Distributed Malicious Nodes Detection in Wireless Sensor Networks

Article Preview

Abstract:

Data theft and node attack in wireless sensor networks causes great damage to the networks and the attacker destroys network and obtains the data of the network by malicious nodes distributed in the network. Therefore, it is necessary to detect these malicious nodes and to eliminate their influence. We propose a distributed malicious nodes detection protocol which called BMND based on Bayesian voting, every node determine its suspected malicious nodes by its request message and abnormal behavior. Also, we determine the malicious nodes by Bayesian voting, so that the network can protect itself from such malicious nodes influence. The simulation results show that our algorithm has good performance in both the detection rate and false positive rate.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1243-1246

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Aimin Wang, Dailiang Yang, Dayang Sun. A clustering algorithm based on energy information and cluster headsexpectation for wireless sensor networks. Computers and Electrical Engineering. (2011).

Google Scholar

[2] Sudip Misra , Manikonda Pavan Kumar, Mohammad S. Obaidat. Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks. Computer Communications. 34 (2011) 1484–1496.

DOI: 10.1016/j.comcom.2010.03.002

Google Scholar

[3] Shun-Sheng Wang, Kuo-Qin Yan, Shu-Ching Wang, Chia-Wei Liu. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks. Expert Systems with Applications 38 (2011) 15234–15243.

DOI: 10.1016/j.eswa.2011.05.076

Google Scholar

[4] Mukesh Jagasia and Dijiang Huang. Distributed Data-theft Detection in Wireless Sensor Networks. IEEE. (2009).

DOI: 10.1109/glocom.2009.5425855

Google Scholar