{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:26:40Z","timestamp":1770334000070,"version":"3.49.0"},"reference-count":42,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T00:00:00Z","timestamp":1495843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.<\/jats:p>","DOI":"10.3390\/s17061227","type":"journal-article","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T04:35:42Z","timestamp":1496118942000},"page":"1227","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks"],"prefix":"10.3390","volume":"17","author":[{"given":"Jian","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Shuai","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China"}]},{"given":"Abraham","family":"Fapojuwo","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","article-title":"Denial of service in sensor networks","volume":"35","author":"Wood","year":"2002","journal-title":"IEEE Comput."},{"key":"ref_2","unstructured":"Wang, X., Gu, W., Schosek, K., Chellappan, S., and Xuan, D. (2004). Sensor Network Configuration under Physical Attacks, Department of Computer Science and Engineering, Ohio State University. Technical Report: OSU-CISRC-7\/04-TR45."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MNET.2006.1637931","article-title":"Jamming sensor networks: Attack and defense strategies","volume":"20","author":"Xu","year":"2006","journal-title":"IEEE Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TVT.2008.921621","article-title":"Effects of denial-of sleep attacks on wireless sensor network MAC protocols","volume":"58","author":"Raymond","year":"2009","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Sokullu, R., Dagdeviren, O., and Korkmaz, I. (2008, January 25\u201331). On the IEEE 802.15.4 MAC layer attacks: GTS attack. Proceedings of the Second International Conference on Sensor Technologies and Applications (SENSORCOMM), Cap Esterel, France.","DOI":"10.1109\/SENSORCOMM.2008.75"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.3233\/JCS-2007-15105","article-title":"Detecting IEEE 802.11 MAC layer misbehavior in Ad Hoc networks: Robust strategies against individual and colluding attackers","volume":"15","author":"Radosavac","year":"2007","journal-title":"J. Comput. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","article-title":"Secure routing in wireless sensor networks: Attacks and countermeasures","volume":"1","author":"Karlof","year":"2003","journal-title":"Ad Hoc Netw. J."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., and Johnson, D.B. (2003, January 1\u20133). Packet Leashes: A defense against wormhole attacks in wireless networks. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies (INFOCOM), San Francisco, CA, USA.","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Al-Shurman, M., Yoo, S.M., and Park, S. (2004, January 2\u20133). Black hole attack in mobile ad hoc networks. Proceedings of the 42nd Annual ACM Southeast Regional Conference (ACM-SE\u201942), Huntsville, Alabama, AL, USA.","DOI":"10.1145\/986537.986560"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., and Perrig, A. (2004, January 26\u201327). The sybil attack in sensor networks: Analysis & defenses. Proceedings of the third International Symposium on Information Processing in Sensor Networks ACM (IPSN), Berkeley, CA, USA.","DOI":"10.1145\/984622.984660"},{"key":"ref_11","unstructured":"Radosavac, S., Benammar, N., and Baras, J.S. (2004, January 17\u201319). Cross-layer attacks in wireless ad hoc networks. Proceedings of the 38th Annual conference on Information Science and Systems (CISS), Princeton, NJ, USA."},{"key":"ref_12","unstructured":"Bian, K., Park, J.M., and Chen, R. (December, January 27). Stasis Trap: Cross-layer stealthy attack in wireless ad hoc networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), San Francisco, CA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Nagireddygari, D., and Thomas, J. (2014, January 21\u201322). MAC-TCP cross-layer attack and its defense in cognitive radio networks. Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Montreal, QC, Canada.","DOI":"10.1145\/2642687.2642700"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1016\/j.eswa.2005.05.002","article-title":"An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks","volume":"29","author":"Depren","year":"2005","journal-title":"Expert Syst. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.1016\/j.phpro.2012.03.352","article-title":"Intrusion detection for wireless sensor network based on traffic prediction model","volume":"25","author":"Han","year":"2012","journal-title":"Phys. Procedia"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/959060.959074","article-title":"Distributed deviation detection in sensor networks","volume":"32","author":"Palpanas","year":"2003","journal-title":"ACM Sigmod Rec."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.patcog.2010.07.024","article-title":"Clustering ellipses for anomaly detection","volume":"44","author":"Moshtaghi","year":"2011","journal-title":"Pattern Recognit."},{"key":"ref_18","first-page":"6535","article-title":"Game theory approaches for improving intrusion detection in MANETs","volume":"6","author":"Javidi","year":"2011","journal-title":"Sci. Res. Essays"},{"key":"ref_19","first-page":"521","article-title":"A Survey of game theory in wireless sensor networks security","volume":"6","author":"Shen","year":"2011","journal-title":"J. Netw."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Mohi, M., Movaghar, A., and Zadeh, P.M. (2009, January 6\u20138). A bayesian game approach for preventing DoS attacks in wireless sensor networks. Proceedings of the WRI International Conference on Communications and Mobile Computing, Kunming, China.","DOI":"10.1109\/CMC.2009.325"},{"key":"ref_21","unstructured":"Lira, A.T.H., Lau, H.K., Timmis, J., and Bate, I. (2012, January 28\u201331). Immune-inspired self healing in wireless sensor networks. Proceedings of the 11th International Conference on Artificial Immune Systems, Taormina, Italy."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ishmanov, F., Malik, S.A., Kim, S.W., and Begalov, B. (2013). Trust management system in wireless sensor networks: Design considerations and research challenges. Trans. Emerg. Telecomun. Technol.","DOI":"10.1002\/ett.2674"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.3390\/s110201345","article-title":"A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory","volume":"11","author":"Feng","year":"2011","journal-title":"Sensors"},{"key":"ref_24","unstructured":"Wu, R., Deng, X., Lu, R., and Shen, X. (2012, January 15\u201317). Trust-based anomaly detection in wireless sensor networks. Proceedings of the 1st IEEE International Conference on Communications in China: Communications Theory and Security, Beijing, China."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Shao, N., Zhou, Z., and Sun, Z. (2015, January 13\u201315). A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networks. Proceedings of the International Conference on Cloud Computing and Security, Nanjing, China.","DOI":"10.1007\/978-3-319-27051-7_14"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Balzano, L.K., and Srivastava, M.B. (2004, January 25\u201329). Reputation based framework for high integrity sensor networks. Proceedings of the 2nd ACM Workshop Security Ad Hoc Sensor Network, Washington, DC, USA.","DOI":"10.1145\/1029102.1029115"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1002\/sec.1384","article-title":"A dynamic trust management system for wireless sensor networks","volume":"9","author":"Luo","year":"2016","journal-title":"Sec. Commun. Netw."},{"key":"ref_28","unstructured":"Atakli, I.M., Hu, H., Chen, Y., Ku, W.S., and Su, Z. (2008, January 14\u201317). Malicious node detection in wireless sensor networks using weighted trust evaluation. Proceedings of the Symposium on Simulation of Systems Security, Ottawa, ON, Canada."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","article-title":"Group-based trust management scheme for clustered wireless sensor networks","volume":"20","author":"Shaikh","year":"2009","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Yao, Z., Kim, D., and Doh, Y. (2006, January 9\u201312). PLUS: Parameterized and localized trust management scheme for sensor networks security. Proceedings of the IEEE International Conference on Mobile Ad hoc & Sensor System, Vancouver, BC, Canada.","DOI":"10.1109\/MOBHOC.2006.278584"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","article-title":"A lightweight and dependable trust system for clustered wireless sensor networks","volume":"8","author":"Li","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","article-title":"An efficient distributed trust model for wireless sensor networks","volume":"26","author":"Jiang","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"7040","DOI":"10.3390\/s150307040","article-title":"A robust trust establishment scheme for wireless sensor networks","volume":"15","author":"Ishmanov","year":"2015","journal-title":"Sensors"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, I.R., Chang, M., and Chao, J.H. (2011, January 5\u20139). Trust-based intrusion detection in wireless sensor networks. Proceedings of the IEEE International Conference on Communications, Kyoto, Japan.","DOI":"10.1109\/icc.2011.5963250"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection","volume":"9","author":"Bao","year":"2012","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Zhang, T., Yan, L., and Yang, Y. (2016). Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel. Netw.","DOI":"10.1007\/s11276-016-1368-y"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Rajeshkumar, G., and Valluvan, K.R. (2016). An Energy Aware Trust Based Intrusion Detection System with Adaptive Acknowledgement for wireless sensor network. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-016-3349-y"},{"key":"ref_38","unstructured":"Wang, J., Fapojuwo, A.O., Zhang, C., and Tan, H. (2016, January 26\u201327). UML Modeling of Cross-Layer Attack in Wireless Sensor Networks. Proceedings of the 2nd International Conferenceon on safety and security in IoT, Paris, France."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Woo, A., Tong, T., and Culler, D. (2003, January 5\u20137). Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks. Proceedings of the 1st International Conference on Embedded networked sensor systems (SenSys), Los Angeles, CA, USA.","DOI":"10.1145\/958491.958494"},{"key":"ref_40","unstructured":"Tiny, O.S. (2017, March 25). Webpage. Available online: http:\/\/www.tinyos.net\/."},{"key":"ref_41","unstructured":"Wang, J., Yang, L., and Zhao, Y. (2011, January 6\u20137). Research of wireless sensor networks cross-layer energy optimization based on link quality. Proceedings of the 3rd International Conference on Measuring Technology and Mechatronics Automation, Shanghai, China."},{"key":"ref_42","first-page":"50","article-title":"Detecting sinkhole attacks in wireless sensor network using hop count","volume":"3","author":"Abdullah","year":"2015","journal-title":"Int. J. Comput. Netw. Inf. Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1227\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:37:13Z","timestamp":1760207833000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/6\/1227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,27]]},"references-count":42,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["s17061227"],"URL":"https:\/\/doi.org\/10.3390\/s17061227","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,27]]}}}