Open Access Open Access  Restricted Access Subscription or Fee Access

An EDTM Based Intrusion Prevention System

K. Sathis Kumar, Dr.P. Rajeswari

Abstract


Due to the wireless and resource-constraint nature of a sensor network makes it an ideal medium for malicious attackers to intrude the system during packet transmission. Thus, providing security is extremely important for the safe application of WSNs. In order to prevent the nodes from various attacks we propose an intrusion prevention system based on trust modeling and evaluation in EDTM. The proposed method will prevent the nodes from various attacks based on trust modeling and evaluation in EDTM. The EDTM can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively. According to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated. Then, communication trust, energy trust and data trust are considered during the calculation of direct trust. Furthermore, trust reliability and familiarity are defined to improve the accuracy of recommendation trust. A multi-hop network which means that the sensor nodes can only directly communication with the neighbor nodes within their communication range the packets exchanged between any two non-neighbor nodes are forwarded by other nodes. The forwarding node not only can just “pass” the packets from source nodes to destination nodes but also can process the information based on their own judgments. The simulation results are provided to compare that proposed model is efficient to use than NBBTE model.


Keywords


Wireless Sensor Networks, Network Security, Efficient Distributed Trust Model.

Full Text:

PDF

References


S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation based framework for high integrity sensor networks,” in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 66–77.

R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory,” Sensors, vol. 11, pp. 1345–1360, 2011.

A. Perrig, J. Stankovic, D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM, 2004.

Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and localized trust management scheme for sensor networks security,” in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008, pp. 437–446

H. Chan and A Perrig, “Security and privacy in sensor networks,” Comput., vol. 36, no. 10, pp. 103–105, Oct. 2003.

K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile ad hoc networks: A survey,” IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 279–298, 2nd Quarter 2012

H. S. Lim, Y. S. Moon, and E. Bertino, “Provenance based trustworthiness assessment in sensor networks,” in Proc. 7th Int. Workshop Data Manage. Sens. Netw., 2010, pp. 2–7.

K. Nordheimer, T. Schulze, and D. Veit, “Trustworthiness in networks:A simulation approach for approximating local trust and distrust values,” IEEE Commun. Surveys Tuts., vol. 321, pp. 157–171, 2010.

Jing, Q.; Tang, L.Y.; Chen, Z. Trust Management in Wireless Sensor Networks. J. Softw. 2008, 19, 1716-1730

A. Boukerch, L. Xu and K. EL-Khatib, “Trust-based security for wireless ad hoc and sensor networks,” Computer Communications, no. 30, pp. 2413–2427, 2007.

M. Momani, “Trust models in wireless sensor networks: A survey,” Recent Trends in Network Security and Applications: Communications in Computer and Information Science, vol. 89, no. 1, pp. 37–46, 2010.

V. Balakrishnan, V. Varadharajan, U. K. Tupakula and P. Lucs, “Trust and recommendations in mobile ad hoc networks,” in Proc. 3rd International Conference on Networking and Services (ICNS 2007), pp. 64–69, 2007.

J. Lopez, R. Romana, I. Agudoa, and C. Fernandez-Gago, “Trust management systems for wireless sensor networks: Best practices,” Computers & Security, vol. 28, no. 7, pp. 545–556, 2009.


Refbacks

  • There are currently no refbacks.