A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks

Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distingu...

Full description

Bibliographic Details
Main Authors: Youngho Cho, Gang Qu
Format: Article
Language:English
Published: MDPI AG 2023-04-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/23/9/4407
_version_ 1797601644429443072
author Youngho Cho
Gang Qu
author_facet Youngho Cho
Gang Qu
author_sort Youngho Cho
collection DOAJ
description Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency.
first_indexed 2024-03-11T04:06:32Z
format Article
id doaj.art-103468cefc4f4351a9ab88e7216ec0eb
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-11T04:06:32Z
publishDate 2023-04-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-103468cefc4f4351a9ab88e7216ec0eb2023-11-17T23:43:57ZengMDPI AGSensors1424-82202023-04-01239440710.3390/s23094407A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor NetworksYoungho Cho0Gang Qu1Department of Defense Science (Computer Engineering and Cyberwarfare Major), Graduate School of Defense Management, Korea National Defense University, Nonsan 33021, Republic of KoreaDepartment of Electrical and Computer Engineering and Institute of Systems Research, University of Maryland, College Park, MD 20742, USAQuick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency.https://www.mdpi.com/1424-8220/23/9/4407insider packet drop attacktrust modeltrust-based routingwireless sensor networks
spellingShingle Youngho Cho
Gang Qu
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Sensors
insider packet drop attack
trust model
trust-based routing
wireless sensor networks
title A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
title_full A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
title_fullStr A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
title_full_unstemmed A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
title_short A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
title_sort hybrid trust model against insider packet drop attacks in wireless sensor networks
topic insider packet drop attack
trust model
trust-based routing
wireless sensor networks
url https://www.mdpi.com/1424-8220/23/9/4407
work_keys_str_mv AT younghocho ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks
AT gangqu ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks
AT younghocho hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks
AT gangqu hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks