Open Access Library Journal

Volume 1, Issue 7 (October 2014)

ISSN Print: 2333-9705   ISSN Online: 2333-9721

Google-based Impact Factor: 0.73  Citations  

Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)

Download Download as PDF (Size: 878KB)  PP. 1-10  
DOI: 10.4236/oalib.1100848    1,435 Downloads   2,603 Views  Citations

ABSTRACT

Security mechanism is a fundamental requirement of wireless networks in general and Wireless Sensor Networks (WSN) in particular. The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. There are several architectures for embedding IDS in WSN. Due to Energy Limitation, in this paper we use a distributed architecture which activates intrusion detection system for limited number of nodes. For this purpose we select a secure set of nodes called secure Connected Dominating Set (CDS). In this paper first, we propose a heuristic for selecting CDS based on weighing factor which uses the trust value. Trust is based on reputation and reputation refers to the opinion of one node about another node. Hence only well behaving and good quality nodes are selected as a dominant node for CDS construction. Then we activate IDS on these selected node set. In our proposed work the task of all dominating nodes is to discover any attack and threat that can affect the normal behavior of sensor nodes by analyzing actual status of a node, packet sent and received by node and measurement made to the environment. The simulation results show that our TC-IDS model have high packet delivery ratio, high throughput and low delay than existing IDS Schemes such as Lightweight IDS.

Share and Cite:

Mohajer, A. , Hajimobini, M. , Mirzaei, A. and Noori, E. (2014) Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS). Open Access Library Journal, 1, 1-10. doi: 10.4236/oalib.1100848.

Cited by

[1] A novel approach to QoS-aware resource allocation in NOMA cellular HetNets using multi-layer optimization
Cluster Computing, 2022
[2] Feature Selection-based Intrusion Detection System Using Genetic Whale Optimization Algorithm and Sample-based Classification
arXiv preprint arXiv …, 2022
[3] An Optimized Multi-Layer Resource Management in Mobile Edge Computing Networks: A Joint Computation Offloading and Caching Solution
arXiv preprint arXiv …, 2022
[4] Edge-computing Enabled Next Generation Wireless Networks: A Novel Approach to Provide Secure Multicast Services
arXiv preprint arXiv:2202.03134, 2022
[5] Hierarchical capacity management and load balancing for HetNets using multi-layer optimisation methods
International Journal of Ad Hoc and …, 2022
[6] A Novel Approach to Adaptive Resource Allocation for Energy Saving in Reconfigurable Heterogeneous Networks
The Computer Journal, 2021
[7] Towards Optimal Configuration in MEC Neural Networks: Deep Learning-Based Optimal Resource Allocation
2021
[8] Intrusion Detection System in Wireless Sensor Networks: A Survey
2017
[9] An Optimized Multi-Layer Resource Management in Mobile Edge Computing
[10] Energy Efficient Edge-Computing and Virtual Connection Management in
[11] Energy Efficient Computation Offloading and Virtual Connection Control in
[12] Heart disease prediction by using the feature selection based on multi-objective meta-heuristic method and ensemble classification

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.