Abstract
Wireless sensor networks have been widely applied in many areas due to their unique characteristics. These have exposed them to different types of active and passive attacks. In the literature, several solutions have been proposed to mitigate these attacks. Most of the proposed solutions are too complex to be implemented in wireless sensor networks considering the resource-constraint of sensor nodes. In this work, we proposed a hierarchical trust mechanism based on clustering approach to detect and prevent denial of service attacks in wireless sensor networks. The approach was validated through simulation using Network Simulator (NS2). The following metrics were used to evaluation the proposed scheme: packet delivery ratio, network lifetime, routing delay, overhead, and number of nodes. The proposed approach is capable of detecting compromised sensor nodes vulnerable to a denial of service attacks. Moreover, it is able to detect all sensed data that have been compromised during transmission to the base station. The results show that our method can effectively detect and defend against denial of service attacks in sensor wireless sensor networks.
Highlights
The self-organized Wireless Sensor Network (WSN) is used predominantly in tracking and monitoring applications, and it is made of battery-powered sensor nodes that communicate through a wireless medium [1]
The contributions of this research are presented as follows: 1) The proposed contribution is built on an Intrusion Detection Systems (IDS) model and is called IDS using Hierarchical Trust Measurement (IDSHT), where the trust measurement is done based on multidimensional factors such as Interactive Trust (IT), Honesty Trust (HT), and Content Trust (CT)
IDHST includes both direct evaluations for trust calculation in a fixed hop range
Summary
The self-organized Wireless Sensor Network (WSN) is used predominantly in tracking and monitoring applications, and it is made of battery-powered sensor nodes that communicate through a wireless medium [1]. The clustering algorithm divides the nodes and performs routing activities based on the role of the cluster leader and members. It significantly reduces the energy consumption of each node. The routing protocols select a suitable path that does not impact the performance metrics of WSN and provides energy efficiency. The function of sensor nodes is to sense, process, and transfer the data to the desired location while maintaining their reliability and confidentiality [3]. Both these parameters are affected due to the security threats in the networks. Several security mechanisms help in avoiding the attacks that target the routing functionality of sensor nodes
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.