Security mechanism is a fundamental requirement of
wireless networks in general and Wireless Sensor Networks (WSN) in particular. The
Intrusion Detection System (IDS) has become a critical component of wireless
sensor networks security strategy. There are several architectures for embedding
IDS in WSN. Due to Energy Limitation, in this paper we use a distributed
architecture which activates intrusion detection system for limited number of
nodes. For this purpose we select a secure set of nodes called secure Connected
Dominating Set (CDS). In this paper first, we propose a heuristic for selecting
CDS based on weighing factor which uses the trust value. Trust is based on reputation
and reputation refers to the opinion of one node about another node. Hence only
well behaving and good quality nodes are selected as a dominant node for CDS
construction. Then we activate IDS on these selected node set. In our proposed
work the task of all dominating nodes is to discover any attack and threat that
can affect the normal behavior of sensor nodes by analyzing actual status of a
node, packet sent and received by node and measurement made to the environment.
The simulation results show that our TC-IDS model have high packet delivery
ratio, high throughput and low delay than existing IDS Schemes such as Lightweight
Cite this paper
Mohajer, A. , Hajimobini, M. H. , Mirzaei, A. and Noori, E. (2014). Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS). Open Access Library Journal, 1, e848. doi: http://dx.doi.org/10.4236/oalib.1100848.
and Shankar, U. (2012) The Proposal of Hybrid Intrusion Detection for Defence
of Sync Flood Attack in Wireless Sensor Network. International Journal of Computer Science & Engineering Survey, 3, 31-38. http://dx.doi.org/10.5121/ijcses.2012.3204
and Li, H. (1999) On Calculating Connected Dominating Set for Efficient Routing in Ad-hoc Wireless Networks. Proceedings
of the 3rdInternationalWorkshop on Discrete Algorithms
and Methods for Mobile Computing and Communication (DIAL’M), Seattle, August 1999, 7-14.
Haggar, B. (2009) Self-Stabilizing Clustering Algorithm for Ad-hoc Networks. Proceedings of the 5th InternationalConference on Wireless and Mobile
Communications, ICWMC 2009,
French Riviera, August 2009, 24-29.
Ali, K., Sara, M., Belbachir, R., Maaza, Z.M.
and Senouci, S.M.
(2012) Self-Organization Framework for Mobile Ad-hoc Networks. Proceedings of 8th International conference on Wireless Communications and
Mobile Computing, August 2012, 14-22.
Folkman, L. and Matyas, V.
(2010) Neighbor-Based Intrusion Detection
for Wireless Sensor Networks. Proceedings of International Conference on Wireless and Mobile Communications, Los
Giannetsos, T. and Mpasoukos, M. (2008) Intrusion Detection of Sinkhole Attacks
in Wireless Sensor Networks. In: Algorithmic Aspects of Wireless Sensor Networks, Springer,
Sophia Antipolis, 150-161.
Uribeetxeberria, R., Zurutuza, U. and Arenaza, I. (2012) Reputation-Based Intrusion Detection System
for Wireless Sensor Networks. Complexity
in Engineering (COMPENG), Aachen, 11-13 June 2012, 1-5.
Krontiris, I., Giantsos, T. and Dimitriou, T. (2008) LIDeA: A
Distributed Lightweight Intrusion Detection Architecture for Sensor Networks. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks,
September 2008, 1-10.
Bidgoly, A.J. and Ladani, B.T. (2013) Quantitative
Verification of Beta Reputation System Using PRISM Probabilistic Model Checker. Proceedings
of 10th International
ISC Conference on Information Security and Cryptology (ISCISC), Yazd, 29-30 August 2013, 1-6.
Parker, J., Joshi, A., Iorga, M. and Karygiannis, T. (2005) Secure Routing and Intrusion Detection
in Ad Hoc Networks. 3rd
IEEE International Conference on Pervasive Computing and Communications, PerCom 2005,
Kauai Island, 8-12
March 2005, 191-199.