Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment

被引:0
|
作者
Nii, Eiji [1 ]
Kitanouma, Takamasa [1 ]
Adachi, Naotoshi [2 ]
Takizawa, Yasuhisa [2 ]
机构
[1] Kansai Univ Osaka, Grad Sch Sci & Engn, Suita, Osaka, Japan
[2] Kansai Univ Osaka, Fac Environm & Urban Engn, Suita, Osaka, Japan
关键词
wireless sensor networks; security; falsify; cooperative detection; isolation; SECURITY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In wireless sensor networks, physical contact to sensor nodes by outsiders must be considered, because wireless sensor networks will be deployed in open environments that are populated by outsiders. Malicious outsiders can access a sensor node's storage and steal such security-related information as a key and inject malicious sensor nodes that can pass through authentication using that stolen key and perform falsifications in networks. The conventional schemes for falsification detection generally use a digital signature; however, these techniques require a completely secure key. Therefore, they cannot effectively work in situations when the key is not secure, and the reliability of the data is completely lost. Accordingly, in this paper, to protect the reliability of wireless sensor networks without a secure key, we propose a mechanism that detects malicious nodes by the cooperation of proper nodes and logically isolate the detected, malicious nodes from wireless sensor networks.
引用
收藏
页码:521 / 524
页数:4
相关论文
共 50 条
  • [1] Cooperative Detection for Falsification and Isolation of Malicious Nodes through Inter-node Vote for Wireless Sensor Networks in Open Environments
    Kimura, Yoshiki
    Nii, Eiji
    Takizawa, Yasuhisa
    [J]. 2019 GLOBAL INFORMATION INFRASTRUCTURE AND NETWORKING SYMPOSIUM (GIIS), 2019,
  • [2] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [3] Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 404 - 406
  • [4] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [5] A double-layer isolation mechanism for malicious nodes in wireless sensor networks
    Zhongmin Wang
    Qing Zhang
    Cong Gao
    [J]. Wireless Networks, 2021, 27 : 2391 - 2407
  • [6] A double-layer isolation mechanism for malicious nodes in wireless sensor networks
    Wang, Zhongmin
    Zhang, Qing
    Gao, Cong
    [J]. WIRELESS NETWORKS, 2021, 27 (04) : 2391 - 2407
  • [7] Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
    Kumar, Mandeep
    Ali, Jahid
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (01): : 444 - 468
  • [8] Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
    Zhang, Zhiming
    Yang, Yu
    Yang, Wei
    Wu, Fuying
    Li, Ping
    Xiong, Xiaoyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [10] Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks
    Gopal, R.
    Parthasarathy, V.
    Mani, A.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,