Localized Identification of Malicious Nodes in Wireless Sensor Networks

被引:0
|
作者
Akram, Vahid Khalilpour [1 ]
Erten, Yusuf Murat [1 ]
机构
[1] Izmir Bakircay Univ, Dept Comp Engn, Izmir, Turkey
关键词
Wireless Sensor Network; Malicious Nodes; Distributed Algorithms; Cryptology; CONNECTIVITY DETECTION ALGORITHM;
D O I
10.1109/siu49456.2020.9302076
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a wireless sensor network against the various attacks with minimal energy consumption is a challenging task because the nodes usually have limited energy source, are distributed in harsh environments and communicate over standard radio channels. Adding malicious nodes to an existing wireless sensor network is one of the common types of attacks. The malicious nodes can reduce the reliability of a network by flooding heavy traffic, sending fake data or counterfeiting the paths. This study proposes a new localized algorithm for identifying the malicious nodes in WSNs where the existing verified nodes detect the malicious nodes using neighborhood information and signature of messages. The testbed experiments and simulation results show that the proposed algorithm is a feasible and efficient approach for detecting the malicious nodes.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [2] Study on Automatic Positioning of Malicious Mobile Nodes in Wireless Sensor Networks
    Zheng Wen-Kui
    Liu Kun
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY (FMSMT 2017), 2017, 130 : 1495 - 1499
  • [3] Identifying malicious nodes in wireless sensor networks based on correlation detection
    Lai, Yingxu
    Tong, Liyao
    Liu, Jing
    Wang, Yipeng
    Tang, Tong
    Zhao, Zijian
    Qin, Hua
    COMPUTERS & SECURITY, 2022, 113
  • [4] CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks
    Prathap, U.
    Shenoy, Deepa P.
    Venugopal, K. R.
    2016 IEEE REGION 10 SYMPOSIUM (TENSYMP), 2016, : 77 - 82
  • [5] A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks
    Reddy, Yenumula B.
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 462 - 468
  • [6] Convolutional technique for enhancing security in wireless sensor networks against malicious nodes
    Alghamdi, Turki Ali
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
  • [7] Two Step Verification technique For Detection of Malicious Nodes in Wireless Sensor Networks
    Kumar, Mandeep
    Ali, Jahid
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (01): : 444 - 468
  • [8] Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
    Liu, DG
    Ning, P
    Du, WL
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, : 609 - 619
  • [9] Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks
    Zhang, Zhiming
    Yang, Yu
    Yang, Wei
    Wu, Fuying
    Li, Ping
    Xiong, Xiaoyong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [10] A double-layer isolation mechanism for malicious nodes in wireless sensor networks
    Zhongmin Wang
    Qing Zhang
    Cong Gao
    Wireless Networks, 2021, 27 : 2391 - 2407