Malicious Node Detection in WSN Using WTE


Article PDF :

Veiw Full Text PDF

Article type :

Original Article

Author :

Shabnam Kumari | Sumit Dalal | Rashmi

Volume :

2

Issue :

4

Abstract :

Since WSNs are used in mission critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique constraints inherent in WSNs such as limited sensor node energy, limited computation and communication capabilities and the hostile deployment environments. These unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the networks operator Byzantine attack . It is therefore critical to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by falsified information introduced by the adversary via them. This research gives emphasis on improving Weighted Trust Evaluation WTE as a technique for detecting and isolating the malicious nodes. Extensive simulation is performed using MAT LAB in which the results show the proposed WTE based algorithm has the ability to detect and isolate malicious nodes, both the malicious sensor nodes and the malicious cluster heads forwarding nodes in WSNs at a reasonable detection rate and short response time whilst achieving good scalability. Shabnam Kumari | Sumit Dalal | Rashmi "Malicious Node Detection in WSN Using WTE" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: https://www.ijtsrd.com/papers/ijtsrd14611.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-network/14611/malicious-node-detection-in-wsn-using-wte/shabnam-kumari

Keyword :

WSN, WTE, STL, SWSN
Journals Insights Open Access Journal Filmy Knowledge Hanuman Devotee Avtarit Wiki In Hindi Multiple Choice GK