Reduce Effect of Dependent Malicious Sensor Nodes in WSNs using Pairs Counting and Fake Packets
AbstractIn this paper, we propose a new technique for the enhancement of target detection in Wireless Sensor Networks (WSNs) in which sensor nodes are responsible for taking binary decisions about the presence or absence of a given target and reporting the output to the fusion center. We introduce the algorithm; Fail Silent Pair (FSP) to calculate global decision in the fusion center. The FSP algorithm randomly distributes all sensor nodes into pairs then considers pairs of the same local decision. Also, we present new detection and prevention methods to reduce the effect of dependent malicious sensor nodes. The detection method is based on the deception of suspicious sensor nodes with fake packets to detect a subset of the malicious sensor nodes, as these nodes eavesdrop on other sensor nodes packets to use their local decisions as a reference to build an intelligent decision. While the prevention method allows the fusion center to correct local decisions of some malicious sensor nodes with identified strategies, assisting in the increase of the accuracy of global decisions. We introduce a mathematical analysis to verify our methods, in addition to simulation experiments to validate our technique.
 Antonopoulos, A.; Verikoukis, C. (2016). Misbehavior detection in the internet of things: A network-coding-aware statistical approach. In Industrial Informatics (INDIN), 2016 IEEE 14th International Conference on, 1024-1027. IEEE, 2016.
 Anwar, R. W.; Bakhtiari, M.; Zainal, A.; Abdullah, A. H.; Qureshi, K. N.; Computing, F.; Bahru, J. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10):1224-1227, 2014.
 Buratti, C.; Conti, A.; Dardari, D.; Verdone, R. (2009). An overview on wireless sensor networks technology and evolution. Sensors, 9(9), 6869-6896, 2009.
 Curiac, D.-I.; Banias, O.; Dragan, F.; Volosencu, C.; Dranga, O. (2007). Malicious node detection in wireless sensor networks using an autoregression technique. In Networking and Services, 2007. ICNS. Third International Conference on, IEEE, 83-83, 2007.
 Dâmaso, A.; Freitas, D.; Rosa, N.; Silva, B.; Maciel, P. (2013). Evaluating the power consumption of wireless sensor network applications using models. Sensors, 13(3), 3473-3500, 2013.
 Demirbas, M. (2005). Wireless sensor networks for monitoring of large public buildings, 2005.
 Di Pietro, R.; Mancini, L. V.; Soriente, C.; Spognardi, A.; Tsudik, G. (2008). Catch me (if you can): Data survival in unattended sensor networks. In Pervasive Computing and Communications, 2008. PerCom 2008. Sixth Annual IEEE International Conference on, IEEE, 185-194, 2008.
 Hiregoudar, S.; Manjunath, K. (2017). Effective malicious node detection and data fusion under byzantine attacks, 2017.
 Kim, T.; Kim, I. H.; Sun, Y.; Jin, Z. (2015). Physical layer and medium access control design in energy efficient sensor networks: An overview. IEEE Transactions on Industrial Informatics, 11(1), 2-15, 2015.
 Lara, R.; Benítez, D.; Caamaño, A.; Zennaro, M.; Rojo-Álvarez, J. L. (2015). On real-time performance evaluation of volcano-monitoring systems with wireless sensor networks. IEEE Sensors Journal, 15(6), 3514-3523, 2015.
 Li, J.; Andrew, L. L.; Foh, C. H.; Zukerman, M.; Chen, H.-H. (2009). Connectivity, coverage and placement in wireless sensor networks. Sensors, 9(10), 7664-7693, 2009.
 Pires, W.; de Paula Figueiredo, T. H.; Wong, H. C.; Loureiro, A. A. F. (2004). Malicious node detection in wireless sensor networks. In Parallel and distributed processing symposium, 2004. Proceedings. 18th international, page 24. IEEE, 2004.
 Plastoi, M.; Volosencu, C.; Banias, O.; Tudoroiu, R.; Curiac, D.-I.; Doboli, A. (2009). Integrated system for malicious node discovery and self-destruction in wireless sensor networks. International Journal on Advances in Networks and Services Volume 2, Numbers 2&3, 2009.
 Salahuddin, M. A. et al. (2015). Introduction to wireless sensor networks. In Wireless sensor and mobile ad-hoc networks, 3-32. Springer, 2015.
 Spachos, P.; Hatzinakos, D. (2016). Real-time indoor carbon dioxide monitoring through cognitive wireless sensor networks. IEEE sensors journal, 16(2), 506-514, 2016.
 Ðurišic, M. P.; Tafa, Z.; Dimic, G.; Milutinovic, V. (2012). A survey of military applications of wireless sensor networks. In Embedded Computing (MECO), 2012 Mediterranean Conference on, pages 196-199. IEEE, 2012.
 Wang, Y.; Attebury, G.; Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks, 2006.
 Webster, J. G.; Eren, H. (2017). Measurement, instrumentation, and sensors handbook: spatial, mechanical, thermal, and radiation measurement. CRC press, 2017.
 Yu, Y.; Li, K.; Zhou, W.; Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and computer Applications, 35(3), 867-880, 2012.
 Zhang, Y.; He, S.; Chen, J. (2016). Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE/ACM Transactions on Networking, 24(3), 1632-1646, 2016.
 Zurawski, R. (2005). Embedded systems handbook. CRC press, 2005.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.