State Context and Hierarchical Trust
104 R. B. Kagade and J. Santhosh Keywords Hierarchical trust management
·
Base station·
Cluster head·
Intrusiondetection mechanism
·
P2P network·
WSN1 Introduction
Wireless sensor network (WSN) is collection of sensor nodes that are equipped with environmental sensors for heat, moisture, humidity, pressure, air/water quality, weight, sound etc. WSN does not have fixed topology. WSN has wide range of applications in field of agriculture, health, home, industrial, military and natural calamities for monitoring and data collection purpose. The advantage of WSN is that it is very easy to install in critical regions where normal network cannot be set.
Sensor nodes contain five components trans-receiver, processor, battery, hardware and memory. The wide range of applications can be elaborated as follows:
Wild Habitat Monitoring
Sensors can be used to monitor the conditions of wild animals or plants in wild habitats. Sensors can be used to collect information in the water and above water.
Disaster Monitoring
Information collection in natural and non-natural disaster areas is very important task.
A normal network cannot be set in such areas. WSN becomes prominent solutions in such situations.
Warfield Monitoring
Sensors can be deployed in a war field to monitor the presence of forces and vehicles, and track their movements, enabling close surveillance of opposing forces.
Sensitive Place Protection
Sensor nodes can be deployed around sensitive objects, for example, atomic plants, strategic bridges, oil and gas pipelines, communication centers, and military headquarters, for protection purpose.
Vehicle Monitoring
Sensors can be mounted on unmanned robotic vehicles, tanks, fighter planes, submarines, missiles, or torpedoes to guide them around obstacles to their targets and lead them to coordinate with one another to accomplish more effective attacks or defenses.
Remote Sensing
Sensors can be deployed for remote sensing of nuclear, biological, and chemical weapons, detection of potential terrorist attacks, and reconnaissance [1]. Due to its vital range of applications it has several ranges of attackers at different levels. In WSN sensor nodes have limited battery power, limited power to communicate and
State Context and Hierarchical Trust Management … 105 compute. WSN is susceptible to so many attacks, because of broadcasting nature of network.
An intrusion is defined as a sequence of related actions performed by a malicious adversary that results in the compromise of a target system. An Intrusion Detection System specially looks for something wrong operation and events that might be the outcome of a cause of attack, worm or system expert for pleasure.
Intrusion detection system consists of four methods which detects the system is described below [2].
1.1 Network Based Intrusion Detection System
NIDS will monitor the traffic, malicious changes that are happening in the network which causes changes that leads to system degradation.
1.2 Host Based Intrusion Detection System
HIDS may also be able to make out malicious business trade that starts with malware and is attempting to put out on top for other systems.
1.3 Signature Based Detection System
Signature-based detection systems guide all the small data traversing the network and make a comparison against a knowledge-base of signatures or given properties of experienced violent behavior, like antivirus software.
1.4 Anomaly Based Detection System
Anomaly-based detection systems guide network business trade and make a compar- ison against a started baseline, to come to a decision about what is taken into account normal for the network with respect to bandwidth, protocols, harbors and other devices [3,4].
Trust is the degree of belief that a node can have on another node in the network based on trust metric or trust rating o the node. Different types of attacks due to intrusion are illustrated as follows [5].
GTMS: group based trust management scheme GTMS works in two types of topologies intergroup topology and intra-group topology. In intergroup topology
106 R. B. Kagade and J. Santhosh centralized trust management is adopted and in intergroup topology distributed trust management is adopted.
ATRM: agent based trust and reputation management scheme An agent based trust and reputation management scheme [6] (ATRM) is based on a clustered WSN with mobile agent system. It requires every node to hold the mobile agent which is administrating the trust and reputation of the hosting node.
PLUS Parameterized and localized trust management scheme for sensor network security [7]. It uses distributed approach to adapt to different operational environ- ments and different applications. The trust is calculated based on either direct or indirect observations.
RFSN reputation based framework for sensor networks they have proposed a framework where each node maintains reputation metrics which includes the past behavior of other sensor nodes of the network and the metrics used for predicting the future behavior. The values of the trust are evaluated on the basis of that reputation and for representing the values of reputation, Bayesian formulation is used.
TRGR Trust management scheme for resilient geographic routing Trust manage- ment scheme for resilient geographic routing [8] (TRGR) is a simple trust manage- ment scheme which uses resilient geographic routing. Geographic routing consists of two parts: geographic forwarding and complementary routing [9]. The trust algo- rithm works in a fully distributed manner, in which each node monitors the behavior of one hop neighbors. The basic idea of this trust management scheme is to favor well behaving honest nodes by giving them the credit for each successful packet forwarding, while penalizing suspicious nodes that doesn’t route packet according to route.
BRMSN Behavior reputation method for sensor networks Behavior reputation method for sensor networks [10] (BRMSN) measures the spatial information between the nodes as reputation measurement. The model is a reflection of the node’s compre- hensive ability about the actual physical properties and conduct essentially. Nodes in the network not only include the identity of the trust but also the trust in the behavior of the node. The model focuses on the local testing.
In this paper Intrusion detection system is introduced which depends on trans- mission time and relieving time. Two level trust mechanism is proposed to reduce overhead of base station and cluster head. The number of successful and unsuccessful transmission of data at WSN decides the trust value of sensor nodes.
This paper is organized as follows: In Sect.2the existing systems are discussed while Sect.3introduces the proposed work. Section4decides expected results and Sect.5concludes the proposed.