Skip to main content

TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs

  • Conference paper
  • First Online:
Book cover Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

The efficiency and reliability are crucial indexes when a trust system is applied into Wireless Sensor Networks (WSNs). In this paper, an efficient and reliable Trusted Intrusion Detection System (TIDS) with double cluster heads for WSNs is proposed. Firstly, an intrusion detection scheme based on trust is discussed. The monitoring nodes are responsible for evaluating the credibility of Cluster Member (CM) instead of depending on the feedback between CMs, which is suitable for decreasing the energy consumption of WSNs and reducing the influence of malicious nodes. Secondly, a new trust evaluation method is defined in TIDS and it takes the data forwarding and communication tasks into consideration which may enhance the reliability of Cluster Head (CH). The theoretical and simulation results show that our solution can effectively reduce the system overhead and improve the robustness of WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266–282 (2014)

    Google Scholar 

  2. Parmar, K., Jinwala, D.C.: Concealed data aggregation in wireless sensor networks. Comput. Netw. 103(C), 207–227 (2016)

    Google Scholar 

  3. Baker, D.: The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans. Commun. 29(11), 1694–1701 (2003)

    Google Scholar 

  4. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE, Maui (2000)

    Google Scholar 

  5. Zhang, H., Arora, A.: Gs3: scalable self-configuration and self-healing in wireless sensor networks. Comput. Netw. 43(4), 459–480 (2003)

    Google Scholar 

  6. Wei, D., Jin, Y., Vural, S., Moessner, K., Tafazolli, R.: An energy-efficient clustering solution for wireless sensor networks. IEEE Trans. Wirel. Commun. 10(11), 3973–3983 (2011)

    Google Scholar 

  7. Fu, J.S., Liu, Y.: Double cluster heads model for secure and accurate data fusion in wireless sensor networks. Sensors 15(1), 2021–2040 (2015)

    Google Scholar 

  8. Bao, F., Chen, I.R., Chang, M.J., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169–183 (2012)

    Google Scholar 

  9. Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77. ACM, Washington DC (2004)

    Google Scholar 

  10. Zhan, G., Shi, W., Deng, J.: Design and implementation of TARF: a trust-aware routing framework for WSNs. IEEE Comput. Soc. 9(2), 184–197 (2012)

    Google Scholar 

  11. Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wirel. Netw. 16(5), 1493–1510 (2010)

    Google Scholar 

  12. Shaikh, R.A., Jameel, H., Lee, S., Rajput, S., Song, Y.J.: Trust management problem in distributed wireless sensor networks. In: Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications, pp. 411–414. IEEE, Sydney (2006)

    Google Scholar 

  13. Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008)

    Google Scholar 

  14. Liu, C.X., Liu, Y., Zhang, Z.J.: Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–11 (2013)

    Google Scholar 

  15. Su, X., Boppana, R.V.: On mitigating in-band wormhole attacks in mobile ad hoc networks. In: Proceedings of IEEE International Conference on Communications, pp. 1136–1141. IEEE, Glasgow (2007)

    Google Scholar 

  16. Karlof, C., Wangner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2), 293–315 (2003)

    Google Scholar 

  17. Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in WSN. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, pp. 134–141. IEEE, San Francisco (2012)

    Google Scholar 

  18. Cho, Y., Qu, G.: Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs. Int. J. Distrib. Sens. Netw. 1–16 (2013)

    Google Scholar 

  19. Kefayati, M., Talebi, M.S., Rabiee, H.R., Khalaj, B.H.: On secure consensus information fusion over sensor networks. In: Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, pp. 108–115. IEEE, Amman (2007)

    Google Scholar 

  20. Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In: Proceedings of the 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 356–367. ACM, Florence (2006)

    Google Scholar 

  21. Sen, J.: Secure and energy-efficient data aggregation in wireless sensor networks. In: Proceedings of the 2nd IEEE Computational Intelligence and Signal Processing. IEEE, Guwahati (2012)

    Google Scholar 

  22. Xiaomei, D.: Secure data aggregation approach based on monitoring in wireless sensor networks. China Commun. 3(3), 101–148 (2012)

    Google Scholar 

  23. Hua, P., Liu, X., Yu, J., Dang, N., Zhang, X.: Energy-efficient adaptive slice-based secure data aggregation scheme in WSN. Procedia Comput. Sci. 129, 188–193 (2018)

    Google Scholar 

Download references

Acknowledgements

This work is supported by NSF of China under Grants 61373027 and 61672321; Shandong Graduate Education Quality Improvement Plan (SDYY17138).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaowu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, N., Liu, X., Yu, J., Zhang, X. (2019). TIDS: Trust Intrusion Detection System Based on Double Cluster Heads for WSNs. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics