A double-layer isolation mechanism for malicious nodes in wireless sensor networks

被引:0
|
作者
Zhongmin Wang
Qing Zhang
Cong Gao
机构
[1] Xi’an University of Posts and Telecommunications,School of Computer Science and Technology
[2] Xi’an University of Posts and Telecommunications,Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing
来源
Wireless Networks | 2021年 / 27卷
关键词
Wireless sensor networks; Improved Dijkstra algorithm; Double-layer isolation mechanism; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Isolation plays an important role in the security of wireless sensor networks. Existing isolation models for wireless sensor networks possess excessive energy consumption. We propose a double-layer isolation mechanism based on an improved Dijkstra algorithm. The number of “optimal” nodes is obtained based on the calculation formula. Two groups of “optimal” nodes are determined by the arrival time difference ranging algorithm and the improved Dijkstra algorithm. The first layer isolation and the second layer isolation are constructed by the obtained two groups of “optimal” nodes, respectively. According to the status of receiving and sending data, the “optimal” routing protocol and working mode are selected. Based on the cooperation between two layers of isolation, intruded nodes are isolated from a wireless sensor network. The intrusion source is detected by monitoring the intruded nodes. Simulation results show that the proposed isolation mechanism can effectively reduce the energy consumption of wireless sensor nodes. High transmission efficiency, rapid response, and enhanced security are provided for wireless sensor networks.
引用
收藏
页码:2391 / 2407
页数:16
相关论文
共 50 条
  • [1] A double-layer isolation mechanism for malicious nodes in wireless sensor networks
    Wang, Zhongmin
    Zhang, Qing
    Gao, Cong
    [J]. WIRELESS NETWORKS, 2021, 27 (04) : 2391 - 2407
  • [2] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    [J]. 2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524
  • [3] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [4] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    [J]. 2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [5] A secure routing protocol with malicious nodes detecting and diagnosing mechanism for wireless sensor networks
    Jiang, Yuan-xi
    Zhao, Bao-hua
    [J]. 2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 49 - 55
  • [6] Study on Automatic Positioning of Malicious Mobile Nodes in Wireless Sensor Networks
    Zheng Wen-Kui
    Liu Kun
    [J]. PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1495 - 1499
  • [7] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [8] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    [J]. 2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [9] A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks
    Reddy, Yenumula B.
    [J]. 2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 462 - 468
  • [10] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    [J]. Wireless Personal Communications, 2019, 108 : 2117 - 2135