weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks

P.Swaruba,K.Kumaresan

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:2         Year: 08 March,2014         Pages:35-42

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

Heterogeneous wireless sensing element network (heterogeneous WSN) consists of sensing element nodes with totally different ability, like totally different computing power and sensing vary. Compared with homogenised WSN, readying and topology management square measure additional advanced in heterogeneous WSN. the present work bestowed redundancy management of heterogeneous wireless sensing element network s (HWSNs), utilizing multipath routing to answer user queries in presence of unreliable and malicious nodes. Redundancy management exploits trade-off between energy consumption against gain in responsibleness and timeliness and security to maximise system helpful period of time. It’s optimality is arrived to dynamically confirm the most effective redundancy level to use to multipath routing for intrusion tolerance.The question response success chance is maximized and also the life time is prolonged. Voting-based distributed intrusion discoverion formula was applied to detect and evict malicious nodes in HWSN. The chance model was analyzed with the most effective redundancy level in terms of path redundancy and supply redundancy. The projected work bestowed Weighted vote primarily based Trust Management theme to boost the performance of intrusion tolerance in HWSN. The Trust model permits every sensing element node to guage trustiness of neighbor in HWSN region of section. Weighted vote is introduced to all or any the neighbor nodes supported name count worth of corresponding sensing element node. Simulations were conducted on totally different sensing element nodes to live the performance in terms of. The projected work showed an improvement of in comparison to the present.

Kewords

Intrusion Detection Network, Wireless sensing element Network, Multipath Routing, Trust Management

Reference

[1] Carol J Fung Jie Zhang Issam Aib Raouf Boutaba “Robust and ascendible Trust Management for cooperative Intrusion Detection”. [2] Carol J Fung Jie Zhang Raouf Boutaba “Effective Acquaintance Management for Collaborative Intrusion Detection Networks”. [3] Ramaprabhu Janakiraman, Marcel Waldvogel, Qi Zhang, “A peer-to-peer approach to network intrusion detection and prevention”. [4] Todd Sproull and John Lockwood,” Distributed Intrusion hindrance in Active and extensile Networks”. [5] Yan Lindsay Sun, Zhu Han, Wei dynasty Yu and K. J. Ray Liu “A Trust analysis Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks”. [6] Chenfeng Vincent Zhou, Shanika Karunasekera and Saint Christopher LE,” A Peer-toPeer cooperative Intrusion Detection System”. [7] Ioannis Krontiris, Tassos Dimitriou and Felix C. Freiling, “Towards Intrusion Detection in Wireless sensing element Networks”. [8] Ana Paula R. district attorney timber Marcelo H.T. Martins Bruno P.S. Rocha, ” localized Intrusion Detection in Wireless sensing element Networks”. [9] Bo sun and Lawrence dramatist, Yang Xiao, Sghaier Guizani, “Intrusion detection techniques in mobile impromptu and wireless sensing element networks”. [10] W. Lou and Y. Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006. [11] O. Younis and S. Fahmy, “HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. MobileComput., vol. 3, no. 4, pp. 366–379, 2004. [12] M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh, “Exploiting heterogeneity in sensor networks,” in Proc. 2005 IEEE Conf. Computer Commun., vol. 2, pp. 878–890 [13] S. Bo, L. Osborne, X. Yang, and S. Guizani, “Intrusion detection techniques in mobile ad hoc and wireless sensor networks,” IEEE Wireless Commun. Mag., vol. 14, no. 5, pp. 560–563, 2007. [14] I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 2007 European Wireless Conf. [15] J. H. Cho, I. R. Chen, and P. G. Feng, “Effect of intrusion detection on reliability of missionoriented mobile group systems in mobile ad hoc networks,” IEEE Trans. Reliab., vol. 59, no. 1, pp. 231–241, 2010. 0 1 2 3 4 5 6 7 10 20 30 40 50 No of Infecte d Nodes No of Nodes ITMR WVTM [16] A. P. R. da Silva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. 2005 ACM Workshop Quality Service Security Wireless Mobile Netw [17] Y. Yang, C. Zhong, Y. Sun, and J. Yang, “Network coding based reliable disjoint and braided multipath routing for sensor networks,” J. Netw. Comput. Appl., vol. 33, no. 4, pp. 422–432, 2010 [18] K. D. Kang, K. Liu, and N. Abu-Ghazaleh, “Securing geographic routing in wireless sensor networks,” in Proc. 2006 Cyber Security Conf. Inf. Assurance. [19] W. Lou and Y. Kwon, “H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320–1330, 2006. [20] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proc. 2003 IEEE Int. Workshop Sensor Netw. Protocols Appl., pp. 113–127. [21] Jin-Hee Cho, Ing-Ray Chen: Performance analysis of gradable cluster key management integrated withadaptive intrusion detection in mobile impromptu networks. Perform. Eval. 68(1): 58-75 (2011) [22] Ing-Ray Chen, Anh Phan Albert Speer, Mohamed Eltoweissy: adaptive Fault-Tolerant QoS managementAlgorithmsfor increasing System tim e period of Query-Based Wireless detector Networks. IEEE Trans. Dependable Sec. Comput. 8(2): 161-176 (2011) [23] Fenye Bao, Ing-Ray Chen, Moonjeong Chang Jiang, Jin-Hee Cho: Trust-Based Intrusion Detection in Wirelessdetector Networks. Interstate Commerce Commission 2011: 1-6 [24] Yinan Li, Ing-Ray Chen: gradable AgentBased Secure Multicast for Wireless Mesh Networks. Interstate Commerce Commission 2011: 1-6 [25] Ing-Ray Chen, Anh Ngoc Albert Speer, MohamedEltoweissy:Dynamic adaptive redundancy for quality-of-service management in wireless detector networks. IPDPS 2009: 1-8 [26] Anh Phan Albert Speer, Ing-Ray Chen: result of redundancy on the mean solar time to failure of wirelessdetector networks. Concurrency and Computation: follow and knowledge 19(8): 1119-1128 (2007) [27] Anh Phan Albert Speer, Ing-Ray Chen: result of Redundancy on mean solar time to Failure of Wirelessdetector Networks. AINA (2) 2006: 373-382 [28] Anh Phan Albert Speer, Ing-Ray Chen: On best Path and supply Redundancy for Achieving QoS andincreasing time period of Query-Based Wireless detector Networks. MASCOTS 2006: 51-60 [29] Hamid Al-Hamadi, Ing-Ray Chen: Energy vs. QoS trade-off Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous W