Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks

被引:8
|
作者
Lim, Sung Yul [1 ]
Choi, Yoon-Hwa [1 ]
机构
[1] Hongik Univ, Dept Comp Engn, Seoul 121791, South Korea
来源
基金
新加坡国家研究基金会;
关键词
sensor networks; malicious node detection; faults; dual threshold;
D O I
10.3390/jsan2010070
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Sensor networks for various event detection applications cannot function effectively if they are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading reports in such a way that event detection accuracy and false alarm rates are unacceptably low and high, respectively. In this paper, we present a malicious node detection scheme for wireless sensor networks. Unlike others using a single threshold, the proposed scheme employs two thresholds to cope with the strong trade-off between event detection accuracy and false alarm rate, resulting in improved malicious node detection performance. In addition, each sensor node maintains the trust values of its neighboring nodes to reflect their behavior in decision-making. Computer simulation shows that the proposed scheme achieves high malicious node detection accuracy without sacrificing normal sensor nodes and outperforms the scheme using a single threshold.
引用
收藏
页码:70 / 84
页数:15
相关论文
共 50 条
  • [41] DETECTION OF MILICIOUS NODE IN WIRELESS SENSOR NETWORKS
    Padmaja, P.
    Marutheswar, G. V.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [42] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Ismail, Asima
    Amin, Rashid
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2117 - 2135
  • [43] On the Node Clone Detection in Wireless Sensor Networks
    Li, Zhijun
    Gong, Guang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (06) : 1799 - 1811
  • [44] Adoption of Cognition for Malicious Node Detection in Homogeneous and Heterogeneous Wireless Networks
    Sunilkumar, G.
    Shivaprakash, K.
    Thriveni, J.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 36 - 41
  • [45] Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
    Khan, Asad Ullah
    Sajid, Maimoona Bint E.
    Rauf, Abdul
    Saqib, Malik Najmus
    Zaman, Fawad
    Javaid, Nadeem
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [46] A hybrid malicious node detection approach based on fuzzy trust model and Bayesian belief in wireless sensor networks
    Shi, Wuchao
    [J]. International Journal of Wireless and Mobile Computing, 2024, 27 (01) : 56 - 63
  • [47] A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks
    Kalpana, Dingari
    Ajitha, P.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, : 2758 - 2780
  • [48] Malicious Link Detection in Multi-Hop Wireless Sensor Networks
    Liang, Yuan
    Liu, Yunhao
    Ren, Jian
    Li, Tongtong
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [49] Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks
    Vijayan, Nisha
    Johny, Alphonsa
    [J]. 1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016, 2016, 25 : 378 - 383
  • [50] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    [J]. COMPUTERS & SECURITY, 2022, 113