LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion dete...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2019-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2019/2054298 |
id |
doaj-42040106fe8e4567bdf25b42be456aa7 |
---|---|
record_format |
Article |
spelling |
doaj-42040106fe8e4567bdf25b42be456aa72020-11-24T23:58:54ZengHindawi LimitedJournal of Computer Networks and Communications2090-71412090-715X2019-01-01201910.1155/2019/20542982054298LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection SystemUmashankar Ghugar0Jayaram Pradhan1Sourav Kumar Bhoi2Rashmi Ranjan Sahoo3Department of Computer Science, Berhampur University, Odisha 760007, IndiaDepartment of Computer Science, Berhampur University, Odisha 760007, IndiaAdvanced Computing and Research Lab, Department of Computer Science and Engineering, Parala Maharaja Engineering College, Berhampur 761003, Odisha, IndiaAdvanced Computing and Research Lab, Department of Computer Science and Engineering, Parala Maharaja Engineering College, Berhampur 761003, Odisha, IndiaWireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang’s scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang’s scheme.http://dx.doi.org/10.1155/2019/2054298 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Umashankar Ghugar Jayaram Pradhan Sourav Kumar Bhoi Rashmi Ranjan Sahoo |
spellingShingle |
Umashankar Ghugar Jayaram Pradhan Sourav Kumar Bhoi Rashmi Ranjan Sahoo LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System Journal of Computer Networks and Communications |
author_facet |
Umashankar Ghugar Jayaram Pradhan Sourav Kumar Bhoi Rashmi Ranjan Sahoo |
author_sort |
Umashankar Ghugar |
title |
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System |
title_short |
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System |
title_full |
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System |
title_fullStr |
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System |
title_full_unstemmed |
LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System |
title_sort |
lb-ids: securing wireless sensor network using protocol layer trust-based intrusion detection system |
publisher |
Hindawi Limited |
series |
Journal of Computer Networks and Communications |
issn |
2090-7141 2090-715X |
publishDate |
2019-01-01 |
description |
Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. In this paper, a protocol layer trust-based intrusion detection system (LB-IDS) is proposed to secure the WSN by detecting the attackers at different layers. The trust value of a sensor node is calculated using the deviation of trust metrics at each layer with respect to the attacks. Mainly, we consider trustworthiness in the three layers such as physical layer trust, media access control (MAC) layer trust, and network layer trust. The trust of a sensor node at a particular layer is calculated by taking key trust metrics of that layer. Finally, the overall trust value of the sensor node is estimated by combining the individual trust values of each layer. By applying the trust threshold, a sensor node is detected as trusted or malicious. The performance of LB-IDS is evaluated by comparing the results of the three performance parameters such as detection accuracy, false-positive rate, and false-negative rate, with the results of Wang’s scheme. We have implemented jamming attack at the physical layer, back-off manipulation attack at the MAC layer, and sinkhole attack at the network layer using simulations. We have also implemented a cross-layer attack using the simulation where an attacker simultaneously attacks the MAC layer and network layer. Simulation results show that the proposed LB-IDS performs better as compared with Wang’s scheme. |
url |
http://dx.doi.org/10.1155/2019/2054298 |
work_keys_str_mv |
AT umashankarghugar lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem AT jayarampradhan lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem AT souravkumarbhoi lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem AT rashmiranjansahoo lbidssecuringwirelesssensornetworkusingprotocollayertrustbasedintrusiondetectionsystem |
_version_ |
1725449062778404864 |