2022
DOI: 10.1016/j.cose.2021.102540
|View full text |Cite
|
Sign up to set email alerts
|

Identifying malicious nodes in wireless sensor networks based on correlation detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…Islam et al [ 23 ] utilized distributed algorithms based on spatiotemporal correlation to detect data anomalies in large-scale intelligent transportation systems. Lai et al [ 24 ] suggested a distributed approach to detecting FDIAs in WSNs using temporal, spatial, and event-based correlation. In this paper, our framework is based on a distributed approach, where detection methods can be executed at separate edge devices to reduce the network pressure associated with processing data generated by large-scale sensors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Islam et al [ 23 ] utilized distributed algorithms based on spatiotemporal correlation to detect data anomalies in large-scale intelligent transportation systems. Lai et al [ 24 ] suggested a distributed approach to detecting FDIAs in WSNs using temporal, spatial, and event-based correlation. In this paper, our framework is based on a distributed approach, where detection methods can be executed at separate edge devices to reduce the network pressure associated with processing data generated by large-scale sensors.…”
Section: Related Workmentioning
confidence: 99%
“…An adversary may employ stealthy attacks, such as constructing coherent attack signals. Most of the works [ 17 , 18 , 19 , 20 , 22 , 23 , 24 ] mentioned based on sensor measurements themselves are effective in detecting simple FDIAs, but not stealthy ones. For instance, in [ 22 ], based on the spatiotemporal correlation of sensor data, the authors used exponential weighted moving average and principal component analysis to establish a rotated ellipse area for each pair of sensors in a correlation group and detected FDIAs by determining whether the current sensor readings for each pair of sensors were located within the corresponding area of the rotated ellipse.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [30] suggested a method using temporal, spatial, and event-based correlations to prevent FDIAs in WSNs.…”
Section: Fdias Detection Of Wsnsmentioning
confidence: 99%
“…The nodes' mobility is primarily to blame for this. These networks' nodes share a single random-access wireless channel and cooperate amicably to engage in multi hop forwarding [2]. In addition to serving as hosts, network nodes also function as routers, sending and receiving data to and from other nodes.…”
Section: Introductionmentioning
confidence: 99%