Abstract
The efficiency and reliability are crucial indexes when a trust system is applied into Wireless Sensor Networks (WSNs). In this paper, an efficient and reliable Trusted Intrusion Detection System (TIDS) with double cluster heads for WSNs is proposed. Firstly, an intrusion detection scheme based on trust is discussed. The monitoring nodes are responsible for evaluating the credibility of Cluster Member (CM) instead of depending on the feedback between CMs, which is suitable for decreasing the energy consumption of WSNs and reducing the influence of malicious nodes. Secondly, a new trust evaluation method is defined in TIDS and it takes the data forwarding and communication tasks into consideration which may enhance the reliability of Cluster Head (CH). The theoretical and simulation results show that our solution can effectively reduce the system overhead and improve the robustness of WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)
Parmar, K., Jinwala, D.C.: Concealed data aggregation in wireless sensor networks. Comput. Netw. 103(C), 207–227 (2016)
Baker, D.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans. Commun. 29(11), 1694–1701 (2003)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE, Maui (2000)
Zhang, H., Arora, A.: Gs3: scalable self-configuration and self-healing in wireless sensor networks. Comput. Netw. 43(4), 459–480 (2003)
Wei, D., Jin, Y., Vural, S., Moessner, K., Tafazolli, R.: An energy-efficient clustering solution for wireless sensor networks. IEEE Trans. Wirel. Commun. 10(11), 3973–3983 (2011)
Fu, J.S., Liu, Y.: Double cluster heads model for secure and accurate data fusion in wireless sensor networks. Sensors 15(1), 2021–2040 (2015)
Bao, F., Chen, I.R., Chang, M.J., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)
Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM, Washington DC (2004)
Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Comput. Soc. 9(2), 184–197 (2012)
Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5), 1493–1510 (2010)
Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications, pp. 411–414. IEEE, Sydney (2006)
Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008)
Liu, C.X., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–11 (2013)
Su, X., Boppana, R.V.: On mitigating in-band wormhole attacks in mobile ad hoc networks. In: Proceedings of IEEE International Conference on Communications, pp. 1136–1141. IEEE, Glasgow (2007)
Karlof, C., Wangner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)
Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in WSN. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 134–141. IEEE, San Francisco (2012)
Cho, Y., Qu, G.: Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs. Int. J. Distrib. Sens. Netw. 1–16 (2013)
Kefayati, M., Talebi, M.S., Rabiee, H.R., Khalaj, B.H.: On secure consensus information fusion over sensor networks. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 108–115. IEEE, Amman (2007)
Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, Florence (2006)
Sen, J.: Secure and energy-efficient data aggregation in wireless sensor networks. In: Proceedings of the 2nd IEEE Computational Intelligence and Signal Processing. IEEE, Guwahati (2012)
Xiaomei, D.: Secure data aggregation approach based on monitoring in wireless sensor networks. China Commun. 3(3), 101–148 (2012)
Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)
Acknowledgements
This work is supported by NSF of China under Grants 61373027 and 61672321; Shandong Graduate Education Quality Improvement Plan (SDYY17138).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Dang, N., Liu, X., Yu, J., Zhang, X. (2019). TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-23597-0_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23596-3
Online ISBN: 978-3-030-23597-0
eBook Packages: Computer ScienceComputer Science (R0)