Malicious Node Detection in WSN Using WTE

Abstract

Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the networks operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malicious nodes, both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability. Shabnam Kumari | Sumit Dalal | Rashmi"Malicious Node Detection in WSN Using WTE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14611.pdf http://www.ijtsrd.com/computer-science/computer-network/14611/malicious-node-detection-in-wsn-using-wte/shabnam-kumari

Authors and Affiliations

Keywords

Related Articles

Linux Based Speaking Medication Reminder Project

Most of times patients may forget to take the medicines at proper time as per their prescription which may cause in late recovery from the disease/illness. In case of some specific diseases like diabetes, hypertension, a...

Linear Programming Problems with Icosikaipentagonal Fuzzy Number

The objective of this paper is to introduce a new fuzzy number with twenty five points called as Icosikaipentagonal fuzzy number. In which Fuzzy numbers develop a membership function where there are no limitations of any...

Capital Market Instruments in India - A Profile

In this paper entirely focused on the brand awareness of consumer purchasing decision while on the buying of the product. This study examines relation between brand awareness and consumer buying decision while before and...

Design of Fin for Various Variables

In this paper, the heat transfer of fin without and with various extensions such as rectangular extensions, triangular extensions and trapezium extension is analyzed by changing its material such as Aluminium alloy, Copp...

Poverty and Commercial Kidnapping in Post Amnesty Niger Delta

This study takes a look at the relationship between poverty and the ever increasing spate of commercial kidnapping in the post amnesty Niger Delta region. Kidnapping for ransom peaked in the region in 2006 with increased...

Download PDF file
  • EP ID EP362059
  • DOI -
  • Views 53
  • Downloads 0

How To Cite

(2018). Malicious Node Detection in WSN Using WTE. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362059