TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY



Similar documents
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Dynamic Trust Management for the Internet of Things Applications

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

A Security Architecture for. Wireless Sensor Networks Environmental

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTRUDER USING GREYLISTING METHOD

Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network

Wireless Sensor Networks Chapter 14: Security in WSNs

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Access Control And Intrusion Detection For Security In Wireless Sensor Network

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

CHAPTER 1 INTRODUCTION

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Wireless Sensor Network: Challenges, Issues and Research

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Some Security Trends over Wireless Sensor Networks

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks


Survey on different attacks in Wireless Sensor Networks and their prevention system

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Prediction of DDoS Attack Scheme

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Security Sensor Network. Biswajit panja

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

Enhanced Dual Level Fuzzy based Cluster Head Selection for Energy Efficient Wireless Sensor Networks

An Optimization Model of Load Balancing in P2P SIP Architecture

Cooperative OCEAN Based Technique for Isolating Attack in Wireless Sensor Network

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

Security & Trust in Wireless Sensor Networks

Security in Ad Hoc Network

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Security for Ad Hoc Networks. Hang Zhao

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

SECURE ROUTING PATH USING TRUST VALUES FOR WIRELESS SENSOR NETWORKS

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

A STUDY ON SECURE DATA TRANSMISSION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

DAG based In-Network Aggregation for Sensor Network Monitoring

THIS: THreshold security for Information aggregation in Sensor networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

TOPOLOGIES NETWORK SECURITY SERVICES

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

About the Authors Preface Acknowledgements List of Acronyms

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

A Lightweight Secure SIP Model for End-to-End Communication

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Internet Sustainability and Network Marketing Safety

Analysis of Typical Secure Routing Protocols in WSN

Securing MANET Using Diffie Hellman Digital Signature Scheme

Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network

DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Figure 1. The Example of ZigBee AODV Algorithm

EFS: Enhanced FACES Protocol for Secure Routing In MANET

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

An Investigation of DOS Flooding Attack in VANET.

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

Intrusion Detection for Mobile Ad Hoc Networks

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad hoc Network (CAMA)

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

Demystifying Wireless for Real-World Measurement Applications

Providing End-to-end Secure Communications in Wireless Sensor Networks

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Wireless Sensor Network Performance Monitoring

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

OPTIMIZED SENSOR NODES BY FAULT NODE RECOVERY ALGORITHM

Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks

Node Degree based Clustering for WSN

Metrics for Detection of DDoS Attacks

Transcription:

TRUST MANAGEMENT SCHEMES FOR INTRUSION DETECTION SYSTEMS -A SURVEY 1 DEEPA S, 2 SUPRIYA M 1,2 Department of Computer Science and Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Bangalore, Karnataka, India Email: 1 deepasivasankar@gmail.com, 2 m_supriya@blr.amrita.edu Abstract - Wireless Sensor Networks (WSNs) are energy constraints and vulnerable to many attacks. Traditional security and services are fragile and unreliable in wireless sensor environment. Trust Management models have been recently suggested as a compete security mechanism for cluster based WSNs. In this paper, we present a detailed survey on various trust models for intrusion detection systems to deal effectively with selfish and malicious nodes. Based on the analysis and comparison, we list several trust level calculation algorithms that are essential for developing a robust trust model for WSNs. Keywords Cluster based WSNs, IDS, Trust Computation I. INTRODUCTION Wireless Sensor Networks (WSN) consists of individual nodes that are able to interact with their environment by sensing or controlling physical parameters. These nodes have to collaborate with each other to complete their tasks. A single node is incapable of doing so, and they use wireless communication to enable this collaboration. WSNs are powerful in that, they are amenable to support a lot of very different real world applications. The use of WSNs have grown enormously in the last decade, pointing out the crucial need for scalable and energy efficient routing data gathering and aggregation routing protocol in the corresponding large environment. The flexibility provided by the open broadcast medium and the cooperativeness of nodes introduces new security dangers. As part of rational risk management it is necessary to identify these risks and take appropriate actions. Security and Trust are key requirements in such environments. But it is very difficult to resolve critical WSN security issues. The assumption of having all the nodes cooperative with each other is invalid. Conventional data encryption and authentication mechanisms can only provide a certain degree of security, due to the unique characteristics and new misbehaviours encountered in WSNs. To ensure secure key exchange and to establish secure wireless communication between nodes, it is vital to establish trust, between communicating nodes. In WSN reliability, trust is employed as a measure of node competence in providing the required services. In order to raise the network security, nodes in WSNs are arranged hierarchically, thus we can save energy and improve security in a network. Sensor nodes can be deployed in the form of a group, thus it is called as a cluster, within the group each node collaborates with each other in order to process, aggregate and forward the collected data. Each cluster has a cluster head, which is selected by the cluster members. These clustering schemes and group deployment enable SNs to full fill their responsibilities in a cooperative manner rather than, individually. Therefore, establishing and managing trust in a cooperative manner in a clustering environment provides many advantages. Intrusion detection is the latest defence mechanism to cope with malicious nodes in WSNs, in which SNs can be compromised due to capture or virus infection. This paper is organized as follows: in section II and section III, we analyze and summarize different trust management schemes for intrusion detection and finally, conclude in the last section.. II. TRUST MANAGEMENT TECHNIQUES FOR IDS The deployment of WSN in a hostile environment and the use of wireless signals as the media for communication make it easy for intruders to get the signals. In a network, any kind of unauthorized activity is called intrusion. An intrusion detection system is a collection of the techniques and resources to help to identify, assess, and report intrusions. Different types of attacks exist against WSNs. So in designing an IDS, there are many challenges that make the development of an ideal intrusion scheme for WSN. The main challenges that are to be considered for the designing of IDS are resource constraints, dynamic topology change, continuous data streaming etc. Sensor trust is used to evaluate the trustworthiness of sensor nodes in hierarchical WSNs. The hierarchical structure has been widely accepted in designing WSNs, because it optimizes network performance. In the hierarchical structure of WSN, the cluster formation of the nodes lead to two levels of hierarchy in a sensor network, where cluster heads 39

