Cargando…
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distingu...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181746/ https://www.ncbi.nlm.nih.gov/pubmed/37177609 http://dx.doi.org/10.3390/s23094407 |
_version_ | 1785041648270442496 |
---|---|
author | Cho, Youngho Qu, Gang |
author_facet | Cho, Youngho Qu, Gang |
author_sort | Cho, Youngho |
collection | PubMed |
description | Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency. |
format | Online Article Text |
id | pubmed-10181746 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101817462023-05-13 A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks Cho, Youngho Qu, Gang Sensors (Basel) Article Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency. MDPI 2023-04-30 /pmc/articles/PMC10181746/ /pubmed/37177609 http://dx.doi.org/10.3390/s23094407 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Cho, Youngho Qu, Gang A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_full | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_fullStr | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_full_unstemmed | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_short | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_sort | hybrid trust model against insider packet drop attacks in wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10181746/ https://www.ncbi.nlm.nih.gov/pubmed/37177609 http://dx.doi.org/10.3390/s23094407 |
work_keys_str_mv | AT choyoungho ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT qugang ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT choyoungho hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT qugang hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks |