Skip to main navigation Skip to search Skip to main content

Combined malicious node discovery and self-destruction technique for wireless sensor networks

  • Daniel Ioan Curiac
  • , Madalin Plastoi
  • , Ovidiu Banias
  • , Constantin Volosencu
  • , Roxana Tudoroiu
  • , Alexa Doboli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

17 Scopus citations

Abstract

With the continuous development of the wireless technology, securing wireless sensor networks became more and more a crucial but also a demanding task. In this paper we propose a combined strategy that is meant to discover malicious nodes within a wireless sensor network and to expel them from the network using a self-destruction node technique. Basically, we will compare every sensor reading with its estimated value provided by an autoregressive predictor. In case the difference between the two values is bigger then a chosen threshold, the sensor node becomes suspicious and a decision block is activated. If this block decides that the node is malicious, a self-destruction procedure will be started against that specific node.

Original languageEnglish
Title of host publicationProceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009
Pages436-441
Number of pages6
DOIs
StatePublished - 2009
Event2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009 - Athens, Glyfada, Greece
Duration: Jun 18 2009Jun 23 2009

Publication series

NameProceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009

Conference

Conference2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009
Country/TerritoryGreece
CityAthens, Glyfada
Period06/18/0906/23/09

Keywords

  • Information security
  • Malicious attacks
  • Self-destruction
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Combined malicious node discovery and self-destruction technique for wireless sensor networks'. Together they form a unique fingerprint.

Cite this