scholarly journals System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

2016 ◽  
Vol 2016 ◽  
pp. 1-20 ◽  
Author(s):  
Kresimir Grgic ◽  
Drago Zagar ◽  
Visnja Krizanovic Cik

The trend of implementing the IPv6 into wireless sensor networks (WSNs) has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


Author(s):  
Asfandyar Khan ◽  
Azween Abdullah ◽  
Nurul Hasan

Wireless sensor networks (WSANs) are increasingly being used and deployed to monitor the surrounding physical environments and detect events of interest. In wireless sensor networks, energy is one of the primary issues and requires the conservation of energy of the sensor nodes, so that network lifetime can be maximized. It is not recommended as a way to transmit or store all data of the sensor nodes for analysis to the end user. The purpose of this “Event Based Detection” Model is to simulate the results in terms of energy savings during field activities like a fire detection system in a remote area or habitat monitoring, and it is also used in security concerned issues. The model is designed to detect events (when occurring) of significant changes and save the data for further processing and transmission. In this way, the amount of transmitted data is reduced, and the network lifetime is increased. The main goal of this model is to meet the needs of critical condition monitoring applications and increase the network lifetime by saving more energy. This is useful where the size of the network increases. Matlab software is used for simulation.


Author(s):  
Turki Ali Alghamdi

Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.


Sign in / Sign up

Export Citation Format

Share Document