Academic literature on the topic 'Malicious node detection in wireless sensor networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious node detection in wireless sensor networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious node detection in wireless sensor networks"
Zhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.
Full textZheng, Guiping, Bei Gong, and Yu Zhang. "Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2021 (February 27, 2021): 1–10. http://dx.doi.org/10.1155/2021/6667100.
Full textZhang, Zhiming, Yu Yang, Wei Yang, Fuying Wu, Ping Li, and Xiaoyong Xiong. "Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks." Security and Communication Networks 2021 (September 24, 2021): 1–12. http://dx.doi.org/10.1155/2021/9082570.
Full textSei, Yuichi, and Akihiko Ohsuga. "Malicious Node Detection in Mobile Wireless Sensor Networks." Journal of Information Processing 23, no. 4 (2015): 476–87. http://dx.doi.org/10.2197/ipsjjip.23.476.
Full textS. Eissa, Nour El Din, and Gamal I. Selim. "Cooperative Intrusion Detection Technique in Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 3 (March 30, 2014): 4256–64. http://dx.doi.org/10.24297/ijct.v13i3.2756.
Full textSingh, Mandeep, Navjyot Kaur, Amandeep Kaur, and Gaurav Pushkarna. "A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks." International Journal of Cyber Warfare and Terrorism 7, no. 2 (April 2017): 42–53. http://dx.doi.org/10.4018/ijcwt.2017040103.
Full textJamshidi, Mojtaba, Milad Ranjbari, Mehdi Esnaashari, Nooruldeen Nasih Qader, and Mohammad Reza Meybodi. "Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes." JOIV : International Journal on Informatics Visualization 2, no. 3 (May 15, 2018): 159. http://dx.doi.org/10.30630/joiv.2.3.131.
Full textGrgic, Kresimir, Drago Zagar, and Visnja Krizanovic Cik. "System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks." Journal of Sensors 2016 (2016): 1–20. http://dx.doi.org/10.1155/2016/6206353.
Full textPan, Ju Long, Ling Long Hu, Wen Jin Li, Hui Cui, and Zi Yin Li. "Weighted K Nearest Neighbour-Based Cooperation Intrusion Detection System for Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2972–78. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2972.
Full textG. Murugan, Dr. "Improve secure based multi-path routing to mitigate the intrusion endurance in heterogeneous wireless sensor networks." International Journal of Engineering & Technology 7, no. 4 (September 26, 2018): 2746. http://dx.doi.org/10.14419/ijet.v7i4.17957.
Full textDissertations / Theses on the topic "Malicious node detection in wireless sensor networks"
Zia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.
Full textSensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
Kotari, Ravi Teja. "Node failure detection and data retrieval in wireless sensor networks." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108190.
Full textThis project presents a method for detecting node failure in a wireless sensor network. The defective node is identified using round-trip delay measurements. Data transfer from the transmitter section to the receiver section is accomplished via the ZigBee protocol. As soon as a node has been identified as defective, the node is removed from the sensor network. Information about the failed node is provided to users with registered mobile device through the Global System for Mobile (GSM) module. The proposed method has been successfully implemented and tested experimentally on a small sensor network using the LPC2148 ARM7 microcontroller.
Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.
Full textAl-Riyami, Ahmed. "Towards an adaptive solution to data privacy protection in hierarchical wireless sensor networks." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-adaptive-solution-to-data-privacy-protection-in-hierarchical-wireless-sensor-networks(a096db2a-251c-4e9e-a4ff-8bfe4c6f1bf4).html.
Full textchen, stanley, and 陳嘉融. "The Malicious Node Detection and Identification Mechanisms for Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/63265720978978639169.
Full text長庚大學
資訊管理研究所
94
Wireless Sensor Network (WSN) is a new developing type of wireless networks. Comparing with Wireless Local Area Network (WLAN), WSN has more restrictions on hardware specification of sensor node and deployment environment. The application of WSN has been growing in recent years. Many security protocols that designed for this particular network had been developed, simulated, verified and successfully implemented. However, the security challenge and difficulty that WSN has to faced will not be able to be solved completely in a few years. This study will begin with improving the whole of security of WSN to propose a suite of malicious node detection and identification mechanisms for WSN. These mechanisms include key pre-load mechanism, neighbor discovery mechanism, authentication key distribution mechanism and node authentication mechanism. The first three mechanisms may be regard as pre-processing to execute the last mechanism. After pre-processing, node in the network can easily detect whether malicious node in its communication range exists. If malicious node exists, it could be identified simultaneously.
Li, Wei, and 李威. "A Novel Node Movement Detection Scheme in Wireless Sensor Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58345508926363398455.
Full text國立中央大學
資訊工程研究所
98
The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
Nkululeko, Zwane Patrick, and Zwane Patrick Nkululeko. "A Novel Correlated Attributes Model for Malicious Detection in Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97yunq.
Full text國立臺北科技大學
電資學院外國學生專班
105
Wireless Sensor Networks (WSNs) presents a unique impact in our communities today. This technology has many advantages but their security issues have not been given much consideration till now. For that, a need is evident to equip sensor nodes with security mechanisms to defend against attacks. The defense mechanisms will help to detect and isolate the compromised nodes in order to avoid being misled by the fabricated information injected by the attacker through them. Since security issues are a big concern in WSNs, a Correlated Attributes Model (CAM) is proposed. CAM detects malicious activity against Sybil, sinkhole, wormhole, and blackhole attack. The simulation is performed by using NS2, to verify CAMs performance and efficiency using common WSNs evaluation parameters. Ad hoc On-demand Distance Vector (AODV) is use as a routing protocol to examined effect of malicious attacks. Throughput, end to end delay and packet delivery ratio/fraction are used to measure the performance of the solution.
Chen, Hsin-Hsiu, and 陳新秀. "An improved SPRT detection method for replication node in fault tolerant wireless sensor networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/3wq42g.
Full text國立交通大學
資訊管理研究所
105
As the Internet of Things came, the application of the wireless sensor networks has increased. Meanwhile, there are also many threats of networks security need to be dealt with. One of the network attacks is the replication attack. The attackers may replicate few of the nodes to be considered as the legitimate nodes. The cloned nodes would integrate into the original network and launch a variety of internal attacks. There are several replica detections in the literature for the mobile environment. Most of the detections are limited by high computation and communication cost. Some of detections based on the Sequential Probability Ratio Test have much lower system overhead. However, these prior works decrease the accuracy when sensors lie in a server environment so that sensors are prone to retransmit the message. This paper proposes a replica detection based on the SPRT in fault tolerant wireless sensor network. In order to improve the accuracy of the judgment, we use the power of nodes and the slope of energy as the appendix and apply the SPRT to adjust the replica detection dynamically in the fault tolerant environment. The experiments show that our proposed scheme achieves better performance on both efficiency of detecting and reduction of error rate than the prior work.
Lee, Yi-Chang, and 李宜昌. "A Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/13353818875293089256.
Full text國立中正大學
資訊管理所暨醫療資訊管理所
97
The applications for wireless sensor networks (WSNs) were originally motivated by military applications like battlefield surveillance. Today, wireless sensor networks are widely used in civilian application areas, such as home security monitoring, healthcare applications, traffic control. However, a novel attack, named node replication attacks are proved to be a harmful attack. The node replication attack is an attack that the adversary captures a node and replicates the node in a large number of clones. After that, the adversary will insert the replicated nodes in the network. At last the adversary will control the network gradually. A few solutions have recently been proposed. Nevertheless, these solutions are still unable to solve following issues- First, the large memory overhead and high computational complexity are unsuitable for WSNs. The communication cost and probabilities of detection are important issues as well. Further, a detection could be used in mobile sensor networks is more satisfactory. The contributions of this paper include (1) an efficient memory overhead and communication cost of detection protocol is suggested, (2) mobile sensor nodes are concerned in our protocol. It is possible for the sensor nodes to be mobile, not only stationary. (3) The security analysis and simulation experiments are also proposed. The results show that the probability of deletion is high, our protocol is useful.
Li, Zhijun. "Efficient Authentication, Node Clone Detection, and Secure Data Aggregation for Sensor Networks." Thesis, 2010. http://hdl.handle.net/10012/5739.
Full textBook chapters on the topic "Malicious node detection in wireless sensor networks"
Yang, Hongyu, Xugao Zhang, and Fang Cheng. "A Novel Wireless Sensor Networks Malicious Node Detection Method." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 697–706. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21373-2_59.
Full textRoshini, A., K. V. D. Kiran, and K. V. Anudeep. "Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 263–70. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6176-8_29.
Full textLi, Zhijun, and Guang Gong. "DHT-Based Detection of Node Clone in Wireless Sensor Networks." In Ad Hoc Networks, 240–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_16.
Full textSonekar, Shrikant V., Manali M. Kshirsagar, and Latesh Malik. "Cluster Head Selection and Malicious Node Detection in Wireless Ad Hoc Networks." In Advances in Intelligent Systems and Computing, 547–54. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6005-2_55.
Full textPrasain, Prakash, and Dong-You Choi. "Nullifying Malicious Users for Cooperative Spectrum Sensing in Cognitive Radio Networks Using Outlier Detection Methods." In Ubiquitous Computing Application and Wireless Sensor, 123–31. Dordrecht: Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9618-7_12.
Full textSonekar, Shrikant V., and Manali M. Kshirsagar. "Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks." In Advances in Intelligent Systems and Computing, 317–28. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2695-6_27.
Full textZhi, Hanxiao, Peng Li, He Xu, and Feng Zhu. "Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 196–205. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93659-8_17.
Full textQin, Danyang, Songxiang Yang, Ping Ji, and Qun Ding. "Secure Communication Mechanism Based on Key Management and Suspect Node Detection in Wireless Sensor Networks." In Machine Learning and Intelligent Communications, 692–700. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73564-1_71.
Full textChen, Yu, Hao Chen, and Wei-Shinn Ku. "Malicious Node Detection in Wireless Sensor Networks." In Wireless Networks and Mobile Communications. Auerbach Publications, 2009. http://dx.doi.org/10.1201/9781420068405.ch17.
Full textSingh, Mandeep, Navjyot Kaur, Amandeep Kaur, and Gaurav Pushkarna. "A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks." In Sensor Technology, 881–94. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch042.
Full textConference papers on the topic "Malicious node detection in wireless sensor networks"
Atassi, A., N. Sayegh, I. Elhajj, A. Chehab, and A. Kayssi. "Malicious Node Detection in Wireless Sensor Networks." In 2013 Workshops of 27th International Conference on Advanced Information Networking and Applications (WAINA). IEEE, 2013. http://dx.doi.org/10.1109/waina.2013.135.
Full textPadmaja, P., and G. V. Marutheswar. "Detection of Malicious Node in Wireless Sensor Network." In 2017 IEEE 7th International Advance Computing Conference (IACC). IEEE, 2017. http://dx.doi.org/10.1109/iacc.2017.0052.
Full textPing Yi, Yue Wu, and Jianhua Li. "Malicious node detection in ad hoc networks using timed automata." In IET Conference on Wireless, Mobile and Sensor Networks 2007 (CCWMSN07). IEE, 2007. http://dx.doi.org/10.1049/cp:20070131.
Full textCuriac, Daniel-Ioan, Ovidiu Banias, Florin Dragan, Constantin Volosencu, and Octavian Dranga. "Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique." In Third International Conference on Networking and Services. ICNS 2007. IEEE, 2007. http://dx.doi.org/10.1109/icns.2007.79.
Full textJaint, Bhavnesh, S. Indu, Neeta Pandey, and Khushbu Pahwa. "Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine." In 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE). IEEE, 2019. http://dx.doi.org/10.1109/rdcape47089.2019.8979125.
Full textAl-Maslamani, Noora, and Mohamed Abdallah. "Malicious Node Detection in Wireless Sensor Network using Swarm Intelligence Optimization." In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020. http://dx.doi.org/10.1109/iciot48696.2020.9089527.
Full textRani, K. Sasi Kala, and R. Vijayalakshmi. "Experimental Evaluations of Malicious Node Detection on Wireless Sensor Network Environment." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432131.
Full textPriyanka, J. Steffi Agino, S. Tephillah, and A. M. Balamurugan. "Malicious node detection using minimal event cycle computation method in wireless sensor networks." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6949975.
Full textKumar, Sumit, and Shabana Mehfuz. "A PSO Based Malicious Node Detection and Energy Efficient Clustering in Wireless Sensor Network." In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2019. http://dx.doi.org/10.1109/spin.2019.8711585.
Full textJaint, Bhavnesh, Vishwamitra Singh, Lalit Kumar Tanwar, S. Indu, and Neeta Pandey. "An Efficient Weighted Trust Method for Malicious Node Detection in Clustered Wireless Sensor Networks." In 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES). IEEE, 2018. http://dx.doi.org/10.1109/icpeices.2018.8897307.
Full text