forming the higher level and cluster member nodes forming the lower level. The sensor nodes periodically send data to the corresponding cluster head nodes. The cluster head nodes aggregate data and transmit to the base station either directly or through the intermediate communication with other cluster head nodes. Hierarchical routing is an efficient way to lowering energy consumption within a cluster and performing data aggregation thus it reduces the number of transmitting messages to the base station. During inter and intra cluster communication, trust management schemes help to select the trusted nodes to forward the data. The following sub sections discuss the various trust management schemes: 2.1 Group Based Trust Management Scheme (Gtms) Shaikh et.al proposes a light weight Group Based Trust Management Scheme (GTMS) for clustered WSN. GTMS contain a single trust value for each cluster. All Sensor nodes in a cluster calculate individual trust values for all group members to the cluster head. Cluster head aggregates and evaluates the trust values of each node and forwards the calculated value to the base station as well as detects the malicious node in a cluster. Depending on the trust values of all the clusters, the base station assigns the one out of the three possible states, namely trusted, untrusted and uncertain to the whole group. This scheme is very simple and flexible and does not require large memory of data and complex computations at sensor nodes. The scheme provides protection against malicious, selfish and faulty nodes. The main limitation of the GTMS scheme is that use of some unrealistic assumption for protecting the trust values of clusters from attacks. 2.2 Trust Aware in Network Aggregation Hongmei Deng presents an efficient trust aware in network aggregation approach for resilient wireless sensor networks. Trust evaluation mechanism is applied to detect the misbehaving node and identify trust worthiness of sensor nodes. The assumption of having always all nodes in a network cooperating with each other is invalid, when the node is hijacked and compromised. Traditional security mechanisms can only provide a certain level of protection to the network. Trust aggregation approach does not introduce extra communication overhead, which makes resources efficient to the energy constrained in the WSNs. This approach uses multi-parent tree topology. The partial aggregation results from a particular node will be received and processed by multiple parents. If there is any inconsistency in the result, it undergoes inconsistency checking model. Based on the result of inconsistency checking, trust of each individual node can be built up. The established trust information can be used to identify the malicious node in a network. Therefore, reliability of a sensor querying is improved. The limitation of this approach is that, it suffers from the security issues of partial aggregation result forging. Thus it does not provide a complete security solution to WSNs. 2.3 Trust, Reputation System Approach Bjorn Stelte presents a novel trust level calculation algorithm based on a Gaussian probability function paired with a Byzantine decision making. Multi criteria decision making approach is used for detecting forged aggregation result. Gaussian probability density function is used to calculate a reputation of the neighbouring node based on the observed data to guarantee data authenticity and integrity. Reputation is node s opinion of other nodes in the network. Trust is a derivation of the reputation of an entity. Total trust of a node is the combination of communication trust and data trust. The presented concept can be used to decide the trustworthiness of participating nodes in a network. 2.4 Trust Establishment Scheme For Cbsn Zhou proposes a trust and reputation management scheme to secure nodes in a cluster based network. In order to monitor the behaviour of every cluster node, a surveillance node is used which uses a watch dog mechanism for the evaluating trustworthiness of nodes. The node stores the trust values of the other cluster nodes and finally the cluster head computes the trust value of each node and decide on the node revocation and select the surveillance node newly. The main contribution of this paper is that it offers a cluster based trust rating model to detect the compromised sensor nodes. It develops a way to calculate the trust of a cluster. The watchdog mechanism is used to detect the presence of invalid data resulting from compromised and faulty nodes. The watchdog mechanism uses consensus-based outlier detection protocol, which has a common principle of looking for consistency among the data reading. The level of confidence assigned to a data reading is proportional to its deviation from this consensus. The memory of surveillance node is determined by the number of cluster nodes. The number of cluster nodes depends on the cluster size, the radio range of sensor nodes and the network density. This scheme is very simple and flexible and does not require complex computations. 2.5 Hierarchical Trust Management Feny Bao proposes a hierarchical trust management protocol for a large number of sensor network to deal with selfish and malicious nodes and intrusion tolerance. This protocol can dynamically learn from the past experience and adapt to change environmental conditions. This is achieved by addressing the critical 40

