Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks

被引:0
|
作者
Xu, Xingkun [1 ]
Zhao, Ting [1 ]
Zheng, Xiaokun [1 ]
Wang, Huixin [2 ]
Fang, Wenjuan [2 ]
机构
[1] China Elect Power Res Inst, Informat & Commun Dept, Beijing, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Automatizat Engn Coll, Chongqing, Peoples R China
关键词
Wireless Sensor Networks; Energy Potential Field; Malicious Node; Detection; ARMA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
According to the malicious attacks which are sensitive to energy in wireless sensor network, this paper proposes a detection method of malicious nodes of wireless sensor network based on the energy field. First of all, constructing wireless sensor network based on energy field through the energy potential energy field of the routing protocol; Secondly, ARMA prediction model is used to forecast the node energy in sensor network based on the energy field, which can reduce energy consumption attacks occurred in probability. The simulation results show that this scheme has been greatly improved in the energy balance aspects among the nodes, and in the malicious nodes detection accuracy aspects it also has significantly improved, effectively prolonging the network life cycle.
引用
收藏
页码:637 / 642
页数:6
相关论文
共 50 条
  • [31] An energy-efficient node selection scheme in wireless sensor networks
    Hao, Donglai
    Mao, Zhijie
    Chen, Hualiang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL FORUM ON ENERGY, ENVIRONMENT AND SUSTAINABLE DEVELOPMENT (IFEESD), 2016, 75 : 698 - 701
  • [32] A node scheduling scheme for energy conservation in large wireless sensor networks
    Tian, D
    Georganas, ND
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2003, 3 (02): : 271 - 290
  • [33] Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks
    Kumar, Mohit
    Mukherjee, Priya
    Kavita
    Verma, Sahil
    Rawat, Danda B.
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05): : 3272 - 3281
  • [34] A Node Overhaul Scheme for Energy Efficient Clustering in Wireless Sensor Networks
    Singh, Jaspreet
    Yadav, Satyendra Singh
    Kanungo, Vinay
    Yogita
    Pal, Vipin
    [J]. IEEE SENSORS LETTERS, 2021, 5 (04)
  • [35] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [36] Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
    Khan, Asad Ullah
    Sajid, Maimoona Bint E.
    Rauf, Abdul
    Saqib, Malik Najmus
    Zaman, Fawad
    Javaid, Nadeem
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [37] A hybrid malicious node detection approach based on fuzzy trust model and Bayesian belief in wireless sensor networks
    Shi W.
    [J]. International Journal of Wireless and Mobile Computing, 2024, 27 (01) : 56 - 63
  • [38] A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
    Mohammad Wazid
    Ashok Kumar Das
    [J]. Wireless Personal Communications, 2017, 94 : 1165 - 1191
  • [39] A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) : 1165 - 1191
  • [40] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246