Localized Identification of Malicious Nodes in Wireless Sensor Networks

被引:0
|
作者
Akram, Vahid Khalilpour [1 ]
Erten, Yusuf Murat [1 ]
机构
[1] Izmir Bakircay Univ, Dept Comp Engn, Izmir, Turkey
关键词
Wireless Sensor Network; Malicious Nodes; Distributed Algorithms; Cryptology; CONNECTIVITY DETECTION ALGORITHM;
D O I
10.1109/siu49456.2020.9302076
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Securing a wireless sensor network against the various attacks with minimal energy consumption is a challenging task because the nodes usually have limited energy source, are distributed in harsh environments and communicate over standard radio channels. Adding malicious nodes to an existing wireless sensor network is one of the common types of attacks. The malicious nodes can reduce the reliability of a network by flooding heavy traffic, sending fake data or counterfeiting the paths. This study proposes a new localized algorithm for identifying the malicious nodes in WSNs where the existing verified nodes detect the malicious nodes using neighborhood information and signature of messages. The testbed experiments and simulation results show that the proposed algorithm is a feasible and efficient approach for detecting the malicious nodes.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] A Novel Trust Based Routing Protocol to prevent the Malicious Nodes in Wireless Sensor Networks.
    Priayoheswari, B.
    Kulothungan, K.
    Kannan, A.
    2017 SECOND INTERNATIONAL CONFERENCE ON RECENT TRENDS AND CHALLENGES IN COMPUTATIONAL MODELS (ICRTCCM), 2017, : 111 - 115
  • [22] Efficient localization schemes in sensor networks with malicious nodes
    Xiong, Kaiqi
    Thuente, David
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 190 - 196
  • [23] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [24] Identification of Most Important Nodes in Wireless Sensor Networks Using Centralities
    Kallakunta, Suneela
    Sreenivas, Alluri
    IMPENDING INQUISITIONS IN HUMANITIES AND SCIENCES, ICIIHS-2022, 2024, : 295 - 299
  • [25] Self-identification of boundary's nodes in wireless sensor networks
    Moustafa K.E.
    Hafid H.
    Moustafa, Kouider Elouahed (moustafakouider@gmail.com), 2017, Korea Information Processing Society (13): : 128 - 140
  • [26] Detecting and isolating malicious nodes in wireless ad hoc networks
    Li, Fanzhi
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING FOR MILITARY AND SECURITY APPLICATIONS 2007, 2007, 6579
  • [27] Techniques to Identify and Eliminate Malicious Nodes in Cooperative Wireless Networks
    Gopal, R.
    Parthasarathy, V.
    Mani, A.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [28] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
  • [29] SENSOR NODES IN WIRELESS BODY NETWORKS
    Benevicius, Vincas
    Ostasevicius, Vytautas
    Rimsa, Gintaras
    INFORMATION TECHNOLOGIES' 2009, 2009, : 125 - +
  • [30] Super Nodes For wireless Sensor Networks
    Abusaimeh, Hesham
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2014, : 90 - 95