Malicious Node Detection in WSN Using WTE

Abstract

Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the networks operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malicious nodes, both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability. Shabnam Kumari | Sumit Dalal | Rashmi"Malicious Node Detection in WSN Using WTE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14611.pdf http://www.ijtsrd.com/computer-science/computer-network/14611/malicious-node-detection-in-wsn-using-wte/shabnam-kumari

Authors and Affiliations

Keywords

Related Articles

Marketing Research in Project Ukrainian Studies Platform Demobilized Soldiers of the Ato Area - The Educational Action Plan A Step to Entrepreneurship

Marketing research is the solution to any marketing problem advertising effectiveness research, pricing strategy research, etc. . The purpose of these studies is to identify qualitative changes. The key to marketing rese...

Status Analysis of Kasturba Gandhi Balika Vidayala KGBV in Ganjam District

India is one of the largest democratic country in the world. It has a systematic education system which has a huge demand. But after 67 years of independence of India we are away from the goal of universal literacy. Till...

Missing Item Prediction and Its Recommendation Based on Users Approach in Ecommerce

The Internet is one of the fastest growing areas of intelligence gathering. Due to the tremendous amount of data on internet, web data mining has become very necessary. Predicting the missing items form dataset is indefi...

Performance Evaluation of Power Tiller and its Attachments for Mechanizing Rice Cultivation in Eastern Uttar Pradesh

Many lessons have been learned since agricultural mechanization was first introduced and adopted across many regions. Eastern UP can apply and learn from the drawbacks and achievements in other countries in its efforts t...

Road Accident Study on Some Areas in Yangon

Nowadays, road crashes become a growing worldwide problem and result in around 1 million deaths now occurs in developing countries. Huge economic losses are now being incurred annually in the ASEAN countries as a direct...

Download PDF file
  • EP ID EP362059
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

(2018). Malicious Node Detection in WSN Using WTE. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362059