design issues of trust management, namely social and QoS trust components. A novel probability model called Stochastic Petrinet is used to characterize the assorted WSN to find the ground truth character. This paper considers cluster based wireless sensor network consisting of cluster head and a number of sensor nodes in the corresponding geographical area. A sensor node forwards its sensor reading to its cluster head through sensor nodes in the same cluster and then the cluster head, which then forwards the data to the base station through another cluster head. Trust management protocol conducts a periodic peer to peer trust evaluation between sensor nodes and cluster heads. The protocol considers trust metric of two qualities of service - energy and unselfishness and two social trust namely intimacy and honesty. energy and improve security, sensor nodes are arranged to form clusters. Establishing trust in a node or network gives many benefits, a detailed comparison of different existing trust models as discussed below: In GTMS, a cluster will get a single trust value, so an intruder can easily attack this value when it is sent from cluster head to base station. GTMS scheme has the limitation such as the unrealistic assumption, in order to protect the trust values from the attack. In trust aware in network aggregation for wireless sensor network, the trust evaluation mechanism is applied to identify the trustworthiness of sensor nodes to distinguish the illegal/misbehaving nodes from the normal ones. The limitation of this approach is that it suffers from the security issues of partial aggregation result forging. It does not provide a complete security solution to WSNs. To demonstrate the utility of the hierarchical trust management protocol, the authors apply it to any WSN consisting of heterogeneous sensor nodes with vastly different initial energy level and different degrees of malicious and selfish behaviours and it can use different application such as trust based geographic routing and trust based intrusion detection system. This method is more accurate, but the failure of cluster head may lead to problems. 2.6 A Light Weight Trust Based Secure And Energy Efficient Clustering Reference presents a trust based secure and energy competent clustering method in wireless sensor network using Honey Bee Mating Algorithm (LWTC-BMA). The proposed algorithm extends the lifetime of the network by depriving the malicious node to become a cluster head. The clustering method also allows data aggregation from multiple nodes to eradicate unneeded transmission, which results in energy saving. It also reduces the number of nodes taking part in the communication. The trust value of a node is calculated for ensuring that the selected cluster head is not only having the highest remaining energy but also it has not been compromised in reliability. The Trust value of a node is evaluated from the history of transactions with the node and from the recommendations given by the other neighbour node inside the cluster. Initially, whenever a sensor node joins the network, it is assumed that the node is trustworthy i.e. some trust value is allocated to the node depending upon the threshold trust value. This energy model is relevant for real scenarios as it covers all the basic functionalities of a sensor node. In trust, reputation system approach, the Gaussian probability density function is used to calculate a reputation of neighboring nodes based on the observed data. In Trust establishment scheme for CBSN, a cluster based trust rating model is used to detect the compromised sensor nodes. Hierarchical Trust Management for WSN works with large number of sensor nodes and deals with selfish and malicious nodes and intrusion tolerance. This method is more accurate, but the failure of cluster head may lead to problems. In paper, the proposed algorithm extends the lifetime of the network by depriving the malicious node to become a cluster head. This energy model is relevant for real scenarios as it covers all the basic functionalities of a sensor node. IV. ANALYSIS The most common parameters in different techniques of trust management schemes are trust values, trust metric, direct trust and indirect trust, centralized, distributed or hybrid schemes. Table 1 shows the detailed comparison of different trust management schemes in WSN discussed. The trust values represented in the papers ranges between 0 and 1 where 1 indicates complete trust, 0.5 ignorance and 0 distrust. Table I. Comparison Of Different Methods III. COMPARISON OF DIFFERENT METHODS Wireless Sensor networks are energy constraint and vulnerable to malicious attacks. In order to save 41

