A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distingu...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-04-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/9/4407 |
_version_ | 1797601644429443072 |
---|---|
author | Youngho Cho Gang Qu |
author_facet | Youngho Cho Gang Qu |
author_sort | Youngho Cho |
collection | DOAJ |
description | Quick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency. |
first_indexed | 2024-03-11T04:06:32Z |
format | Article |
id | doaj.art-103468cefc4f4351a9ab88e7216ec0eb |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-11T04:06:32Z |
publishDate | 2023-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-103468cefc4f4351a9ab88e7216ec0eb2023-11-17T23:43:57ZengMDPI AGSensors1424-82202023-04-01239440710.3390/s23094407A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor NetworksYoungho Cho0Gang Qu1Department of Defense Science (Computer Engineering and Cyberwarfare Major), Graduate School of Defense Management, Korea National Defense University, Nonsan 33021, Republic of KoreaDepartment of Electrical and Computer Engineering and Institute of Systems Research, University of Maryland, College Park, MD 20742, USAQuick and accurate detection of inside packet drop attackers is of critical importance to reduce the damage they can have on the network. Trust mechanisms have been widely used in wireless sensor networks for this purpose. However, existing trust models are not effective because they cannot distinguish between packet drops caused by an attack and those caused by normal network failure. We observe that insider packet drop attacks will cause more consecutive packet drops than a network abnormality. Therefore, we propose the use of consecutive packet drops to speed up the detection of inside packet drop attackers. In this article, we describe a new trust model based on consecutive drops and develop a hybrid trust mechanism to seamlessly integrate the new trust model with existing trust models. We perform extensive OPNET (Optimized Network Engineering Tool) simulations using a geographic greedy routing protocol to validate the effectiveness of our new model. The simulation results show that our hybrid trust model outperforms existing trust models for all types of inside packet drop attacks, not only in terms of detection speed and accuracy as it is designed for, but also in terms of other important network performance metrics, such as packet delivery rate, routing reliability, and energy efficiency.https://www.mdpi.com/1424-8220/23/9/4407insider packet drop attacktrust modeltrust-based routingwireless sensor networks |
spellingShingle | Youngho Cho Gang Qu A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks Sensors insider packet drop attack trust model trust-based routing wireless sensor networks |
title | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_full | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_fullStr | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_full_unstemmed | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_short | A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks |
title_sort | hybrid trust model against insider packet drop attacks in wireless sensor networks |
topic | insider packet drop attack trust model trust-based routing wireless sensor networks |
url | https://www.mdpi.com/1424-8220/23/9/4407 |
work_keys_str_mv | AT younghocho ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT gangqu ahybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT younghocho hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks AT gangqu hybridtrustmodelagainstinsiderpacketdropattacksinwirelesssensornetworks |