LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System

Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion dete...

Full description

Bibliographic Details
Main Authors: Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi, Rashmi Ranjan Sahoo
Format: Article
Language:English
Published: Hindawi Limited 2019-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2019/2054298
id doaj-42040106fe8e4567bdf25b42be456aa7
record_format Article
spelling doaj-42040106fe8e4567bdf25b42be456aa72020-11-24T23:58:54ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2019-01-01201910.1155/2019/20542982054298LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection SystemUmashankar Ghugar0Jayaram Pradhan1Sourav Kumar Bhoi2Rashmi Ranjan Sahoo3Department of Computer Science, Berhampur University, Odisha 760007, IndiaDepartment of Computer Science, Berhampur University, Odisha 760007, IndiaAdvanced Computing and Research Lab, Department of Computer Science and Engineering, Parala Maharaja Engineering College, Berhampur 761003, Odisha, IndiaAdvanced Computing and Research Lab, Department of Computer Science and Engineering, Parala Maharaja Engineering College, Berhampur 761003, Odisha, IndiaWireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang’s scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang’s scheme.http://dx.doi.org/10.1155/2019/2054298
collection DOAJ
language English
format Article
sources DOAJ
author Umashankar Ghugar
Jayaram Pradhan
Sourav Kumar Bhoi
Rashmi Ranjan Sahoo
spellingShingle Umashankar Ghugar
Jayaram Pradhan
Sourav Kumar Bhoi
Rashmi Ranjan Sahoo
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
Journal of Computer Networks and Communications
author_facet Umashankar Ghugar
Jayaram Pradhan
Sourav Kumar Bhoi
Rashmi Ranjan Sahoo
author_sort Umashankar Ghugar
title LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
title_short LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
title_full LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
title_fullStr LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
title_full_unstemmed LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
title_sort lb-ids: securing wireless sensor network using protocol layer trust-based intrusion detection system
publisher Hindawi Limited
series Journal of Computer Networks and Communications
issn 2090-7141
2090-715X
publishDate 2019-01-01
description Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang’s scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang’s scheme.
url http://dx.doi.org/10.1155/2019/2054298
work_keys_str_mv AT umashankarghugar lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem
AT jayarampradhan lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem
AT souravkumarbhoi lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem
AT rashmiranjansahoo lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem
_version_ 1725449062778404864