Authors E.S. Abramov, A.S. Basan, E.S. Basan
Month, Year 07, 2015 @en
Index UDC 004.056: 004.73
Abstract To date, there are a large number of papers on various aspects of security in wireless sensor networks. We developed the trust management system (TMS). The system is based on data collection and exchange between neighboring nodes and a calculation of the trust values based on received metrics. This system helps to resist from threats posed by malicious insiders and the threat of compromised nodes, to detect and isolate anomalous node. The main purpose of this system is to protect the WSN from malicious actions of the attacker. To achieve the goal we need to perform the following tasks: detecting misconduct attacker; blocking malicious nodes; prevent the implementation of attacks; determining the authenticity of the nodes; establish trusted connections between honest nodes; identification of faulty nodes and blocking their work. The trust system allows not only establishing trust relationship between neighboring nodes, but also allows detecting and blocking invasion by the attacker. Intrusion detection is possible by analyzing the quantity and quality of forwarding packets and compares this value with the level of residual node energy. Thus, if an attacker realized an active attack, for example, a packet delay; the system can detect it and take action to block it. This system will not be able to fix passive listening attack and interception of information, to protect against such attacks requires the use of cryptographic techniques.

Download PDF

Keywords Wireless sensor networks; clustering; attack; trust; protocol; algorithms; anomaly detection; authenticity; confidence level.
References 1. Mitrokotsa А., Dimitrakakis С. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection, Ad Hoc Networks, 2013, No. 11, pp. 226-237.
2. Ho J.W. Zone-based trust management in sensor networks, in IEEE International Conference on Pervasive Computing and Communications, 2009, pp. 1-2.
3. Jiang T., Baras J.S. Trust evaluation in anarchy: A case study on autonomous networks, 25th IEEE International Conference on Computer Communications, INFOCOM’06, 2006, pp. 1-12.
4. Liu Z., Joy A.W., Thompson R.A. A dynamic trust model for mobile ad hoc networks, IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS’04, 2004, pp. 80-85.
5. Josang A., Ismail R., Boyd C. A survey of trust and reputation systems for online service provision, Decis. Support Syst., 2007, Vol. 43, No. 2, pp. 618-644.
6. Dressler F. A Study of Self-Organization Mechanisms in Ad Hoc and Sensor Networks, Computer Communications, 2008, Vol. 31, No. 13, pp. 3018-3029.
7. Kamvar S., Schlosser M., Garcia-Molina H. The EigenTrust Algorithm for Reputation Management in P2P Networks, Proceedings of the 12th international conference on World Wide Web, 2008, pp. 640-651.
8. Velloso P.B., Laufer R.P., Pujolle G. A trust model robust to slander attacks in adhocnetworks, IEEE International Conference on Computer Communications and Networks (ICCCN08), 2008, pp. 1-6.
9. Gоmez Mаrmol F., Martнnez Pеrez G. Providing Trust in Wireless Sensor Networks using a Bioinspired Technique, Telecommunication Systems Journal, 2011,Vol. 46, No. 2, pp. 163-180.
10. Zhou R., Hwang, K. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Transactions on Parallel and Distributed Systems, 2007, Vol. 18, No. 4, pp. 460-473.
11. Handy M.J., Haase M., Timmermann D. Low energy adaptive clustering hierarchy with deterministic Cluster-Heads selection, 4th International Workshop on Mobile and Wireless Communications Network, 2002, pp. 368-372.
12. Chen H., Wu H., Zhou X. Agent-based trust model in wireless sensor networks, 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007, pp. 119-124.
13. Chen H. Task-based trust management for wireless sensor networks, International Journal of Security and Its Applications, 2009, Vol. 3, No. 2, pp. 21-26.
14. Teodor-Grigore. Main Types of Attacks in Wireless Sensor Networks, Proceeding SSIP'09/MIV'09. USA, 2009, pp. 180-185.
15. Lima M.N.,. dos Santos A.L. and Pujolle G. A survey of survivability in mobile ad hoc net-works, IEEECommun. Surveys Tuts, 2009, Vol. 11, No. 1, pp. 66-77.
16. Karan Singh, YadavR. S., Ranvijay. A review paper on adhoc network security, International Journal of Computer Science and Security, 2007, Vol. 1, № 1, pp.52-69.
17. Mitrokotsa А., Dimitrakakis С. Intrusion detection in MANET using classification algorithms: The effects of cost and model selection. AdHocNetworks, Ref. Libr., 2013, Vol. 11, No. 1, pp. 226-237.
18. Abramov E.S., Basan E.S. Razrabotka modeli zashchishchennoy klasternoy besprovodnoy sensornoy seti [Development of a secure cluster-based wireless sensor network model], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2013, No. 12 (149), pp. 48-56.
19. Abramov Е., Basan Е., Makarevich О. Development of a secure Cluster-based wireless sensor network model, SIN'13. Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 372-375.
20. Felix Gomez Marmol and Gregorio Martnez Perez. TRMSim-WSN. Trust and Reputation Models Simulator for Wireless Sensor Networks, In Proceedings of the IEEE International Conference on Communications, Communication and Information Systems Security Symposium, Dresden, Germany, 2009, pp. 1-5.

Comments are closed.