Abstract
Despite the rapid development of WSNs and its increasing integrations in different areas, they remain very vulnerable to attacks because of their limitation of resources and their brittle use. Several trusted works have been developed for this purpose. Despite the robustness of the same trust model from literature, they do not take into account the most attacks that threaten wireless sensor networks. Similarly, they do not take into account the different layers of the OSI model. View all these limitations, we have created a new model, a very effective one, which takes into account most of the attacks that can take place in different layers of the OSI model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Di Pietro, R., Guarino, S., Verde, N., Domingo-Ferrer, J.: Security in wireless ad-hoc networks: a survey. Comput. Commun. 51, 1–20 (2014). Elsevier
Chen, H., Wu, H., Zhou, X., Gao, C.: Agent-based trust model in wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE (2007)
Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Computer Engineering Department, Elsevier (2008)
Jøsang, O., Ismail, R.: The beta reputation system. In: The 15th Bled Electronic Commerce Conference, Bled, Slovenia (2002)
Ganeriwal, C., Balzanoand, L.K., Srivastava, M.B.: Reputation-based frame work for high integrity sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Adhoc and Sensor Networks (2004)
Yao, Z., Kimand, D., Doh, Y.: PLUS: parameterized and localized trust management scheme for sensor network security. In: IEEE International Conference on Mobile Adhoc and Sensor Systems (2008)
Deng, H., Sun, X., Wang, B., Cao, Y.: Selective forwarding attack detection using water marking WSNs. In: ISECS International Colloquium on Computing, Communication, Control, and Management (2009)
Hur, J., Lee, Y.,Yoon, H., Choiand, D., Jin, S.: Trust evaluation model for wireless sensor networks. In: The 7th International Conference on Advanced Communication Technology, pp. 491–496 (2005)
Na, Y., Liping, G., Chunxue, W.: A light-weighted data trust model in WSN. Int. J. Grid Distrib. Comput. 7(2), 33–40 (2014)
Kumar, M., Alex, L., et al.: A hybrid trust based secure model for wireless sensor network. Int. J. Emerg. Trends Technol. Comput. Sci. 141–147 (2014)
Maddar, H., Kammoun, W., Cheikhrouhou,O., Youssef, H.: Lightweight trust model with high longevity for wireless sensor networks. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, pp. 548–553 (2016). ISBN 978-989-758-167-0
Stanoev, A., Filiposka, S., et al.: Cooperative method for wireless sensor network localization. Ad Hoc Netw. 40, 61–72 (2016)
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p. 10 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Maddar, H., Kammoun, W., Youssef, H. (2017). Trust Intrusion Detection System Based on Location for Wireless Sensor Network. In: Madureira, A., Abraham, A., Gamboa, D., Novais, P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham. https://doi.org/10.1007/978-3-319-53480-0_82
Download citation
DOI: https://doi.org/10.1007/978-3-319-53480-0_82
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53479-4
Online ISBN: 978-3-319-53480-0
eBook Packages: EngineeringEngineering (R0)