Open Access
Subscription Access
Open Access
Subscription Access
Detection of Malicious Nodes in Wireless Sensor Network
Subscribe/Renew Journal
Wireless Sensor Network (WSN) can be used as an important concept to reduce the redundancy and energy consumption. To optimize the wireless sensor networks for secured data transmission both at cluster head and base station, data aggregation is needed. The existence time of sensor network diminishes due to energy inefficient nodes for data aggregation. Henceforth aggregation process in WSN ought to be advanced in energy efficient way. Data aggregation is performed in every router while forwarding data. It is difficult to identify and isolate the compromised nodes so as to abstain from being deceived by the distorted data infused by the enemy through compromised nodes. In any case, it is trying to secure the flat topology network effectively in light of the poor adaptability and high communication overhead. We discuss a mechanism that distinguishes malicious nodes by the collaboration of appropriate nodes and logically isolates the recognized, malicious nodes from remote sensor systems. Also this paper describes about the attacks and security goals in the WSN.
Keywords
Wireless Sensor Network, Data Aggregation, Malicious Node, Security Goals.
Subscription
Login to verify subscription
User
Font Size
Information
- Eiji Nii, Takamasa Kitanouma, Naotoshi Adachi and Yasuhisa Takizawa, “Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment”, Proceedings of 7th Asia Pacific IEEE Conference on Microwave, pp. 1-8, 2017.
- V. Porkodi, A.S. Mohammed, V. Manikandan, “Retransmission DBTMA Protocol with Fast Retransmission Strategy to Improve the Performance of MANETs”, IEEE Access, Vol. 7, pp. 85098-85109, 2019.
- P. Padmaja and G.V. Marutheswar, “Detection of Malicious Node in Wireless Sensor Network”, Proceedings of IEEE 7th International Conference on Advance Computing, pp. 1-7, 2017.
- A.S. Mohammed and V. Porkodi, “Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets”, CMC Techscience Journal, Vol. 6, No. 2, pp. 435-454, 2019.
- C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Proceedings of 2nd International Conference on Embedded Networked Sensor Systems, pp. 1-5, 2004.
- S. Roy, M. Conti, S. Setia and S. Jajoida, “Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact”, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 4, pp. 681-694, 2014.
- W.R. Pires, T.H. De Figueiredo, H.C. Wong and A.A.F. Lourerio, “Malicious node detection in wireless sensor networks”, Proceedings of IEEE 18th International Symposium on Parallel and Distributed Processing, pp. 26-30, 2004.
- B. Rajasekaran and C. Arun, “Detection of Malicious Nodes in Wireless Sensor Networks based on Features using Neural Network Computing Approach”, International Journal of Recent Technology and Engineering, Vol. 7, No. 4, pp. 188-192, 2018.
- H. Yang and F. Cheng, “A Novel Wireless Sensor Networks Malicious Node Detection Method”, Proceedings of International Conference on Security and Privacy in New Computing Environments, pp. 697-706, 2019.
- J. Lopez, R. Roman, I. Agudo and C. Fernandez-Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices”, Computer Communications, Vol. 33, No. 9, pp. 1086-1093, 2010.
Abstract Views: 225
PDF Views: 0