期刊论文详细信息
IEEE Access 卷:6
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data
Weizhi Meng1  Wenjuan Li1  Chunhua Su2  Rongxing Lu3  Jianying Zhou4 
[1] Department of Applied Mathematics and Computer Science, Technical University of Denmark, Lyngby, Denmark;
[2] Division of Computer Science, University of Aizu, Aizuwakamatsu, Japan;
[3] Faculty of Computer Science, University of New Brunswick, Saint John, Canada;
[4] Information Systems Technology and Design, Singapore University of Technology and Design, Singapore;
关键词: Intrusion detection;    traffic sampling;    wireless sensor network;    trust computation;    Bayesian model;    big data;   
DOI  :  10.1109/ACCESS.2017.2772294
来源: DOAJ
【 摘 要 】

Internet of Things (IoT) has been widely used in our daily life, which enables various objects to be interconnected for data exchange, including physical devices, vehicles, and other items embedded with network connectivity. Wireless sensor network (WSN) is a vital application of IoT, providing many kinds of information among sensors, whereas such network is vulnerable to a wide range of attacks, especially insider attacks, due to its natural environment and inherent unreliable transmission. To safeguard its security, intrusion detection systems (IDSs) are widely adopted in a WSN to defend against insider attacks through implementing proper trust-based mechanisms. However, in the era of big data, sensors may generate excessive information and data, which could degrade the effectiveness of trust computation. In this paper, we focus on this challenge and propose a way of combining Bayesian-based trust management with traffic sampling for wireless intrusion detection under a hierarchical structure. In the evaluation, we investigate the performance of our approach in both a simulated and a real network environment. Experimental results demonstrate that packet-based trust management would become ineffective in a heavy traffic environment, and that our approach can help lighten the burden of IDSs in handling traffic, while maintaining the detection of insider attacks.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次