z-logo
open-access-imgOpen Access
Neighbor Node Trust based Intrusion Detection System for WSN
Author(s) -
Syed Muhammad Sajjad,
Safdar Hussain Bouk,
Muhammad Yousaf
Publication year - 2015
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2015.08.331
Subject(s) - computer science , node (physics) , computer network , trust management (information system) , intrusion detection system , network packet , trustworthiness , packet forwarding , anomaly detection , wireless sensor network , computer security , sybil attack , scheme (mathematics) , denial of service attack , data mining , the internet , structural engineering , engineering , mathematical analysis , mathematics , world wide web
Timely detection of anomalous activity in wireless sensor network is critical for the smooth working of the network. This paper presents an intrusion detection technique based on the calculation of trust of the neighboring node. In the proposed IDS, each node observes the trust level of its neighboring nodes. Based on these trust values, neighboring nodes may be declared as trustworthy, risky or malicious. Trustworthy nodes are recommended to the forwarding engine for packet forwarding purposes. The proposed scheme successfully detects Hello flood attack, jamming attack and selective forwarding attack by analyzing the network statistics and malicious node behavior. The simulation results show that network performs better when neighbor node trust management based anomaly detection technique is in place

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom