Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network

DOI: 10.4236/wsn.2013.53007   PDF   HTML     4,835 Downloads   8,286 Views   Citations


In this paper, we present a malicious node detection scheme using confidence-level evaluation in a grid-based wireless sensor network. The sensor field is divided into square grids, where sensor nodes in each grid form a cluster with a cluster head. Each cluster head maintains the confidence levels of its member nodes based on their readings and reflects them in decision-making. Two thresholds are used to distinguish between false alarms due to malicious nodes and events. In addition, the center of an event region is estimated, if necessary, to enhance the event and malicious node detection accuracy. Experimental results show that the scheme can achieve high malicious node detection accuracy without sacrificing normal sensor nodes.

Share and Cite:

M. Shin and Y. Choi, "Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network," Wireless Sensor Network, Vol. 5 No. 3, 2013, pp. 52-60. doi: 10.4236/wsn.2013.53007.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] [1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cyirci, “Wireless Sensor Networks: A Survey,” Computer Networks, Vol. 38, No. 4, 2002, pp. 393-422. doi:10.1016/S1389-1286(01)00302-4
[2] M. Yu, H. Mokhtar and M. Merabti, “Fault Management in Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 14, No. 6, 2007, pp. 13-19. doi:10.1109/MWC.2007.4407222
[3] H. Huangshui and Q. Guihe, “Fault Management Frameworks in Wireless Sensor Networks,” 4th International Conference on Intelligent Computation Technology and Automation, Shenzhen, 28-29 March 2011, pp. 1093-1096.
[4] S. Rajasegarar, C. Leckie and M. Palaniswami, “Anomaly Detection in Wireless Sensor Networks,” IEEE Wireless Communications, Vol. 15, No. 4, 2008, pp. 34-40. doi:10.1109/MWC.2008.4599219
[5] Y. Zhang, N. Meratnia and P. Havinga, “Outlier Detection Techniques for Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials, Vol. 12, No. 2, 2010. pp. 1-12.
[6] M. H. Lee and Y.-H. Choi, “Fault Detection of Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 14, 2008, pp. 3469-3475. doi:10.1016/j.comcom.2008.06.014
[7] X. Xu, B. Zhou and J. Wan, “Tree Topology Based Fault Diagnosis in Wireless Sensor Networks,” International Conference on Wireless Networks and Information Systems, Hangzhou, 28-29 December 2009, pp. 65-69.
[8] B. Krishnamachari and S. Iyengar, “Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 53, No. 3, 2004, pp. 241-250. doi:10.1109/TC.2004.1261832
[9] X. Luo, M. Dong and Y. Huang, “On Distributed Fault-Tolerant Detection in Wireless Sensor Networks,” IEEE Transactions on Computers, Vol. 55, No. 1, 2006, pp. 58-70. doi:10.1109/TC.2006.13
[10] M. Ding, D. Chen, K. Xing and X. Cheng, “Localized Fault-Tolerant Event Boundary Detection in Sensor Networks,” IEEE INFOCOM, Miami, 13-17 March 2005, pp. 902-913.
[11] K. Ren, K. Zeng and W. Lou, “Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks,” IEEE Transactions on Wireless Communications, Vol. 7, No. 1, 2008, pp. 354-363. doi:10.1109/TWC.2008.060550
[12] M. Bahrepour, N. Meratnia, M. Poel, Z. Taghikhaki and P. Havinga, “Distributed Event Detection in Wireless Sensor Networks for Disaster Management,” 2nd International Conference on Intelligent Networking and Collaborative Systems, Thessaloniki, 24-26 November 2010, pp. 507-512.
[13] C.-R. Li and C.-K. Liang, “A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks,” In-formation Networking: Towards Ubiquitous Networking and Services, Vol. 5200, 2008, pp. 406-414. doi:10.1007/978-3-540-89524-4_41
[14] D. I. Curiac, O. Banias, F. Dragan, C. Volosencu and O. Dranga, “Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique,” 3rd International Conference on Networking and Services, 19-25 June 2007. doi:10.1109/ICNS.2007.79
[15] W. Junior, T. Figueiredo, H. Wong and A. Loureiro, “Malicious Node Detection in Wireless Sensor Networks,” 18th International Parallel and Distributed Processing Symposium, Belo Horizonte, 26-30 April 2004, p. 24.
[16] X.-Y. Xiao, W.-C. Peng, C.-C. Hung, and W.-C. Lee, “Using Sensor Ranks for In-Network Detection of Faulty Readings in Wireless Sensor Networks,” International Workshop Data Engineering for Wireless and Mobile Access, June 2007.
[17] I. M. Atakli, H. Hu, Y. Chen, W.-S. Ku and Z. Su, “Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation,” Proceedings of Spring Simulation Multi-Conference, Ottawa, 14-17 April 2008, pp. 836-842.
[18] L. Ju, H. Li, Y. Liu, W. Xue, K. Li and Z. Chi, “An Improved Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks,” Proceedings of the 5th International Conference on Ubiquitous Information Technology and Applications, Sanya, 16-18 December 2010, pp. 1-6.
[19] M. Momani and S. Challa, “Survey of Trust Models in Different Network Domain,” International Journal Ad Hoc, Sensor & Ubiquitous Computing, Vol. 1, No. 3, 2010, pp. 1-19. doi:10.5121/ijasuc.2010.1301
[20] M. Momani, S. Challa and R. Alhmouz, “Can We Trust Trusted Nodes in Wireless Sensor Networks?” International Conference on Computer and Communication Engineering, Kuala Lumpur, 13-15 May 2008, pp. 1227-1232.
[21] Y. Li, S. Xiong, Q. Chen and F. Fang, “Grid-Based Directed Diffusion for Wireless Sensor Networks,” Second International Conference on Communications and Networking in China, Shanghai, 22-24 August, 2007, pp. 814-818.
[22] H. Yuan, H. Ma and H. Liao, “Coordination Mechanism in Wireless Sensor and Actor Networks,” First International Multi-Symposiums on Computer and Computational Sciences, Hanzhou, 20-24 June 2006, pp. 627-634.
[23] L. Yu, N. Wang, W. Zhang, and C. Zheng, “GROUP: A Grid-Clustering Routing Protocol for Wireless Sensor Networks,” International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, 22-24 September 2006, pp. 1-5. doi:10.1109/WiCOM.2006.287
[24] S. Chugh, S. Dharia and D. P. Agrawal, “An Energy Efficient Collaborative Framework for Event Notification in Wireless Sensor Networks,” 28th Annual IEEE International Conference on Local Computer Networks, Bonn, 20-24 October 2003, pp. 430-438.
[25] M. Asim, H. Mokhtar and M. Merabti, “A Cellular Approach to Fault Detection and Recovery in Wireless Sensor Networks,” Third International Conference on Sensor Technologies and Applications, Athens, 18-23 June 2009, pp. 352-357. doi:10.1109/SENSORCOMM.2009.61
[26] C.-W. Cho and Y.-H Choi, “Concurrent Diagnosis of Clustered Sensor Networks,” LNCS, Vol. 3976, 2006, pp. 1267-1272.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.