Malicious Node Detection in Wireless Sensor Networks

被引:8
作者
Atassi, Alaa [1 ]
Sayegh, Naoum [1 ]
Elhajj, Imad [1 ]
Chehab, Ali [1 ]
Kayssi, Ayman [1 ]
机构
[1] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut, Lebanon
来源
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2013年
关键词
Wireless sensor networks; malicious nodes; RSSI;
D O I
10.1109/WAINA.2013.135
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The nature of many applications using wireless sensor networks (WSNs) necessitates the use of security mechanisms. One of the main issues in WSN are malicious nodes spoofing their identity and location. In this paper we propose a decentralized malicious node detection technique based on the Received Signal Strength Indicator (RSSI). The method is probabilistic, taking into account shadowing and fading effects. An empirical pathloss model is generated at each node during the discovery phase. In addition, the developed technique is able to localize the detected node within a small area. Simulation results highlight the high detection rate of the method under varying conditions.
引用
收藏
页码:456 / 461
页数:6
相关论文
共 13 条
  • [1] Aslan Y., 2008, CS514 BILK U
  • [2] Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836
  • [3] Chen Y., 2007, SENSOR MESH AD HOC C
  • [4] Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
    Jadliwala, Murtuza
    Zhong, Sheng
    Upadhyaya, Shambhu
    Qiao, Chunming
    Hubaux, Jean-Pierre
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (06) : 810 - 823
  • [5] Juinor W.R.P., 2004, P 18 INT PAR DISTR P
  • [6] Kifayat K, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P511
  • [7] Kosmerchock S., Wireless sensor network topologies
  • [8] Li Z., 2008, P CACR
  • [9] Misra S., 2010, P IEEE ACM INT C GRE
  • [10] Saraogi M., 2005, TECHNICAL REPORT