CONCLUSION The nodes in the WSNs work on the assumption that a majority of neighbour nodes is reliable. This survey deals with various trust management schemes for intrusion detection system in WSNs. Some trust management system uses both direct and indirect observation to calculate accurate trust value of the node. Almost all trust management systems proposed for WSNs consider the past interaction between nodes and history of transactions and certain QoS between nodes for calculating the trust value. Some schemes consider both social and QoS trust for calculating the trust, this trust value is more accurate and reliable for detecting selfish and malicious nodes in a network. REFERENCES In paper trust value is represented as an unsigned integer. In sensor nodes, representation of trust values as a real number or integer is very important due to the limited memory and transmission, reception power. Representation of the trust value as an unsigned integer saves 75 percent of memory space as compared to trust value represented as real numbers. This gives us the benefits of consumption of transmission and reception power. The paper uses trust metrics - past interactions or peer recommendations, i.e. If a node could not take a decision based on the past interaction of another node during a specific time interval, then node moves for the peer recommendation method for the trust calculation of each node. In scheme, trust of each individual node is built up based on the result of the inconsistency in the inconsistency checking model. None of the existing trust, reputation schemes in the survey has considered trust attributes of sensor nodes. The Hierarchical trust management scheme considers multidimensional trust attribute derived from communication and social network to evaluate the overall trust of a sensor node. All the trust management schemes are calculating the trust value based on the direct or indirect observations. The concept of direct and indirect observations is different in each scheme, which is selected based on the trust metric. Most of the trust management schemes in WSNs are developed for hybrid scheme. To aggregate, distributed trust computation mechanisms are not suitable for WSNs because each sensor node has limited memory and computing power. In this approach every node needs to maintain records about the trust value of entire network. Therefore, neither totally distributed trust computation mechanisms nor completely centralized mechanisms are not suitable for WSNs [1] E. Shi and A. Perrig, Designing Secure Sensor Networks, IEEE Wireless Comm,, 2004. [2] H.S. Ng, M.L. Sim, and C.M. Tan, Security Issues of Wireless Sensor Networks in Healthcare Applications, BT Technology, 2006. [3] R. A. Shaikh, Jameel, B.J.d Auriol, H. Lee. S.Lee, Y.J.Son Group-based Trust Management Scheme for Clustered Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems,2009. [4] Hongmei Deng1, Guang Jin1, Kun Sun1, Roger Xu1,Margaret Lyell1, Jahn A Luk Trust-Aware in-network Aggregation for Wireless Sensor Networks Intelligent Automation Inc, 2009. [5] Bjorn Stelte and Andreas Matheus Secure Trust Reputation with Multi-Criteria Decision Making for Wireless Sensor Networks Data Aggregation IEEE Transaction on Network and Service Management, 2011. [6] Y. Zhou, T. HuangW.Wang, A trust establishment scheme for cluster based sensor networks International Conference on Wireless Communications Networking and Mobile Computing, 2009. [7] Fenye Bao, Ing-Ray Chen, Moon Jeong Chang, and Jin-Hee Cho Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection IEEE Transactions on Network and Service Management, 2012. [8] Rashmi Ranjan Sahooa, Moutushi Singhb, Biswa Mohan Sahooc, Koushik Sudhabindu Raya, Subir Kumar Sarkara A Light Weight Trust Based Secure and Energy Efficient Clustering in Wireless Sensor Network, Honey Bee Mating Intelligence Approach International Conference on Computational Intelligence: Modeling Techniques and Applications 2013. [9] Guangjie Hana, Jinfang Jianga LeShuc,JianweNiud, Han-Chieh Management and application of trust in Wireless Sensor Networks-A survey Journal of Computer and System Sciences 2014. [10] F. Bao, I. R. C n, M. Chang, and J. H. Cho, Trust based intrusion detection in wireless sensor network IEEE International Conference. Communication Proc 2011. [11] Murad A. Rassam,M.A.Maarof and Anazida Zainal A Survey of Intrusion Detection Schemes Wireless Sensor Networks American Journal of Applied Sciences 2012. [12] Z.Liu,Z.Zhang,S.Liu,Y.Ke,J.Chen, A trust model based on Bayes theorem in WSNs International Conference on Wireless Communications, Networking and Mobile Computing, 2011. [13] M.Atakli,H. Hu,Y.Chen, W.S.Ku,Z.Su, Malicious node detection in wireless sensor networks using weighted trust evaluation Proceedings of the 2008 Spring Simulation Multi conference, 2008. 42

[14] G.Han,D.Choi, W.Lim A novel sensor nodes selection method based on trust for wireless senso Networks International Conference on Wireless Communications, Networking and mobile computing,2007. [15] F.Song,B.Zhao, TrusT based LEACH protocol for wireless sensor networks,2 nd International Conference on Future Generation Communication and Networking,2008. 43