4]  Charles K. Ayo,et al.  Impact of Mobile and Wireless Technology on Healthcare Delivery services , 2007 .

[5]  Fangmin Sun,et al.  A Review of Attacks and Security Protocols for Wireless Sensor Networks , 2014, J. Networks.

[6]  Nacira Ghoualmi Zine,et al.  A New Approach for Adaptive Intrusion Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[7]  Sanjay Jha,et al.  Addressing Mobility in Wireless Sensor Media Access Protocol , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..

[8]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[9]  Sarmistha Neogy,et al.  Mobile Agent Security Based on Trust Model in MANET , 2011, ACC.

[10]  Azeddine Bilami,et al.  Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[11]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[12]  John S. Baras,et al.  Performance improvements in distributed estimation and fusion induced by a trusted core , 2009, 2009 12th International Conference on Information Fusion.

[13]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[14]  Pramod K. Varshney,et al.  An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.

[15]  Rung Ching Chen,et al.  Applying an Ontology to a Patrol Intrusion Detection System for Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[16]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[17]  Tarek R. Sheltami,et al.  A3ACKs: adaptive three acknowledgments intrusion detection system for MANETs , 2014, J. Ambient Intell. Humaniz. Comput..

[18]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[19]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[20]  Julio Muñoz,et al.  A flooding routing algorithm for a wireless sensor network for seismic events , 2015, 2015 International Conference on Computing Systems and Telematics (ICCSAT).

[21]  Chunyan Miao,et al.  A survey and projection on medium access control protocols for wireless sensor networks , 2012, CSUR.

[22]  Sha Xuejun,et al.  An Energy-Efficient Message Passing Approach in MAC Design for Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[23]  Meharouech Sourour,et al.  Adaptive IDS Alerts Correlation according to the traffic type and the attacks properties , 2009, 2009 IEEE International Advance Computing Conference.

[24]  N. Rajkumar,et al.  Enhanced acknowledgement based intrusion detection for MANETs , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[25]  Dhaval Dave,et al.  An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[26]  H. T. Mouftah,et al.  AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[27]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[28]  K. C. Shet,et al.  A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET , 2012, 2012 International Conference on Computing Sciences.

[29]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[30]  Tarek R. Sheltami,et al.  EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.

[31]  Jianhua Li,et al.  Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[32]  Sung Won Kim,et al.  A Robust Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.

[33]  Sarmistha Neogy,et al.  Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET , 2014, 2014 Applications and Innovations in Mobile Computing (AIMoC).