PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks

In this paper, a physical layer trust based intrusion detection system (PL-IDS) is proposed to calculate the trust for wireless sensor networks (WSNs) at the physical layer. The trust value of sensor node is calculated as per the deviation of key factors at the physical layer. The proposed scheme is effective to identify the abnormal nodes in WSNs. The abnormal nodes mainly attack the physical layer by denial of service attack. They use the jamming attack by consuming the resources of the genuine nodes, which leads to a denial of service. To analyze the performance of PL-IDS, we have implemented the periodic jamming attack. Results show that PL-IDS performs better in terms of false alarm rate and malicious node detection accuracy rate.

[1]  C. P. Katti,et al.  Security architectures in wireless sensor network , 2020 .

[2]  Bashir Alam,et al.  Zonal based approach for clustering in heterogeneous WSN , 2017 .

[3]  Prasanta K. Jana,et al.  An Efficient Task Consolidation Algorithm for Cloud Computing Systems , 2016, ICDCIT.

[4]  Prasanta K. Jana,et al.  A multi-objective task scheduling algorithm for heterogeneous multi-cloud environment , 2015, 2015 International Conference on Electronic Design, Computer Networks & Automated Verification (EDCAV).

[5]  Prasanta K. Jana,et al.  An Efficient Request-Based Virtual Machine Placement Algorithm for Cloud Computing , 2017, ICDCIT.

[6]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[7]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[8]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[9]  Sunil Kumar Muttoo,et al.  Android malware detection: state of the art , 2017, International Journal of Information Technology.

[10]  Jitendra Kumar Rout,et al.  SFTP : A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET , 2014, ArXiv.

[11]  Kuldeep Yadav,et al.  Survey of named data networks: future of internet , 2017 .

[12]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[13]  Alexandre François,et al.  Plasmonic Fiber Optic Refractometric Sensors: From Conventional Architectures to Recent Design Trends , 2016, Sensors.

[14]  Jingyi Li,et al.  A Study of Security Routing Protocol for Wireless Sensor Network , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[15]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[16]  Prasanta K. Jana,et al.  SLA-based task scheduling algorithms for heterogeneous multi-cloud environment , 2017, The Journal of Supercomputing.

[17]  D. K. Lobiyal,et al.  Utility-based performance analysis of cross-layer design in multi-flow ad-hoc networks , 2017 .

[18]  Prasanta K. Jana,et al.  An efficient energy saving task consolidation algorithm for cloud computing systems , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.

[19]  M. A. Rassam,et al.  A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.

[20]  Anazida Zainal,et al.  A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .

[21]  M. Azhagiri,et al.  A novel approach to measure the quality of cluster and finding intrusions using intrusion unearthing and probability clomp algorithm , 2018 .

[22]  Jian Wang,et al.  A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks , 2017, Sensors.

[23]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[24]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[25]  Eryk Dutkiewicz,et al.  Impact of static trajectories on localization in wireless sensor networks , 2015, Wirel. Networks.

[26]  Xuemin Shen,et al.  Trust-based anomaly detection in wireless sensor networks , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[27]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[28]  Sisi Cao,et al.  Rapid, point-of-care, thermally stable paper-based plasmonic assay for Zika virus diagnosis , 2017 .