Skip to main navigation Skip to search Skip to main content

Malicious node detection in wireless sensor networks using weighted trust evaluation

  • Idris M. Atakli
  • , Hongbing Hu
  • , Yu Chen
  • , Wei Shinn Ku
  • , Zhou Su
  • State University of New York Binghamton University
  • Auburn University
  • Waseda University

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

135 Scopus citations

Abstract

Deployed in a hostile environment, individual nodes of a wireless sensor network (WSN) could be easily compromised by the adversary due to the constraints such as limited battery lifetime, memory space and computing capability. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. However, it is challenging to secure the flat topology networks efficiently because of the poor scalability and high communication overhead. On top of a hierarchical WSN architecture, in this paper we proposed a novel scheme based on weighted-trust evaluation to detect malicious nodes. The hierarchical network can reduce the communication overhead between sensor nodes by utilizing clustered topology. Through intensive simulation, we verified the correctness and efficiency of our detection scheme.

Original languageEnglish
Title of host publicationProceedings of the 2008 Spring Simulation Multiconference, SpringSim'08
Pages836-843
Number of pages8
DOIs
StatePublished - 2008
Event2008 Spring Simulation Multiconference, SpringSim'08 - Ottawa, ON, Canada
Duration: Apr 14 2008Apr 17 2008

Publication series

NameProceedings of the 2008 Spring Simulation Multiconference, SpringSim'08

Conference

Conference2008 Spring Simulation Multiconference, SpringSim'08
Country/TerritoryCanada
CityOttawa, ON
Period04/14/0804/17/08

Keywords

  • Hierarchical topology
  • Malicious node detection
  • Network security
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Malicious node detection in wireless sensor networks using weighted trust evaluation'. Together they form a unique fingerprint.

Cite this