Title: Decentralised malicious node detection in WSN

Authors: Alaa Atassi; Naoum Sayegh; Imad H. Elhajj; Ali Chehab; Ayman Kayssi

Addresses: Department of Electrical and Computer Engineering, American University of Beirut, Bliss Street, Beirut 1107 2020, Lebanon ' Department of Electrical and Computer Engineering, American University of Beirut, Bliss Street, Beirut 1107 2020, Lebanon ' Department of Electrical and Computer Engineering, American University of Beirut, Bliss Street, Beirut 1107 2020, Lebanon ' Department of Electrical and Computer Engineering, American University of Beirut, Bliss Street, Beirut 1107 2020, Lebanon ' Department of Electrical and Computer Engineering, American University of Beirut, Bliss Street, Beirut 1107 2020, Lebanon

Abstract: The sensitive role that wireless sensor networks (WSNs) play in interpreting the environment characteristics and the need for ensuring the integrity of the sensor readings, necessitate the use of security mechanisms. One of the main security issues in WSNs is manifested when malicious nodes spoof their identities and locations. In this paper, we propose a decentralised malicious node detection technique based on the received signal strength indicator (RSSI). The method is probabilistic, taking into account shadowing and fading effects. An empirical pathloss model is generated at each node during a discovery phase. This method takes into consideration mobility, channel conditions, and network density among other factors. In addition, the developed technique is able to localise the detected node within a small area. Simulation results highlight the high detection rate of the method under varying conditions.

Keywords: wireless sensor networks; WSNs; malicious nodes; received signal strength; RSS indicator; RSSI; spoofing; network security; shadowing effects; fading effects; pathloss models; consideration mobility; channel conditions; network density; simulation.

DOI: 10.1504/IJSSC.2014.060685

International Journal of Space-Based and Situated Computing, 2014 Vol.4 No.1, pp.15 - 25

Received: 13 Jul 2013
Accepted: 19 Dec 2013

Published online: 25 Apr 2014 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article