Malicious Node Detection in WSN Using WTE

Abstract

Since WSNs are used in mission-critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the networks operator (Byzantine attack). It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malicious nodes, both the malicious sensor nodes and the malicious cluster heads (forwarding nodes) in WSNs at a reasonable detection rate and short response time whilst achieving good scalability. Shabnam Kumari | Sumit Dalal | Rashmi"Malicious Node Detection in WSN Using WTE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: http://www.ijtsrd.com/papers/ijtsrd14611.pdf http://www.ijtsrd.com/computer-science/computer-network/14611/malicious-node-detection-in-wsn-using-wte/shabnam-kumari

Authors and Affiliations

Keywords

Related Articles

Significances of Mirror Box Therapy in Phantom Limb Pain and Stroke Rehabilitation A Perspective Review

The mirror box technique was developed by neuroscientist Mr. Vilayanur. S. Ramachandran, who obtained an M.B.B.S from Stanley Medical College in Madras and subsequently obtained a Ph.D. from Trinity College at the Univer...

Design and Construction of Line Following Robot using Arduino

Line following robot is an autonomous vehicle which detect black line to move over the white surface or bright surface. In this paper, the line following robot is constructed by using Arduino nano microcontroller as a ma...

Statistical Methods: Quantitative Techniques in Business and Industry

The researcher has done the research on Statistical Methods-Quantitative Techniques in Business and Industry.Statistical methods means analyzing, collecting and overall summarization and interpretation of numerical data....

Design and Performance Analysis of 400Hz Static Frequency Converter

Nowadays solid state technology, engine driven generators, as an aircraft power system, supply 400Hz elecctrical loads for more efficient and effectiveness. The system produces stable and constant 400Hz from variable inp...

Hepato Protective Assessment of Pawpaw Leaves, Neem, Lemon Grass and Acts on Plasmodium Berghei Parasitized Wistar Rats

Malaria is a major concern in Nigeria, and stands as the second leading cause of death from all infectious disease in Africa. Several studies have reported the damaging effect of the parasite to various body organs espec...

Download PDF file
  • EP ID EP362059
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

(2018). Malicious Node Detection in WSN Using WTE. International Journal of Trend in Scientific Research and Development, 2(4), -. https://europub.co.uk/articles/-A-362059