Abstract
Wireless Sensor Networks are ubiquitous. The use of WSN saves a lot of man-power and instrumentation for a lot of healthcare and especially industrial applications. This paper describes the work done on securing cluster based WSNs using IDP mechanism. An Intrusion Detection and Prevention Mechanism is proposed here based on State Context and Hierchical Trust in cluster based WSNs. An IDP system will prevent and detect attacks on WSN nodes before they happen and jeopardize the whole network. The paper proposes a system which is flexible and is suitable for the WSNs that are constantly changing, characterized by changes in their perceptual environment, transitions of state of nodes and variation in trust value. A multilevel 2-tier hierarchical trust mechanism at the level of SNs and CHs evaluated on the basis of interactive trust, honesty trust and content trust is put forward, which is a combination of direct evaluation and feed-back based evaluation in the fixed-hop range. The calculation of interactive trust and honesty trust is done based on the interaction and behavior of the sensor nodes during routing. While the calculation of content trust is done based on the deviation of data transferred with respect to the rest of the members in the cluster during data aggregation. CHs evaluates the trust of the cluster member SNs, while the trust of the CH is evaluated by its neighboring SNs. When the trust evaluation process is done, then the data from low trust cluster members are avoided. Forwarding of data through low trust cluster members is avoided. Initially the attacker node tries to communicate to the rest of the nodes via fake control messages for getting itself elected to the level of CH. The mechanism proposed here in this paper will not only prevent the attacker node but also reduce the overall resource overhead while improving network performance. This paper tries to give its small contribution in the security of cluster based WSNs using IDP mechanisms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agarwal, T.: (Web-Blog). Wireless sensor network architecture and its application. https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/. Accessed 4 April 2018
Zhang, Z., Zhu, H., Luo, S., Xin, Y., Liu, X.: Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5, 12088–12102 (2017)
He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(4), 622–632 (2012)
He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. Eng. 16(6), 1164–1175 (2012)
Han, G., Jiang, J., Shu, L., Guizani, M.: An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Trans. Mob. Comput. 14(12), 2447–2459 (2015)
Li, X., Zhou, F., Du, J.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 8, 924–935 (2013)
Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4(4), 66–77 (2004)
Yao, Z., Kim, D., Doh, Y.: PLUS: Parameterized and localized trust management scheme for sensor networks security. In: Proceedings of IEEE International Conference on Mobile Adhoc Sensor Systems, pp. 437–446 (2006)
Dhakne, A., Chatur, P.: Distributed trust based intrusion detection approach in wireless sensor network. In: Proceedings of IEEE International Conference on Communication Control of Intelligent Systems, pp. 96–101 (2015)
Gautam, G., Sen, B.: Design and simulation of wireless sensor network in NS2. Int. J. Comput. Appl. 113(16), 14–16 (2015)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 234–241 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Vyas, A., Abimannan, S. (2020). Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNs. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-39875-0_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39874-3
Online ISBN: 978-3-030-39875-0
eBook Packages: EngineeringEngineering (R0)