Loading [MathJax]/extensions/MathZoom.js
An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks | IEEE Conference Publication | IEEE Xplore

An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks


Abstract:

Wireless Sensor Networks (WSNs) are widely applied to monitor environments such as military surveillance and reconnaissance. However, individual sensor nodes are vulnerab...Show More

Abstract:

Wireless Sensor Networks (WSNs) are widely applied to monitor environments such as military surveillance and reconnaissance. However, individual sensor nodes are vulnerable to some types of attacks because they are usually deployed in open and unprotected environments. Once sensor nodes are compromised, malicious nodes can send erroneous data to the base station, and possibly mislead monitoring results and influence the whole networks' effectiveness. We need to find new mechanisms to protect the wireless networks from attacks. In this paper we develop a scheme for malicious node detection based on weighted-trust evaluation. A weight value is assigned to each sensor node initially. It updates every cycle if the node sends different report from the others. A malicious node will be detected when its weight value is lower than a threshold value. The simulation results show that our approach is more effective in detecting malicious nodes with lower misdetection ratio compared with existing schemes.
Date of Conference: 16-18 December 2010
Date Added to IEEE Xplore: 30 December 2010
ISBN Information:

ISSN Information:

Conference Location: Sanya, China
Citations are not available for this document.

I. Introduction

Nowadays Information Technology(IT) is propelling a new revolution in military affairs. The one who can superiorly obtain, transmit and process information will take the initiative of war. Wireless Sensor Networks [1] with its unique advantages can meet the real-time access, accurate positioning, and comprehensive information requirements in many military occasions. The research on WSNs directly contributed to the new revolution in military affairs.

Cites in Papers - |

Cites in Papers - IEEE (7)

Select All
1.
Lekhchand Sharnagat, Rajesh Babu, Jayant Adhikari, "Trust Evaluation for Securing Compromised data Aggregation against the Collusion Attack in WSN", 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), pp.1-5, 2020.
2.
Neeraj Kumar Singh, Vasundhara Mahajan, "Cyber Attack Detection In Smart Grid Substation Using Virtual Range Increment And Trust Weight", 2019 8th International Conference on Power Systems (ICPS), pp.1-6, 2019.
3.
Halil Yiğit Öksüz, Mehmet Akar, "Distributed Multi-Equilibria Consensus in the Presence of Byzantine Adversaries and Time Delays", 2018 26th Mediterranean Conference on Control and Automation (MED), pp.1-9, 2018.
4.
Halil Yiğit Öksüz, Mehmet Akar, "Distributed consensus in resilient networks", 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pp.6383-6388, 2017.
5.
J. M. Chandramouli, Juan Ramos, Lakshmi Srinivasan, Prahlad Suresh, Prashanth Kannan, Garth Crosby, Lanier Watkins, "Using network traffic to infer compromised neighbors in wireless sensor nodes", 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp.1022-1023, 2017.
6.
Xue Deng, "An intrusion detection system for cluster based wireless sensor networks", 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC), pp.1-5, 2013.
7.
Timo Kiravuo, "Reputation Based Collaboration among Ethernet Switches", 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.893-896, 2011.

Cites in Papers - Other Publishers (8)

1.
Halil Yi?it Oksuz, Mehmet Akar, "Resilient group consensus in the presence of Byzantine agents", International Journal of Control, vol.94, no.3, pp.807, 2021.
2.
Firas Zawaideh, Muhammed Salamah, "An efficient weighted trust-based malicious node detection scheme for wireless sensor networks", International Journal of Communication Systems, vol.32, no.3, pp.e3878, 2019.
3.
Chan-O Hong, Yoon-Hwa Choi, "Proximity-Based Robust Event Detection in Wireless Sensor Networks", International Journal of Distributed Sensor Networks, vol.10, no.7, pp.632397, 2014.
4.
Sung Lim, Yoon-Hwa Choi, "Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks", Journal of Sensor and Actuator Networks, vol.2, no.1, pp.70, 2013.
5.
Aline S. Siranossian, Hoda W. Maalouf, Sensor Systems and Software, vol.122, pp.17, 2013.
6.
Min-Cheol Shin, Yoon-Hwa Choi, "Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network", Wireless Sensor Network, vol.05, no.03, pp.52, 2013.
7.
Sung-Jib Yim, Yoon-Hwa Choi, "Neighbor-Based Malicious Node Detection in Wireless Sensor Networks", Wireless Sensor Network, vol.04, no.09, pp.219, 2012.
8.
Seo Hyun Oh, Chan O. Hong, Yoon Hwa Choi, "A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks", Wireless Sensor Network, vol.04, no.03, pp.84, 2012.
Contact IEEE to Subscribe

References

References is not available for this document.