Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/15064
Title: | Two Layers TrustTwo Layers TrustTwo Layers Trust Two Layers TrustTwo Layers TrustTwo Layers Trust Two Layers Trust Two Layers TrustTwo Layers TrustTwo Layers TrustTwo Layers Trust -Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention S Based Intrusion Prevention S Based Intrusion Prevention SBased Intrusion Prevention System for for Wireless Wireless Wireless Sensor Networks Sensor Networks Sensor Networks Sensor |
Authors: | Oke, J. T. Agajo, J Nuhu B. K., Kolo, J. G. & Ajao, L. A. |
Keywords: | Energy level Intrusion detection system Network performance Trust value Wireless sensor network |
Issue Date: | 2018 |
Publisher: | Advances in Electrical and Telecommunication Engineering |
Abstract: | Security of a wireless sensor network is aimed at ensuring information confidentiality, authentication, integrity, availability and freshness is an important factor considering the criticality of the information being relayed. Hence, the need for an intrusion detection/prevention system. Conventional intrusion avoidance measures, such as encryption and authentication are not sufficient because they become useless in the event of a sensor node being compromised, hence, can only be seen as a first line of defence in the network after which intrusion detection schemes follow. In this paper, two layers trust-based intrusion detection system was developed for wireless sensor networks. A trust-based model is presented to detect intrusions to the network. Scenarios were created by using different set of weights. By injecting 2%, 5% and 10% malicious nodes from the 100 nodes considered, the results obtained were carefully observed. For scenario 2 (S2) with 2% and 5% malicious nodes injected, the model achieved the best result in all cases with an average detection accuracy of 97.8% while scenario 3 (S3) with 10% of malicious nodes introduced recorded the best performance with an average accuracy of 96%. Hence, the model will be suitable with combination of weights in S2 with small networks but when the scale of the network increases, the set of weights in S3 are best with the model. |
URI: | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/15064 |
Appears in Collections: | Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
document (4).pdf | 918.11 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.