TY - GEN
T1 - Malicious node detection in wireless sensor networks using weighted trust evaluation
AU - Atakli, Idris M.
AU - Hu, Hongbing
AU - Chen, Yu
AU - Ku, Wei Shinn
AU - Su, Zhou
PY - 2008
Y1 - 2008
N2 - Deployed in a hostile environment, individual nodes of a wireless sensor network (WSN) could be easily compromised by the adversary due to the constraints such as limited battery lifetime, memory space and computing capability. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. However, it is challenging to secure the flat topology networks efficiently because of the poor scalability and high communication overhead. On top of a hierarchical WSN architecture, in this paper we proposed a novel scheme based on weighted-trust evaluation to detect malicious nodes. The hierarchical network can reduce the communication overhead between sensor nodes by utilizing clustered topology. Through intensive simulation, we verified the correctness and efficiency of our detection scheme.
AB - Deployed in a hostile environment, individual nodes of a wireless sensor network (WSN) could be easily compromised by the adversary due to the constraints such as limited battery lifetime, memory space and computing capability. It is critical to detect and isolate the compromised nodes in order to avoid being misled by the falsified information injected by the adversary through compromised nodes. However, it is challenging to secure the flat topology networks efficiently because of the poor scalability and high communication overhead. On top of a hierarchical WSN architecture, in this paper we proposed a novel scheme based on weighted-trust evaluation to detect malicious nodes. The hierarchical network can reduce the communication overhead between sensor nodes by utilizing clustered topology. Through intensive simulation, we verified the correctness and efficiency of our detection scheme.
KW - Hierarchical topology
KW - Malicious node detection
KW - Network security
KW - Wireless sensor networks
UR - https://www.scopus.com/pages/publications/70249102120
U2 - 10.1145/1400549.1400686
DO - 10.1145/1400549.1400686
M3 - Conference contribution
SN - 1565553195
SN - 9781565553194
T3 - Proceedings of the 2008 Spring Simulation Multiconference, SpringSim'08
SP - 836
EP - 843
BT - Proceedings of the 2008 Spring Simulation Multiconference, SpringSim'08
T2 - 2008 Spring Simulation Multiconference, SpringSim'08
Y2 - 14 April 2008 through 17 April 2008
ER -