Abstract
There has been a tremendous growth in the field of wireless sensor networks (WSNs) in recent years, which is reflected in various applications. As the use of WSN applications increases, providing security to WSNs becomes a leading issue. This is complex due to the unique features of WSNs. This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node (ETN), correctness (CS) and fairness (FS). In addition to the normal communication-based trust property MSR, this paper uses effective parameters like ETN, which focuses on data and address modification attacks in an effective manner, and two social-interaction-based parameters CS and FS, which address trust-related attacks effectively. Simulation results show that the proposed method has higher performance and provides more security in terms of detection accuracy and false alarm rate.
Similar content being viewed by others
References
Butun I, Morgera S D and Sankar R 2013 A survey of intrusion detection systems in wireless sensor network. IEEE Commun. Surv. Tutor. 16(1): 266–282
Deng X, Wu R, Wang W and Bu R 2013 An intrusion detection system for cluster based wireless sensor networks. Inf. Technol. J. 12(9): 1764–1771
Theodorakopoulos G and Baras J S 2006 On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 318–332
Cayirci E and Rong C 2009 Security in wireless adhoc and sensor networks. New York: Wiley
Padmavathi G and Shanmugapriya D 2009 A survey of attacks, security mechanisms, and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 4(1–2): 117–125
Fuchsberger A 2005 Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3): 134–139
Wei Z, Tang H, Yu F R, Wang M and Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9): 4647–4658
Qassim Q, Patel A and Mahd-Zin A 2014 Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500–506
Boukerch A, Xu L and El-Khatib K 2007 Trust-based security for wireless ad-hoc and sensor networks. Comput. Commun. 30(11–12): 2413–2427
Yao Z, Kim D and Doh Y 2006 PLUS: parameterized and localized trust management scheme for sensor networks security. Proceedings of the IEEE International Conference on Mobile Ad hoc Sensor Systems, pp. 437–446
Yu Y, Li K, Zhou W and Li P 2012 Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3): 867–880
Ganeriwal S and Srivastava M B 2004 Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, USA, pp. 66–77
Shaikh R A, Jameel H, Auriol J B and Lee H 2009 Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11): 1698–1712
Xiang G, Jianlin Q and Jin W 2012 Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering. Proc. Eng. 29: 909–913
Bao F, Chen I R, Chang M and Cho J H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169–183
Ram Prabha V and Latha P 2014 Game theory model for intrusion detection in WSN using hierarchical trust management. Int. Rev. Comput. Softw. 9(6): 1055–1064
Kim T K and Seo H S 2008 A trust model using fuzzy logic in wireless sensor network. Int. J. Electr. Comput. Energetic Electron. Commun. Eng. 2(6): 1051–1054
Hu H and Chen Y 2009 Weighted trust calculation based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Secur. 3(2): 132–149
Liu K, Abu-Ghazaleh N and Kang K D 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distrib. Comput. 67(2): 215–228
Loo C E, Ng M Y, Leckie C and Palaniswami M 2006 Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4): 313–332
Network Simulator: http://www.isi.edu/nsnam
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ram Prabha, V., Latha, P. Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sādhanā 42, 143–151 (2017). https://doi.org/10.1007/s12046-016-0588-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12046-016-0588-2