2009
DOI: 10.1504/ijics.2009.028810
|View full text |Cite
|
Sign up to set email alerts
|

Weighted trust evaluation-based malicious node detection for wireless sensor networks

Abstract: Deployed in a hostile environment, the individual Sensor Node (SN) of a Wireless Sensor Network (WSN) could be easily compromised by an adversary due to constraints such as limited memory space and computing capability. Therefore, it is critical to detect and isolate compromised nodes in order to avoid being misled by the falsified information injected by adversaries through compromised nodes. However, it is challenging to secure the flat topology networks effectively because of the poor scalability and high c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…Existing work was mostly based on anomaly detection [15] techniques to discover deviations from expected behaviors, including rule-based [16,17], weighted summation [18], data clustering [19], and Support Vector Machine (SVM) [20]. In rule-based anomaly detection [16,17], typically rules based on QoS metrics are being setup to detect suspected attack behaviors, e.g., if a SN does not forward a packet within a time limit, if a SN forwards the same packet multiple times without suppression, or if a packet is received directly from a non-neighbor SN or from a neighbor SN who is not supposed to send a packet during a particular time interval, then the SN in question is suspected of maliciousness.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Existing work was mostly based on anomaly detection [15] techniques to discover deviations from expected behaviors, including rule-based [16,17], weighted summation [18], data clustering [19], and Support Vector Machine (SVM) [20]. In rule-based anomaly detection [16,17], typically rules based on QoS metrics are being setup to detect suspected attack behaviors, e.g., if a SN does not forward a packet within a time limit, if a SN forwards the same packet multiple times without suppression, or if a packet is received directly from a non-neighbor SN or from a neighbor SN who is not supposed to send a packet during a particular time interval, then the SN in question is suspected of maliciousness.…”
Section: Related Workmentioning
confidence: 99%
“…The main drawback of rule-based anomaly detection is that it cannot cope with anomalies not covered by rules, thus leading to high false negatives when unknown anomalies appear. In the weighted summation approach [18], each SN has a weight associated with it representing the trustworthiness of its sensor reading output. The system periodically calculates the average sensor reading output by taking a weighted summation out of all sensor reading outputs.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations