Next Article in Journal
Performance of BDS-3: Measurement Quality Analysis, Precise Orbit and Clock Determination
Next Article in Special Issue
A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference
Previous Article in Journal
Location-Enhanced Activity Recognition in Indoor Environments Using Off the Shelf Smart Watch Technology and BLE Beacons
Previous Article in Special Issue
Power Allocation Based on Data Classification in Wireless Sensor Networks
Article Menu
Issue 6 (June) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(6), 1227; doi:10.3390/s17061227

A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

1
School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China
2
Department of Electrical and Computer Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada
*
Author to whom correspondence should be addressed.
Academic Editors: Jaime Lloret Mauri and Guangjie Han
Received: 29 March 2017 / Revised: 12 May 2017 / Accepted: 24 May 2017 / Published: 27 May 2017
(This article belongs to the Special Issue Smart Communication Protocols and Algorithms for Sensor Networks)
View Full-Text   |   Download PDF [5528 KB, uploaded 27 May 2017]   |  

Abstract

This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. View Full-Text
Keywords: protocol layer; intrusion detection; wireless sensor networks protocol layer; intrusion detection; wireless sensor networks
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Wang, J.; Jiang, S.; Fapojuwo, A.O. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks. Sensors 2017, 17, 1227.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top