基于分布式信任的无线传感器网络入侵检测方法

A. Dhakne, P. Chatur
{"title":"基于分布式信任的无线传感器网络入侵检测方法","authors":"A. Dhakne, P. Chatur","doi":"10.1109/CCINTELS.2015.7437886","DOIUrl":null,"url":null,"abstract":"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.","PeriodicalId":131816,"journal":{"name":"2015 Communication, Control and Intelligent Systems (CCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Distributed Trust based Intrusion Detection approach in wireless sensor network\",\"authors\":\"A. Dhakne, P. Chatur\",\"doi\":\"10.1109/CCINTELS.2015.7437886\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.\",\"PeriodicalId\":131816,\"journal\":{\"name\":\"2015 Communication, Control and Intelligent Systems (CCIS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Communication, Control and Intelligent Systems (CCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCINTELS.2015.7437886\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Communication, Control and Intelligent Systems (CCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCINTELS.2015.7437886","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

摘要

无线传感器网络在战场监视、医疗卫生等主要领域有着广泛的应用,其安全性一直是一个重要的问题。基本上,处理无线传感器网络的安全主要有三个组成部分:预防、检测和缓解。但是要防止无线传感器网络经常受到恶意攻击是非常困难的,因此及早发现恶意攻击,对无线传感器网络做出反应,不造成损害是非常重要的。提出了基于分布式信任的入侵检测(DTBID)方法,该方法考虑了多个因素来建立传感器节点的信任。大多数研究工作只考虑沟通行为来获得信任。我们的入侵检测系统将考虑分布在能量、可靠性、数据等因素中的信任。我们从这些因素中推导并形成了直接信任、推荐信任和间接信任。我们提供了一种判断特定节点是否为恶意节点的方法,该方法通过比较我们的入侵检测技术得出的主观信任与基于每个节点实际信息计算的客观信任,而不考虑任何网络动态(如节点移动、信任随时间衰减和任何恶意攻击)。如果从我们的模型中得到的主观信任与客观信任之间存在很大的差异,那么我们将传感器节点视为恶意节点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Distributed Trust based Intrusion Detection approach in wireless sensor network
Security of wireless sensor network is always a major thing as it has widespread application in most of the major domains such as battlefield surveillance, healthcare, etc. Basically there are three main components that deal with security of wireless sensor network, prevention, detection and mitigation. But it is very difficult to prevent wireless sensor network always from malicious attacks so it is always important to detect them as early as possible so that we can react to the attack not harm to wireless sensor network., This paper proposes Distributed Trust based Intrusion Detection (DTBID) approach which considers several factors for establishing trust of sensor node. Most of the research work only considers the communication behavior to derive the trust. Our intrusion detection system will consider trust which is distributed among some other factors such as energy, reliability, data etc. We derive and formulate trust such as direct trust, recommendation trust, and indirect trust from these factors. We provide an approach to decide whether particular node is malicious node or not by comparing subjective trust derived from our intrusion detection technique to that of objective trust which is calculated based on the actual information of each node without considering any network dynamics such as node mobility, trust decay over time, and any malicious attacks. If there is a lot of difference between subjective trust derived from our model to that of objective trust then we consider sensor node as malicious node.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
EMG signal based finger movement recognition for prosthetic hand control Gain and directivity enhancement of microstrip patch array antenna with metallic ring for WLAN/Wi-Fi applications Analysis of prosody based automatic LID systems A novel framework for adaptive user interface Design of FIR band-pass digital filter using Heuristic Optimization Technique: A comparison
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1