Countering Intelligent-Dependent Malicious Nodes in Target Detection Wireless Sensor Networks

被引:25
|
作者
Althunibat, Saud [1 ]
Antonopoulos, Angelos [2 ]
Kartsakli, Elli [3 ]
Granelli, Fabrizio [4 ]
Verikoukis, Christos [2 ]
机构
[1] Al Hussein Bin Talal Univ, Dept Commun Engn, Maan 20, Jordan
[2] Telecommun Technol Ctr Catalonia, Barcelona 08860, Spain
[3] IQUADRAT Informat SL, Barcelona 08009, Spain
[4] Univ Trento, Dept Informat Engn & Comp Sci, I-38123 Trento, Italy
关键词
Wireless sensor networks; target detection; security; malicious nodes; malicious detection algorithms; DISTRIBUTED DETECTION;
D O I
10.1109/JSEN.2016.2606759
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Target detection wireless sensor networks (WSNs), where binary decisions are transmitted to declare the presence or absence of a given target, are expected to have a fundamental role in the Internet of Things era. However, their simplicity makes these networks very susceptible to malicious attacks, while the problem is aggravated in the presence of intelligent malicious nodes that adapt their strategy depending on the behavior of other nodes in the network. In this paper, first, we analytically demonstrate that dependent and independent malicious nodes have the same impact on the overall performance of target detection WSNs in terms of detection and false alarm rates. Then, taking into account that dependent malicious users cannot be detected by conventional algorithms, we introduce an effective algorithm that detects malicious nodes in the network regardless of their type and number. Finally, theoretical and simulation results are provided to show the effects of dependent malicious nodes and analyze the performance of the proposed algorithm compared with the existing state-of-the-art works.
引用
收藏
页码:8627 / 8639
页数:13
相关论文
共 50 条
  • [1] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [2] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [3] Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
    Kumar, Mandeep
    Ali, Jahid
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (01): : 444 - 468
  • [4] Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
    Zhang, Zhiming
    Yang, Yu
    Yang, Wei
    Wu, Fuying
    Li, Ping
    Xiong, Xiaoyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [5] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [6] OPTIMIZED TRACKING AND DETECTION OF TARGET NODES IN WIRELESS SENSOR NETWORKS
    Niranchana, S.
    Dinesh, E.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 695 - 700
  • [7] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    [J]. 2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524
  • [8] Simulation for Wireless Sensor Networks with Intelligent Nodes
    Zboril, Frantisek, Jr.
    Zboril, Frantisek
    [J]. 2008 UKSIM TENTH INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, 2008, : 746 - 751
  • [9] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [10] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280