Skip to main content
Log in

Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks

  • Published:
Sādhanā Aims and scope Submit manuscript

Abstract

There has been a tremendous growth in the field of wireless sensor networks (WSNs) in recent years, which is reflected in various applications. As the use of WSN applications increases, providing security to WSNs becomes a leading issue. This is complex due to the unique features of WSNs. This paper proposes a trust-based intrusion detection that uses multi-attribute trust metrics to improve detection accuracy. It uses an enhanced distributive trust calculation algorithm that involves monitoring neighbouring nodes and trust calculation using the trust metrics message success rate (MSR), elapsed time at node (ETN), correctness (CS) and fairness (FS). In addition to the normal communication-based trust property MSR, this paper uses effective parameters like ETN, which focuses on data and address modification attacks in an effective manner, and two social-interaction-based parameters CS and FS, which address trust-related attacks effectively. Simulation results show that the proposed method has higher performance and provides more security in terms of detection accuracy and false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5

Similar content being viewed by others

References

  1. Butun I, Morgera S D and Sankar R 2013 A survey of intrusion detection systems in wireless sensor network. IEEE Commun. Surv. Tutor. 16(1): 266–282

    Article  Google Scholar 

  2. Deng X, Wu R, Wang W and Bu R 2013 An intrusion detection system for cluster based wireless sensor networks. Inf. Technol. J. 12(9): 1764–1771

    Article  Google Scholar 

  3. Theodorakopoulos G and Baras J S 2006 On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 318–332

    Article  Google Scholar 

  4. Cayirci E and Rong C 2009 Security in wireless adhoc and sensor networks. New York: Wiley

    Book  Google Scholar 

  5. Padmavathi G and Shanmugapriya D 2009 A survey of attacks, security mechanisms, and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Technol. 4(1–2): 117–125

    Google Scholar 

  6. Fuchsberger A 2005 Intrusion detection systems and intrusion prevention systems. Inf. Secur. Tech. Rep. 10(3): 134–139

    Article  Google Scholar 

  7. Wei Z, Tang H, Yu F R, Wang M and Mason P 2014 Security enhancements for mobile adhoc networks with trust management using uncertain reasoning. IEEE Trans. Veh. Technol. 63(9): 4647–4658

    Article  Google Scholar 

  8. Qassim Q, Patel A and Mahd-Zin A 2014 Strategy to reduce false alarms in intrusion detection and prevention systems. Int. Arab J. Inf. Technol. 11(5): 500–506

    Google Scholar 

  9. Boukerch A, Xu L and El-Khatib K 2007 Trust-based security for wireless ad-hoc and sensor networks. Comput. Commun. 30(11–12): 2413–2427

    Article  Google Scholar 

  10. Yao Z, Kim D and Doh Y 2006 PLUS: parameterized and localized trust management scheme for sensor networks security. Proceedings of the IEEE International Conference on Mobile Ad hoc Sensor Systems, pp. 437–446

  11. Yu Y, Li K, Zhou W and Li P 2012 Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3): 867–880

    Article  Google Scholar 

  12. Ganeriwal S and Srivastava M B 2004 Reputation-based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), Washington, USA, pp. 66–77

  13. Shaikh R A, Jameel H, Auriol J B and Lee H 2009 Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11): 1698–1712

    Article  Google Scholar 

  14. Xiang G, Jianlin Q and Jin W 2012 Research on trust model of sensor nodes in WSNs. International Workshop on Information and Electronics Engineering. Proc. Eng. 29: 909–913

    Article  Google Scholar 

  15. Bao F, Chen I R, Chang M and Cho J H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169–183

    Article  Google Scholar 

  16. Ram Prabha V and Latha P 2014 Game theory model for intrusion detection in WSN using hierarchical trust management. Int. Rev. Comput. Softw. 9(6): 1055–1064

    Google Scholar 

  17. Kim T K and Seo H S 2008 A trust model using fuzzy logic in wireless sensor network. Int. J. Electr. Comput. Energetic Electron. Commun. Eng. 2(6): 1051–1054

    Google Scholar 

  18. Hu H and Chen Y 2009 Weighted trust calculation based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Secur. 3(2): 132–149

    Article  Google Scholar 

  19. Liu K, Abu-Ghazaleh N and Kang K D 2007 Location verification and trust management for resilient geographic routing. J. Parallel Distrib. Comput. 67(2): 215–228

    Article  MATH  Google Scholar 

  20. Loo C E, Ng M Y, Leckie C and Palaniswami M 2006 Intrusion detection for routing attacks in sensor networks. Int. J. Distrib. Sens. Netw. 2(4): 313–332

    Article  Google Scholar 

  21. Network Simulator: http://www.isi.edu/nsnam

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V Ram Prabha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ram Prabha, V., Latha, P. Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sādhanā 42, 143–151 (2017). https://doi.org/10.1007/s12046-016-0588-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12046-016-0588-2

Keywords

Navigation