2017
DOI: 10.3390/s17061227
|View full text |Cite
|
Sign up to set email alerts
|

A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

Abstract: This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(35 citation statements)
references
References 38 publications
0
35
0
Order By: Relevance
“…WSN is widely used in many applications such as industrial monitoring, environmental monitoring, forest monitoring, health care, and military. e architecture of WSN is categorized into clustered and flat [1]. In the flat architecture, the sensor nodes (SNs) communicate with the base station (BS) directly or by relaying the data through other nodes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…WSN is widely used in many applications such as industrial monitoring, environmental monitoring, forest monitoring, health care, and military. e architecture of WSN is categorized into clustered and flat [1]. In the flat architecture, the sensor nodes (SNs) communicate with the base station (BS) directly or by relaying the data through other nodes.…”
Section: Introductionmentioning
confidence: 99%
“…ese signals jam the network, and a genuine node denies to give services because it is busy in receiving the signals. e codes in the SN can also be modified, and the node can be tampered or replaced with an untrusted node [1,7]. At the MAC layer [10,11], the attacker disrupts the network availability by obtaining unfair channel priority, collisions, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, unlike traditional wireless networks, WSNs have very limited computation, communication, power, and memory resources. Therefore, lightweight, energy‐efficient security schemes with minimum bandwidth overhead are required to protect WSNs from malicious attacks …”
Section: Introductionmentioning
confidence: 99%
“…The popularity of TRMs in ensuring security in WSN is due to the heavy computations associated with cryptography‐based protocols that cannot be supported by the resource constrained network . Numerous schemes have been proposed with the aim of aiding sensor nodes to better establish excellent trust and reputation among themselves . Most of the solutions for several complicated problems such as security have been attempted using engineering approaches.…”
Section: Introductionmentioning
confidence: 99%