Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed mechanism is protected with a secure triple key management scheme. In the proposed mechanism, message sending nodes monitors if message receiving nodes have altered the message or not transmitted the message at all by building a node suspicious table and periodically broadcasting the table to its neighbors. Once a node reaches a threshold of suspicious entries, message about the presence of that node is disseminated in the entire network warning all the nodes about the presence of a malicious node. Cluster leader then isolates that malicious node hence protecting the network from malicious attacks.
|Title of host publication||Network Security|
|Subtitle of host publication||Proceedings Of International Conference On Network Security And Workshop (icons 2007)|
|Editors||V. Venkatachalam, G. Sivakumar|
|Place of Publication||Delhi, India|
|Number of pages||9|
|Publication status||Published - 2007|
|Event||International Conference On Network Security And Workshop - Erode, India, India|
Duration: 29 Jan 2007 → 31 Jan 2007
|Conference||International Conference On Network Security And Workshop|
|Period||29/01/07 → 31/01/07|
Zia, T., & Zomaya, A. (2007). Malicious Node Detection by a Monitoring Mechanism in Wireless Sensor Networks. In V. Venkatachalam, & G. Sivakumar (Eds.), Network Security: Proceedings Of International Conference On Network Security And Workshop (icons 2007) (pp. 273-281). Macmillan Publishers.