Next Article in Journal
Performance of BDS-3: Measurement Quality Analysis, Precise Orbit and Clock Determination
Next Article in Special Issue
A Reliable Data Transmission Model for IEEE 802.15.4e Enabled Wireless Sensor Network under WiFi Interference
Previous Article in Journal
Location-Enhanced Activity Recognition in Indoor Environments Using Off the Shelf Smart Watch Technology and BLE Beacons
Previous Article in Special Issue
Power Allocation Based on Data Classification in Wireless Sensor Networks
Open AccessArticle

A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China
Department of Electrical and Computer Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada
Author to whom correspondence should be addressed.
Academic Editors: Jaime Lloret Mauri and Guangjie Han
Sensors 2017, 17(6), 1227;
Received: 29 March 2017 / Revised: 12 May 2017 / Accepted: 24 May 2017 / Published: 27 May 2017
(This article belongs to the Special Issue Smart Communication Protocols and Algorithms for Sensor Networks)
This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks. View Full-Text
Keywords: protocol layer; intrusion detection; wireless sensor networks protocol layer; intrusion detection; wireless sensor networks
Show Figures

Figure 1

MDPI and ACS Style

Wang, J.; Jiang, S.; Fapojuwo, A.O. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks. Sensors 2017, 17, 1227.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop