Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks

Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practic...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Security and Its Applications Vol. 10; no. 8; pp. 159 - 172
Main Authors Sun, Zeyu, Li, Longxing, Li, Xuelun
Format Journal Article
LanguageEnglish
Published 31.08.2016
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practical value to design an intrusion detection approach adapting to wireless sensor networks characteristics. At the basis of the reputation computing model we designed, and after analyzing features of the sensor networks intrusion detection mechanism, we proposed an intrusion detection model based on trusty nodes inside clusters make use of the reputation computing model to calculate the coordinate nodes synthetic reputation values to check whether some invasion has taken place. If some nodes are being intruded, the messages will be reported to cluster head. When the numbers of the reporting nodes are more than the specified the head will report the information to sink nodes and start intrusion response at the same time. The experimental results show that the designed models can identify vicious nodes and low competitive nodes, helping to promote the security and reliability of the network, and embodying the equity of the network.
AbstractList Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other security mechanisms, intrusion detection technology has become an important domain of WSNs security research. So it has very academic and practical value to design an intrusion detection approach adapting to wireless sensor networks characteristics. At the basis of the reputation computing model we designed, and after analyzing features of the sensor networks intrusion detection mechanism, we proposed an intrusion detection model based on trusty nodes inside clusters make use of the reputation computing model to calculate the coordinate nodes synthetic reputation values to check whether some invasion has taken place. If some nodes are being intruded, the messages will be reported to cluster head. When the numbers of the reporting nodes are more than the specified the head will report the information to sink nodes and start intrusion response at the same time. The experimental results show that the designed models can identify vicious nodes and low competitive nodes, helping to promote the security and reliability of the network, and embodying the equity of the network.
Author Li, Longxing
Li, Xuelun
Sun, Zeyu
Author_xml – sequence: 1
  givenname: Zeyu
  surname: Sun
  fullname: Sun, Zeyu
– sequence: 2
  givenname: Longxing
  surname: Li
  fullname: Li, Longxing
– sequence: 3
  givenname: Xuelun
  surname: Li
  fullname: Li, Xuelun
BookMark eNpNkN9KwzAYR4MoOOeeQJC8QGfSNm1yqfPfYGygEy9Lmn510TYZSUTm05tuIl7lx-E7uThn6NhYAwhdUDKlecrKK_3utZymhBbTyHikR2hEy4wnQpTF8b99iibe65qQvBCClOkI9U_gQTq1wdbguQnu0-u4biGACsNag9oY29m3Hb6RHprhbmkb8Hi1DbrX3zIchG1ndz2YgLXBr9pBB97jZzDeOryE8GXdhz9HJ63sPEx-3zF6ub9bzx6TxephPrteJCotypCImhJW10yoksk6K0DVigoQDUkVl7QRJeORURCEt0wUsgGleNOoluZMMZWNUXb4VznrvYO22jrdS7erKKn20ap9tGqINjAeabQuD1YMErTq4M9Kec4Llv0A_ExxDQ
ContentType Journal Article
DBID M1Z
AAYXX
CITATION
DOI 10.14257/ijsia.2016.10.8.14
DatabaseName e-articles
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
EISSN 1738-9976
EndPage 172
ExternalDocumentID 10_14257_ijsia_2016_10_8_14
284865
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
KQ8
M1Z
.DC
AAYXX
CITATION
ID FETCH-LOGICAL-c267t-9b105bb59c75ab36ecbc19e9d02c8a1d9758ecb1e908f596adecc8ddcf145c5c3
ISSN 1738-9976
IngestDate Tue Jul 01 04:14:11 EDT 2025
Thu Oct 21 14:34:47 EDT 2021
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 8
Keywords trust management
behavior trust
reputation model
wireless sensor networks (WSNs)
intrusion detection technology
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c267t-9b105bb59c75ab36ecbc19e9d02c8a1d9758ecb1e908f596adecc8ddcf145c5c3
OpenAccessLink https://doi.org/10.14257/ijsia.2016.10.8.14
PageCount 14
ParticipantIDs crossref_primary_10_14257_ijsia_2016_10_8_14
earticle_primary_284865
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2016-08-31
PublicationDateYYYYMMDD 2016-08-31
PublicationDate_xml – month: 08
  year: 2016
  text: 2016-08-31
  day: 31
PublicationDecade 2010
PublicationTitle International Journal of Security and Its Applications
PublicationYear 2016
SSID ssib004699072
Score 2.0115492
Snippet Security issues of wireless sensor networks (WSNs) have become increasingly prominent. As a reasonable complement for encryption, authentication and other...
SourceID crossref
earticle
SourceType Index Database
Publisher
StartPage 159
TableOfContents Abstract 1. Introduction 2. Analysis of Security Technology 3. Key Management and Security Policy of WSNs 2.1. Shared Key Management 2.2. Key Distribution Scheme 2.3. Performance Analysis 2.4. Intrusion Detection of WSNS 3. Key Implementation Process 4. System Assessments 5. Conclusion Acknowledgments References
Title Research on Intrusion Detection Technology Based on Nodes Optimization Deployment in Wireless Sensor Networks
URI http://www.earticle.net/Article.aspx?sn=284865
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF5F7YULApVHeWkP3IqD186ud49AiwqIItRWirhY-zJK1dpIcaSWP8NfZWbXdkxTIcrFiiabUbLzaV6ZByEvpUlnldVVwqvCQoAiWaK1lknBlM5zl6ZOYXPy5yNxeDr7OOfzyeTXqGpp1Zqp_XljX8n_SBVoIFfskr2FZAemQIDXIF94goTh-U8y7svmMOP_ocb2CRTmvm99XAC-zpvvvQVr5fDcUeP8cu8LaIqLrgUTPoBbf0NVwKIO9bDnqP-OIcJtQkswFm8tx27sZh6xc2qPu3V4scy4XUYvd5wWDH9ABVX3zV-thnqg2KTd1N8ve1s6UOcrf76qx-kJJvp866BRC9SoqujmXd9A69VwOoKbHOlU1o0Mj-aZxU0_G5ofdQ_Ia3G2XOA4KSamQJXT2KH655zta_ZvqErEeAjZlIFJiUxKoMkSF6VvZxCH4IqMT19HxlyAMQ8Lwoaf1E22Qj6vN7_MNe-nQ87Iozm5R-52UqNv4rv3ycTXO-SixxRtajpgig6YomtM0YApPBcwRceYomtM0UVNe0zRiCnaY-oBOX1_cPLuMOlWciQ2E0WbKAP-uDFc2YJrkwtvjWXKK5dmVmrmFISfQGNepbLiSmgHKkI6Zys245bb_CHZqpvaPyY0N9KwTOtccTMrtDGVEYUrwNxyngFxl7zqr6r8ESevlH-R0C551F_ncBxcLyn4k9sxekrurHH8jGzBRfvn4Hi25kUQ_m9FvImC
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+on+Intrusion+Detection+Technology+Based+on+Nodes+Optimization+Deployment+in+Wireless+Sensor+Networks&rft.jtitle=International+Journal+of+Security+and+Its+Applications&rft.au=Sun%2C+Zeyu&rft.au=Li%2C+Longxing&rft.au=Li%2C+Xuelun&rft.date=2016-08-31&rft.issn=1738-9976&rft.eissn=1738-9976&rft.volume=10&rft.issue=8&rft.spage=159&rft.epage=172&rft_id=info:doi/10.14257%2Fijsia.2016.10.8.14&rft.externalDBID=n%2Fa&rft.externalDocID=10_14257_ijsia_2016_10_8_14
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-9976&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-9976&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-9976&client=summon