2016 IEEE Region 10 Symposium (TENSYMP) 2016
DOI: 10.1109/tenconspring.2016.7519381
|View full text |Cite
|
Sign up to set email alerts
|

CMNTS: Catching malicious nodes with trust support in wireless sensor networks

Abstract: Abstract-Security in wireless sensor networks is critical due to its way of open communication. In this paper we have considered suite of attacks -packet modification, packet dropping, sybil attack, packet misrouting, and bad mouthing attack, and provided a solution to detect attacks. In literature, many schemes have been proposed to mitigate such attacks but very few detect the malicious nodes effectively and also no single solution detects all attacks. In the proposed approach, each node chooses the parent n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…In [11], the trust support schema is found to identify malicious nodes with high detection rates and low incidence of false detection. However, it focuses on specific attacks related to the packet only; many other types of attacks have not been considered for this solution.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11], the trust support schema is found to identify malicious nodes with high detection rates and low incidence of false detection. However, it focuses on specific attacks related to the packet only; many other types of attacks have not been considered for this solution.…”
Section: Discussionmentioning
confidence: 99%
“…In [11], a solution is proposed for catching malicious nodes with trust support in WSNs (CMNTS); this targets specific WSN attacks by malicious node, including packet modification, packet dropping, Sybil Attack, packet misrouting and bad-mouthing attack. CMNTS initiates the process by creating a parent-child tree contains related information in a sink node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Confidentiality ensures that information should never flow in a clear way between nodes, especially in critical applications such as military and healthcare. The data will be encrypted and, therefore, not interpretable and understandable by eavesdroppers [8]. Then, authentication protects the network against identity theft attacks by verifying the identity claimed by a node.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, Trust Support-based Malicious Node Determination Scheme (TS-MNDS) was proposed mainly for detecting and also for preventing malicious selfish nodes in the sensor network (Prathap et al 2016). In this TS-MNDS, the data dissemination between each sensor node and the sink is always facilitated with selection of parent node.…”
Section: Related Workmentioning
confidence: 99%