Skip to main content

Trust Intrusion Detection System Based on Location for Wireless Sensor Network

  • Conference paper
  • First Online:
Book cover Intelligent Systems Design and Applications (ISDA 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 557))

Abstract

Despite the rapid development of WSNs and its increasing integrations in different areas, they remain very vulnerable to attacks because of their limitation of resources and their brittle use. Several trusted works have been developed for this purpose. Despite the robustness of the same trust model from literature, they do not take into account the most attacks that threaten wireless sensor networks. Similarly, they do not take into account the different layers of the OSI model. View all these limitations, we have created a new model, a very effective one, which takes into account most of the attacks that can take place in different layers of the OSI model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Di Pietro, R., Guarino, S., Verde, N., Domingo-Ferrer, J.: Security in wireless ad-hoc networks: a survey. Comput. Commun. 51, 1–20 (2014). Elsevier

    Article  Google Scholar 

  2. Chen, H., Wu, H., Zhou, X., Gao, C.: Agent-based trust model in wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE (2007)

    Google Scholar 

  3. Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Engineering Department, Elsevier (2008)

    Google Scholar 

  4. Jøsang, O., Ismail, R.: The beta reputation system. In: The 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)

    Google Scholar 

  5. Ganeriwal, C., Balzanoand, L.K., Srivastava, M.B.: Reputation-based frame work for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Adhoc and Sensor Networks (2004)

    Google Scholar 

  6. Yao, Z., Kimand, D., Doh, Y.: PLUS: parameterized and localized trust management scheme for sensor network security. In: IEEE International Conference on Mobile Adhoc and Sensor Systems (2008)

    Google Scholar 

  7. Deng, H., Sun, X., Wang, B., Cao, Y.: Selective forwarding attack detection using water marking WSNs. In: ISECS International Colloquium on Computing, Communication, Control, and Management (2009)

    Google Scholar 

  8. Hur, J., Lee, Y.,Yoon, H., Choiand, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, pp. 491–496 (2005)

    Google Scholar 

  9. Na, Y., Liping, G., Chunxue, W.: A light-weighted data trust model in WSN. Int. J. Grid Distrib. Comput. 7(2), 33–40 (2014)

    Article  Google Scholar 

  10. Kumar, M., Alex, L., et al.: A hybrid trust based secure model for wireless sensor network. Int. J. Emerg. Trends Technol. Comput. Sci. 141–147 (2014)

    Google Scholar 

  11. Maddar, H., Kammoun, W., Cheikhrouhou,O., Youssef, H.: Lightweight trust model with high longevity for wireless sensor networks. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 548–553 (2016). ISBN 978-989-758-167-0

    Google Scholar 

  12. Stanoev, A., Filiposka, S., et al.: Cooperative method for wireless sensor network localization. Ad Hoc Netw. 40, 61–72 (2016)

    Article  Google Scholar 

  13. Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hela Maddar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Maddar, H., Kammoun, W., Youssef, H. (2017). Trust Intrusion Detection System Based on Location for Wireless Sensor Network. In: Madureira, A., Abraham, A., Gamboa, D., Novais, P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-319-53480-0_82

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53480-0_82

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53479-4

  • Online ISBN: 978-3-319-53480-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics