Malicious node detection system in wireless sensor networks: a decentralised approach Online publication date: Fri, 05-Feb-2010
by Maryam Fanaeepour, Mohammad Reza Kangavari
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 2, No. 1/2, 2010
Abstract: The large deployment of wireless sensor networks (WSNs) increases their exposure to intrusions on sensor nodes. One of the most challenging issues is how to detect compromised or malicious nodes. Our goal in this paper is to review different techniques for detecting malicious nodes in WSNs and introducing a new system that we call HyPIDS. The main idea is using additional sensor nodes, called 'monitor nodes', inserted and distributed into the network to detect malicious nodes so that they monitor the propagated messages of common sensors through the network. We have proposed a distributed scheme by applying aggregator nodes but since we just work on monitor nodes at the simulation phase, we used a decentralised approach. We have modelled the solution with Petri nets (PNs). Also, the decentralised approach and detection of malicious nodes has been simulated with a new Java-based tool called SIDnet which supports heterogeneous sensor networks.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com