Intrusion Detection System (IDS) with trusted nodes for improving security in Wireless Sensor Network

2018 ◽  
Vol 6 (10) ◽  
pp. 428-435
Author(s):  
S. Jawahar ◽  
J. Adamkani

In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks using DRI and Cross Check method. The HTBIDS is effective method to identify the abnormal nodes in wireless sensor network. The abnormal nodes are attacked by periodic jamming attack. We have considered the periodic jamming attack at physical layer for performance evaluation. Results show that HTBIDS performs better using detection accuracy (DA) and false alarm rate (FAR).


2019 ◽  
Vol 8 (4) ◽  
pp. 11730-11737

Wireless sensor network (WSN) is a noteworthy division in present day correspondence frameworks and faith detecting steering convention is utilized to improve security in WSN. Already, Trust Sensing based Secure Routing Mechanism (TSSRM) was projected which will diminish the overhead steering and improve the unwavering quality of information transmission over the system. In any case, the security tool of this technique might be invalid, if the system steering convention is modified. Hence, in this work, a Parameter and Distributed Trust Based Intrusion Detection System (PDTB-IDS) with a safe correspondence structure with a trust the board framework for remote sensor systems are proposed. The significant commitment is to distinguish different parameters and trust factors that impact trust in WSN is conveyed among different factors, for example, vitality, unwavering quality, information, and so on. Subsequently coordinate believe, proposal believe and circuit trust from those components are determined and the general trust estimation of the sensor hub is evaluated by joining the individual trust esteems. The trust model can decide whether or not the specific hub is pernicious or not by looking at trust got from the proposed method. The numerical assessment of the research work is completed with the help of NS2 simulation environment from which it is proved that the projected strategy provides enhanced outcome than the present TSSRM method.


Sign in / Sign up

Export Citation Format

Share Document