Enhanced Intelligent Model for NCD in Wireless Sensor Networks
DOI:
https://doi.org/10.14738/tnc.65.5396Keywords:
Mobile Networks, TrustAbstract
The serious security threat for Wireless Sensor Network comes from compromised nodes. Node Compromise (NC) effects of
two types: independent and dependent. In independent type, the NC effect is limited to that node only; whereas in dependent,
it will spread to all the nodes across the network. In literature, there is an intelligent model which predicts the spread of node
compromise. This model suffers from false positives as it trusts the communication from neighbouring nodes. To address this
issue, our Parameter Grouping (PG) † mechanism is used in association with the existing Intelligent Model (IM). This Extended
Intelligent Model (E-IM) performs better than the IM. The E-IM has studied through NS-2 based simulation and its performance
is analyzed.
References
(1) Kalpana Sharma and M K Ghose, ”Wireless Sensor Networks: An Overview on its Security Threats”, IJCA Special Issue on Mobile Ad-hoc Networks (MANETs), Volume 1, Issue 8, pp.42-45, 2010.
(2) Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, ”Node Compromise Modeling and its Applications in Sensor Networks,” in the proceedings of IEEE ISCC 2007, IEEE Symposium on Computers and Communications, Aveiro, Portugal, July 2007.
(3) Manyam Thaile, and O.B.V Ramanaiah, ”Node Compromise Detection Based on Parameter Grouping in Wireless Sensor Networks,” SECURWARE 2016:The Tenth International Conference on Emerging Security Information, Systems and Technologies, July. 24 – 28, 2016, pp. 14-20, ISBN: 978-1- 61208-493-0, Nice, France.
(4) F. Li and J. Wu, “Mobility Reduces Uncertainty in MANET,” May 2007, Proc. IEEE International Conference on Computer Communications, pp. 1946-1954.
(5) D. Estrin, R. Govindan, J. Heidemann, S. Kumar, ”Next century challenges: scalable coordination in sensor networks,” ACM MobiCom’99, Washingtion, USA, 1999, pp. 263-270.
(6) I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ”A survey on sensor networks,” WEEE communications Magazine, Volume: 40 Issue: 8, pp. 102-114, August 2002.
(7) S. Ganeriwal and M. Srivastava, ”Reputation-Based Framework for High Integrity Sensor Networks,” Oct. 2004, Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), pp. 66-77.
(8) Y. Sun, Z. Han, W. Yu, and K. Liu, ”A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense against Attacks,” Apr. 2006, Proc. IEEE INFOCOM, pp. 1-13.
(9) A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla, ”SWATT:SoftWare-Based Attestation for Embedded Devices,” Proc. IEEE Symp. Security and Privacy, May 2004.
(10) T. Abuhmed, N. Nyamaa, and D. Nyang, ”Software-Based Remote Code Attestation in Wireless Sensor Network,” Proc. of IEEE GLOBECOM, December. 2009.
(11) T. Park and K. G. Shin, ”Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks,” IEEE Trans.Mobile Computing, May/June 2005, vol. 4, no. 3, pp. 297-309.
(12) Y. Yang, X. Wang, S. Zhu, and G. Cao, ”Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks,” Proc.IEEE 26th Int’l Symp. Reliable Distributed Systems (SRDS), Oct. 2007.
(13) Jun-Won Ho, Matthew Wright, and Sajal K. Das, ”ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Transactions on Dependable and Secure Computing, July/August 2012, vol. 9, no. 4, pp. 494-511.
(14) S. Capkun and J.P. Hubaux, ”Secure Positioning in Wireless Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 221-232, Feb. 2006. [15] Z. Li, W. Trappe, Y. Zhang, and B. Nath, ”Robust Statistical Methods for Securing Wireless Localization in Sensor Networks,” Proc. Fourth Int’l Symp. Information Processing in Sensor Networks (IPSN), Apr. 2005.