Abstract
The emergence of the Internet of Things (IoT) is a result of convergence between multiple technologies, like Internet, wireless communication, embedded systems, microelectronic systems and nanotechnology. In 2016, 5.5 million objects are connected every day in the world. A number that could quickly reach billions by 2020 [1]. Gartner predicts that 26 billion objects will be installed in 2020. The market for connected objects could range from a few tens of billions to up to several thousand billion units. Among the vital components of IoT, we find wireless sensor networks (WSNs). Wireless sensor networks as a vital component of the IoT, allow the representation of dynamic characteristics of the real world in the virtual world of the Internet. Nevertheless, the opening of these types of network to the Internet presents a serious problem stand point security. For that, the implementation of intrusion detection mechanisms is essential to limit the internal and external attacks that threaten the smooth running of the network. In this paper, we propose an efficient trust management model which seeks deeply through the nodes to detect attacks that threaten wireless sensor networks. Our model includes a geographical localization system used to identify the nodes location. Although, it includes a set of rules detection attacks based on different parameter analysis. Furthermore, we propose a mathematical model for trust establishment and its update on the network. During the simulations we observe an improvement of the efficiency of the implemented geo-location model and also a reasonable energy consumption. Similarly, we have been able to evince the efficiency of our model in terms of attacks detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Insecurity of connected objects: “how to combine IoT and security”. Net Journal. Accessed 4 May 2016
Steinberg, J.: Contributor on cybersecurity and entrepreneurship, “these devices may be spying on you”. Net Journal, 27 January 2014
Kaune, R., Hörst, J., Koch, W.: Accuracy analysis for TDOA localization in sensor networks. In: Information Fusion. IEEE (2011)
Jøsang, A., Ismail, R.: The beta reputation system. In: The 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)
Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based frame work for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on Security of Adhoc and Sensor Networks (2004)
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. (2013)
Rodrigo, R., Carmen, F., Javier, L., Hwa, C.: Trust and reputation systems for wireless sensor networks. Secur. Priv. Mob. Wirel. Netw. (2009)
Yao, Z., Kimand, D., Doh, Y.: PLUS: parameterized and localized trust management scheme for sensor networks security. In: International Conference on Mobile Adhoc and Sensor Systems. IEEE (2008)
Sedjelmaci, H., Senouci, S.M., Feham, M.: An efficient intrusion detection framework in cluster-based wireless sensor networks. Secur. Commun. J. 6(10), 1211–1224 (2013)
Sedjelmaci, H., Senouci, S.M.: Efficient and lightweight intrusion detection based on nodes behaviors in wireless sensor networks. In: Global Information Infrastructure Symposium. IEEE (2013)
Maddar, H., Kammoun, W., Cheikhrouhou, O., Youssef, H.: Lightweight trust model with high longevity for wireless sensor networks. In: International Conference on Information Systems Security and Privacy. Springer, Heidelberg (2016)
Maddar, H., Kammoun, W., Youssef, H.: Trust intrusion detection system based on location for wireless sensor network. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 831–840. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53480-0_82
Sajjada, S.M., Boukb, S.H., Yousaf, M.: Neighbor node trust based intrusion detection system for WSN. In: 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, EUSPN. Elsevier (2015)
Alsaedia, N., Hashima, F., et al.: Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Comput. Commun. J. 110, 75–82 (2017)
Jin, X., Liang, J., et al.: Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng. 59, 262–273 (2017)
Tandel, R.I.: Leach protocol in wireless sensor network: a survey. (IJCSIT) Int. J. Comput. Sci. Inf. Technol. 7(4), 1894–1896 (2016)
Maddar, H., Kammoun, W., Youssef, H.: Cloudlets architecture for wireless sensor network. In: Madureira, A.M., Abraham, A., Gamboa, D., Novais, P. (eds.) ISDA 2016. AISC, vol. 557, pp. 852–862. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53480-0_84
Stetsko, A., Folkman, L., Matyayas, V.: Neighbor-based intrusion detection for wireless sensor networks. In: International Conference on Wireless and Mobile Communications, Los Alamitos, CA, USA, pp. 420–425 (2010)
Liu, F., Cheng, X., Chen, D.: Insider attacker detection in wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1937–1945 (2007)
Li, G., He, J., Fu, Y.: A group-based intrusion detection scheme in wireless sensor networks. In: Proceedings of GPS - Workshops, pp. 286–291. IEEE (2008)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Maddar, H., Kammoun, W., Youssef, H. (2018). Effective Centralized Trust Management Model for Internet of Things. In: Yin, H., Camacho, D., Novais, P., Tallón-Ballesteros, A. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2018. IDEAL 2018. Lecture Notes in Computer Science(), vol 11314. Springer, Cham. https://doi.org/10.1007/978-3-030-03493-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-03493-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03492-4
Online ISBN: 978-3-030-03493-1
eBook Packages: Computer ScienceComputer Science (R0)