A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks

Wireless sensor networks are often used to monitor physical and environmental conditions in various regions where human access is limited. Due to limited resources and deployment in hostile environment, they are vulnerable to faults and malicious attacks. The sensor nodes affected or compromised can send erroneous data or misleading reports to base station. Hence identifying malicious and faulty nodes in an accurate and timely manner is important to provide reliable functioning of the networks. In this paper, we present a malicious and malfunctioning node detection scheme using dual-weighted trust evaluation in a hierarchical sensor network. Malicious nodes are effectively detected in the presence of natural faults and noise without sacrificing fault-free nodes. Simulation results show that the proposed scheme outperforms some existing schemes in terms of mis-detection rate and event detection accuracy, while maintaining comparable performance in malicious node detection rate and false alarm rate.

[1]  Miao Xie,et al.  Anomaly Detection in Wireless Sensor Networks , 2013 .

[2]  Ayman I. Kayssi,et al.  Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[3]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Yaqiong Liu,et al.  An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[5]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Peng Ning,et al.  LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  Muhammad Zahid Khan,et al.  FAULT MANAGEMENT IN WIRELESS SENSOR NETWORKS , 2013 .

[8]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[9]  Chiu-Kuo Liang,et al.  A Fault-Tolerant Event Boundary Detection Algorithm in Sensor Networks , 2007, ICOIN.

[10]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[11]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[12]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[13]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[14]  Daniel Curiac,et al.  Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).

[15]  Wan Jian,et al.  Tree Topology Based Fault Diagnosis in Wireless Sensor Networks , 2009, 2009 International Conference on Wireless Networks and Information Systems.

[16]  S. Sitharama Iyengar,et al.  Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks , 2004, IEEE Transactions on Computers.

[17]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[18]  Parameswaran Ramanathan,et al.  Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.

[19]  Yoon-Hwa Choi,et al.  Fault detection of wireless sensor networks , 2008, Comput. Commun..

[20]  Udo W. Pooch,et al.  Routing anomaly detection in mobile ad hoc networks , 2003, Proceedings. 12th International Conference on Computer Communications and Networks (IEEE Cat. No.03EX712).

[21]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .