Abstract
Wireless sensor network (WSN) is vulnerable to a wide range of attacks due to its natural environment and inherent unreliable transmission. To protect its security, intrusion detection systems (IDSs) have been widely deployed in such a wireless environment. In addition, trust-based mechanism is a promising method in detecting insider attacks (e.g., malicious nodes) in a WSN. In this paper, we thus attempt to develop a trust-based intrusion detection mechanism by means of Bayesian model and evaluate it in the aspect of detecting malicious nodes in a WSN. This Bayesian model enables a hierarchical wireless sensor network to establish a map of trust values among different sensor nodes. The hierarchical structure can reduce network traffic caused by node-to-node communications. To evaluate the performance of the trust-based mechanism, we analyze the impact of a fixed and a dynamic trust threshold on identifying malicious nodes respectively and further conduct an evaluation in a wireless sensor environment. The experimental results indicate that the Bayesian model is encouraging in detecting malicious sensor nodes, and that the trust threshold in a wireless sensor network is more dynamic than that in a wired network. Copyright © 2013 Springer-Verlag Berlin Heidelberg.
Original language | English |
---|---|
Title of host publication | Network and system security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings |
Editors | Javier LOPEZ, Xinyi HUANG, Ravi SANDHU |
Place of Publication | Berlin |
Publisher | Springer |
Pages | 40-53 |
ISBN (Electronic) | 9783642386312 |
ISBN (Print) | 9783642386305 |
DOIs | |
Publication status | Published - 2013 |
Citation
Meng, Y., Li, W., & Kwok, L.-F. (2013). Evaluation of detecting malicious nodes using Bayesian model in wireless intrusion detection. In J. Lopez, X. Huang, & R. Sandhu (Eds.), Network and system security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings (pp. 40-53). Springer. https://doi.org/10.1007/978-3-642-38631-2_4Keywords
- Intrusion detection
- Network security
- Wireless sensor network
- Trust computation
- Bayesian model