Skip to main content

Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs

  • Conference paper
  • First Online:
  • 715 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1122))

Abstract

Wireless Sensor Networks are ubiquitous. The use of WSN saves a lot of man-power and instrumentation for a lot of healthcare and especially industrial applications. This paper describes the work done on securing cluster based WSNs using IDP mechanism. An Intrusion Detection and Prevention Mechanism is proposed here based on State Context and Hierchical Trust in cluster based WSNs. An IDP system will prevent and detect attacks on WSN nodes before they happen and jeopardize the whole network. The paper proposes a system which is flexible and is suitable for the WSNs that are constantly changing, characterized by changes in their perceptual environment, transitions of state of nodes and variation in trust value. A multilevel 2-tier hierarchical trust mechanism at the level of SNs and CHs evaluated on the basis of interactive trust, honesty trust and content trust is put forward, which is a combination of direct evaluation and feed-back based evaluation in the fixed-hop range. The calculation of interactive trust and honesty trust is done based on the interaction and behavior of the sensor nodes during routing. While the calculation of content trust is done based on the deviation of data transferred with respect to the rest of the members in the cluster during data aggregation. CHs evaluates the trust of the cluster member SNs, while the trust of the CH is evaluated by its neighboring SNs. When the trust evaluation process is done, then the data from low trust cluster members are avoided. Forwarding of data through low trust cluster members is avoided. Initially the attacker node tries to communicate to the rest of the nodes via fake control messages for getting itself elected to the level of CH. The mechanism proposed here in this paper will not only prevent the attacker node but also reduce the overall resource overhead while improving network performance. This paper tries to give its small contribution in the security of cluster based WSNs using IDP mechanisms.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Agarwal, T.: (Web-Blog). Wireless sensor network architecture and its application. https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/. Accessed 4 April 2018

  2. Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)

    Article  Google Scholar 

  3. He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012)

    Google Scholar 

  4. He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)

    Article  Google Scholar 

  5. Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)

    Article  Google Scholar 

  6. Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)

    Article  Google Scholar 

  7. Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004)

    Google Scholar 

  8. Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006)

    Google Scholar 

  9. Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015)

    Google Scholar 

  10. Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015)

    Google Scholar 

  11. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Vyas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vyas, A., Abimannan, S. (2020). Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39875-0_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39874-3

  • Online ISBN: 978-3-030-39875-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics