A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks

Abstract

Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate.

Share and Cite:

S. Hyun Oh, C. O. Hong and Y. Hwa Choi, "A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks," Wireless Sensor Network, Vol. 4 No. 3, 2012, pp. 84-90. doi: 10.4236/wsn.2012.43012.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] S. Rajasegarar, C. Leckie and M. Palaniswami, “Anomaly Detection in Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 15, No. 4, 2008, pp. 34-40. doi:10.1109/MWC.2008.4599219
[2] M. Yu, H. Mokhtar and M. Merabti, “Fault Management in Wireless Sensor Networks,” IEEE Wireless Sensor Networking, Vol. 14, No. 6, 2007, pp. 13-19.
[3] B. Krishnamachari and S. Iyengar, “Bayesian Algorithms for Fault-tolerant Event Region Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 53, No. 3, 2004, pp. 245-250. doi:10.1109/TC.2004.1261832
[4] T. Clouqueur, K. K. Saluja and P. Ramanathan, “Fault Tolerance in Collaborative Sensor Networks for Target Detection,” IEEE Transactions on Computers, Vol. 53, No. 3, 2004, pp. 320-333. doi:10.1109/TC.2004.1261838
[5] M. Ding, D. Chen, K. Xing and X. Cheng, “Localized Fault-Tolerant Event Boundary Detection in Sensor Networks,” 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, 13-17 March 2005, pp. 902-913.
[6] X. Luo, M. Dong and Y. Huang, “On Distributed Fault- Tolerant Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 55 No. 1, 2006, pp. 58- 70. doi:10.1109/TC.2006.13
[7] C.-R. Li and C.-K. Liang, “A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks,” In- formation Networking: Towards Ubiquitous Networking and Services, Vol. 5200, 2008, pp. 406-414.
[8] X. Xu, B. Zhou and J. Wan, “Tree Topology Based Fault Diagnosis in Wireless Sensor Networks,” International Conference on Wireless Networks and Information Systems, Shanghai, 28-29 December 2009, pp. 65-69.
[9] M. H. Lee and Y.-H. Choi, “Fault Detection of Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 14, 2008, pp. 3469-3475. doi:10.1016/j.comcom.2008.06.014
[10] Y. Wang, G. Attebury and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communications Surveys, Vol. 8, No. 2, 2006, pp. 2-23. doi:10.1109/COMST.2006.315852
[11] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attack and Countermeasures,” Journal of Ad Hoc Networks, Vol. 1, No. 2-3, 2003, pp. 293-315.
[12] J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis and Defense,” Third International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004, pp. 259-268.
[13] Y. Hu, A. Perrig and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, San Francisco, 30 March-3 April 2003, pp. 1976-1986.
[14] B. Sun, K. Wu and U. Pooch, “Secure Routing against Black-Hole Attack in Mobile Ad Hoc Networks,” International Conference on Communications and Computer Networks, Cambridge, 4-6 November 2002.
[15] W. Du, L. Fang and P. Ning, “LAD: Localization Anomaly Detection for Wireless Sensor Networks,” 19th International Parallel and Distributed Processing Symposium, Denver, 4-8 April 2005, p. 41.
[16] D. I. Curiac, O. Banias, F. Dragan, C. Volosencu and O. Dranga, “Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique,” 3rd International Conference on Networking and Services, Athens, 19-25 June 2007, p. 83.
[17] W. Junior, T. Figueiredo, H. Wong and A. Loureiro, “Malicious Node Detection in Wireless Sensor Networks,” 18th International Parallel and Distributed Processing Sym- posium, Santa Fe, 26-30 April 2004, p. 24.
[18] M. Momani and S. Challa, “Survey of Trust Models in Different Network Domain,” Interna-tional Journal Ad Hoc, Sensor & Ubiquitous Computing, 2010.
[19] I. M. Atakli, H. Hu, Y. Chen, W.-S. Ku and Z. Su, “Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation,” Proceedings of Spring Simulation Multiconference, Ottawa, 14-17 April 2008, pp. 836-843.
[20] L. Ju, H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, “An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks,” Proceedings of the 5th International Conference on Ubiquitous Information Technology and Applications (CUTE), Sanya, 16-18 December 2010, pp. 1-6.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.