KT3F: A Key-Based Two-Tier Trust Management Filtering Scheme for Intrusion Detection in Wireless Sensor Network

  • Moutushi Singh
  • Rupayan Das
  • Mrinal Kanti Sarkar
  • Koushik Majumder
  • Subir Kumar Sarkar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 379)


The air and ambience of Wireless Sensor Network (WSN) are always suitable for intruders and they always gear up to hit this network. So the safety of WSN is very much essential and extremely challenging. Lots of intrusion detection schemes have been proposed and trust management is a significant part of them. The traditional trust management schemes were developed on the basis of calculation of trust value of nodes and provide one or few levels of intrusion detection within the network. This paper has a new Key-based Two-Tier Trust Management Filtering Scheme (KT3F), which not only allows us to spot intruder several times but also strictly filters the network by using filtering and key management scheme. By serving strict filtering, this scheme boosts the security factor much higher than the previous techniques. This approach is simple and strict filtering of network helps to mark the intruder more accurately and provides high level of security.


WSN Security Intrusion Trust Motes 


  1. 1.
    Rajabhushanam, C., Kathirvel, A.: Survey of wireless MANET application in battlefield operations. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 2(1), (2011)Google Scholar
  2. 2.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)CrossRefGoogle Scholar
  3. 3.
    Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52, 2292–2330 (2008)CrossRefGoogle Scholar
  4. 4.
    Dwivedi, A.K., Tiwari, M.K., Vyas, O.P.: Operating systems for tiny networked sensors: a survey. Int. J. Recent Trends Eng. 1(2), (2009)Google Scholar
  5. 5.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 102–114 (2002)Google Scholar
  6. 6.
    Singh, M., Das, R.: Survey of different techniques to detect wormhole attack in wireless sensor network. Publ. Int. J. Sci. Eng. Res. (IJSER) 3(10), (2012). ISSN:2229-5518Google Scholar
  7. 7.
    Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X., Du, D.-Z. (eds.) Wireless/Mobile Network Security, pp. – - –c. Springer (2006)Google Scholar
  8. 8.
    Al-Shurman, M., Yoo, S.-M., Park, S.: Black hole attack in mobile ad-hoc networks. In: ACM Southeast Regional Conference (2004)Google Scholar
  9. 9.
    Aristides, M., et al.: A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutorials II(4), (2009). Fourth QuarterGoogle Scholar
  10. 10.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and counter measures. Ad Hoc Netw. 1(2–3), 293–315 (2003). Sens. Netw. Protoc. Appl.Google Scholar
  11. 11.
    Godwin Ponsam, J., Srinivasan, R., A survey on MANET security challenges, attacks and its countermeasures. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(1), (2014). ISSN:2278-6856Google Scholar
  12. 12.
    Yeh, C.-H.: A secure shared group model of cloud storage. In: 2013 27th International Conference on Advanced Information Networking and Applications WorkshopsGoogle Scholar
  13. 13.
    Shaikh, R.A., Jameel, H., d’Auriol, B.J., Member, IEEE Computer Society, Lee, H., Member, IEEE, Lee, S., Member, IEEE, Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), (2009)Google Scholar
  14. 14.
    Özdemir, S., Meghdadi, M., Güler. Ý.: A time and trust based wormhole detection algorithm for wireless sensor networks (manuscript in Turkish). In: 3rd Information Security and Cryptology Conference (ISC′08), pp. 139−4, (2008)Google Scholar
  15. 15.
    Bao, F., Chen, I.-R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. (2012)Google Scholar
  16. 16.
    Zhou, Y., Huang, T., Wang, W.: A trust establishment scheme for cluster based sensor networks. Int. Conf. Wireless Commun. Netw. Mob. Comput. (2009)Google Scholar
  17. 17.
    Deng, H., Jin, G., Sun, K., Xu, R., Lyell, M., Luk, J.A.: Trust-Aware In-network Aggregation for Wireless Sensor Networks. Intelligent Automation Inc. (2009)Google Scholar
  18. 18.
    Stelte, B., Matheus, A.: Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation. IEEE Trans. Netw. Serv. Manage. (2011)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  • Moutushi Singh
    • 1
  • Rupayan Das
    • 2
  • Mrinal Kanti Sarkar
    • 2
  • Koushik Majumder
    • 3
  • Subir Kumar Sarkar
    • 4
  1. 1.Department of IT, Institute of Engineering & ManagementKolkataIndia
  2. 2.Department of CSEUniversity of Engineering & ManagementJaipurIndia
  3. 3.Department of CSEWest Bengal University of TechnologyKolkataIndia
  4. 4.Department of ETCEJadavpur UniversityKolkataIndia

Personalised recommendations