Skip to main content
Top
Published in: Mobile Networks and Applications 4/2021

06-01-2020

A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks

Authors: Hongyu Yang, Xugao Zhang, Fang Cheng

Published in: Mobile Networks and Applications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node detection methods in Wireless Sensor Networks, this paper proposed a malicious node detection model based on reputation with enhanced low energy adaptive clustering hierarchy (Enhanced LEACH) routing protocol (MNDREL). MNDREL is a novel algorithm, which is aimed at identifying malicious nodes in the wireless sensor network (WSN) more efficiently. Cluster-head nodes are first selected based on the enhanced LEACH routing protocol. Other nodes in WSN then form different clusters by selecting corresponding cluster-head nodes and determine the packets delivery paths. Each node then adds its node number and reputation evaluation value to the packet before sending it to the sink node. A list of suspicious nodes is then formed by comparing the node numbers, obtained through parsing with the packets by the sink node, with the source node numbers. To determine the malicious nodes in the network, the ratio of the suspect value to the trusted value of each node is further calculated and compared with a predefined threshold. The algorithm proposed in this paper, with other two state-of-the-art methods, which are the fuzzy logic based multi-attribute trust model (FMATM) and the high-reliability trust evaluation model (HRTM), are performed and analysed in the same scenario. According to simulation experiments, the MNDREL model is more efficient in detecting malicious nodes in WSN with lower false alarm rate.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Fahmy HMA (2016) Wireless sensor networks: concepts, applications, experimentation and analysis 1st ed. Springer Publishing Company, Incorporated, BerlinCrossRef Fahmy HMA (2016) Wireless sensor networks: concepts, applications, experimentation and analysis 1st ed. Springer Publishing Company, Incorporated, BerlinCrossRef
3.
go back to reference Zhang YQ (2013) The study on security problems of wireless sensor networks. Shandong People’s Publishing House, Jinan Zhang YQ (2013) The study on security problems of wireless sensor networks. Shandong People’s Publishing House, Jinan
4.
go back to reference Belhajem I, Maissa YB, Tamtaoui A (2018) Improving vehicle localization in a Smart City with low cost sensor networks and support vector machines. Mobile Netw Appl 23(4):854–863CrossRef Belhajem I, Maissa YB, Tamtaoui A (2018) Improving vehicle localization in a Smart City with low cost sensor networks and support vector machines. Mobile Netw Appl 23(4):854–863CrossRef
5.
go back to reference Mukherjee N, Neogy S, Roy S (2016) Building wireless sensor networks: theoretical and practical perspectives. IEEE Wirel Commun 23(2):4–5CrossRef Mukherjee N, Neogy S, Roy S (2016) Building wireless sensor networks: theoretical and practical perspectives. IEEE Wirel Commun 23(2):4–5CrossRef
6.
go back to reference Ahmed A, Abubakar K, Channa M, Haseeb K, Khan A (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comput Sci J 9(2):280–296MathSciNetCrossRef Ahmed A, Abubakar K, Channa M, Haseeb K, Khan A (2015) A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Front Comput Sci J 9(2):280–296MathSciNetCrossRef
7.
go back to reference Prathap U, Shenoy PD, Venugopal KR (2016) CMNTS: catching malicious nodes with trust support in wireless sensor networks. In: 2016 IEEE region 10 symposium (TENSYMP). IEEE, pp 77-82 Prathap U, Shenoy PD, Venugopal KR (2016) CMNTS: catching malicious nodes with trust support in wireless sensor networks. In: 2016 IEEE region 10 symposium (TENSYMP). IEEE, pp 77-82
8.
go back to reference Althunibat S, Antonopoulos A, Kartsakli E et al (2016) Countering intelligent-dependent malicious nodes in target detection wireless sensor networks. IEEE Sensors J 16(23):8627–8639 Althunibat S, Antonopoulos A, Kartsakli E et al (2016) Countering intelligent-dependent malicious nodes in target detection wireless sensor networks. IEEE Sensors J 16(23):8627–8639
9.
go back to reference Cui H, PAN J, Yan DD (2013) Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks. J China Jiliang Univ 24(4):353–359 Cui H, PAN J, Yan DD (2013) Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks. J China Jiliang Univ 24(4):353–359
10.
go back to reference Singh SS, Jinila YB (2016) Sensor node failure detection using check point recovery algorithm. In: 2016 international Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp 1-4 Singh SS, Jinila YB (2016) Sensor node failure detection using check point recovery algorithm. In: 2016 international Conference on Recent Trends in Information Technology (ICRTIT). IEEE, pp 1-4
11.
go back to reference Varshney KK, Samundiswary P (2014) Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network. In: International Conference on Information Communication and Embedded Systems (ICICES2014). IEEE, pp 1-5 Varshney KK, Samundiswary P (2014) Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network. In: International Conference on Information Communication and Embedded Systems (ICICES2014). IEEE, pp 1-5
12.
go back to reference Liu HB, Cui JM, Dai HJ (2011) Multivariate classification-based malicious node detection for wireless sensor network. Chin J Sens and Actuators 24(5):771–777 Liu HB, Cui JM, Dai HJ (2011) Multivariate classification-based malicious node detection for wireless sensor network. Chin J Sens and Actuators 24(5):771–777
13.
go back to reference Das S, Das A (2015) An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol. In: 2015 International Conference on Advances in Computer Engineering and Applications. IEEE, pp 875-881 Das S, Das A (2015) An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol. In: 2015 International Conference on Advances in Computer Engineering and Applications. IEEE, pp 875-881
14.
go back to reference Prabha VR, Latha P (2016) Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wirel Pers Commun 94(4):2549–2559CrossRef Prabha VR, Latha P (2016) Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wirel Pers Commun 94(4):2549–2559CrossRef
15.
go back to reference Ma ZF (2016) A study on cluster head selection scheme for LENCH-C in wireless sensor network. Dissertation, Shandong University Ma ZF (2016) A study on cluster head selection scheme for LENCH-C in wireless sensor network. Dissertation, Shandong University
Metadata
Title
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks
Authors
Hongyu Yang
Xugao Zhang
Fang Cheng
Publication date
06-01-2020
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 4/2021
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01492-4

Other articles of this Issue 4/2021

Mobile Networks and Applications 4/2021 Go to the issue