Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection

Yuxin MENG, Wenjuan LI, Lam-For KWOK

Research output: Chapter in Book/Report/Conference proceedingChapters

27 Citations (Scopus)

Abstract

Wireless sensor network (WSN) is vulnerable to a wide range of attacks due to its natural environment and inherent unreliable transmission. To protect its security, intrusion detection systems (IDSs) have been widely deployed in such a wireless environment. In addition, trust-based mechanism is a promising method in detecting insider attacks (e.g., malicious nodes) in a WSN. In this paper, we thus attempt to develop a trust-based intrusion detection mechanism by means of Bayesian model and evaluate it in the aspect of detecting malicious nodes in a WSN. This Bayesian model enables a hierarchical wireless sensor network to establish a map of trust values among different sensor nodes. The hierarchical structure can reduce network traffic caused by node-to-node communications. To evaluate the performance of the trust-based mechanism, we analyze the impact of a fixed and a dynamic trust threshold on identifying malicious nodes respectively and further conduct an evaluation in a wireless sensor environment. The experimental results indicate that the Bayesian model is encouraging in detecting malicious sensor nodes, and that the trust threshold in a wireless sensor network is more dynamic than that in a wired network. Copyright © 2013 Springer-Verlag Berlin Heidelberg.

Original languageEnglish
Title of host publicationNetwork and system security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings
EditorsJavier LOPEZ, Xinyi HUANG, Ravi SANDHU
Place of PublicationBerlin
PublisherSpringer
Pages40-53
ISBN (Electronic)9783642386312
ISBN (Print)9783642386305
DOIs
Publication statusPublished - 2013

Citation

Meng, Y., Li, W., & Kwok, L.-F. (2013). Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection. In J. Lopez, X. Huang, & R. Sandhu (Eds.), Network and system security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings (pp. 40-53). Springer. https://doi.org/10.1007/978-3-642-38631-2_4

Keywords

  • Intrusion detection
  • Network security
  • Wireless sensor network
  • Trust computation
  • Bayesian model

Fingerprint

Dive into the research topics of 'Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection'. Together they form a unique fingerprint.