Malicious Node Detection by a Monitoring Mechanism in Wireless Sensor Networks

Tanveer Zia, Albert Zomaya

Research output: Book chapter/Published conference paperConference paper

14 Downloads (Pure)

Abstract

Inherent resource limitation nature of wireless sensor networks poses unique security challenges. Cryptography is not enough and efficient to secure wireless sensor networks; it can not prevent malicious nodes and tunneling of messages to wormholes and sinkholes. In this paper we propose a monitoring mechanism to detect malicious nodes; the proposed mechanism is protected with a secure triple key management scheme. In the proposed mechanism, message sending nodes monitors if message receiving nodes have altered the message or not transmitted the message at all by building a node suspicious table and periodically broadcasting the table to its neighbors. Once a node reaches a threshold of suspicious entries, message about the presence of that node is disseminated in the entire network warning all the nodes about the presence of a malicious node. Cluster leader then isolates that malicious node hence protecting the network from malicious attacks.
Original languageEnglish
Title of host publicationNetwork Security
Subtitle of host publicationProceedings Of International Conference On Network Security And Workshop (icons 2007)
EditorsV. Venkatachalam, G. Sivakumar
Place of PublicationDelhi, India
PublisherMacmillan Publishers
Pages273-281
Number of pages9
ISBN (Electronic)9780230630550
Publication statusPublished - 2007
EventInternational Conference On Network Security And Workshop - Erode, India, India
Duration: 29 Jan 200731 Jan 2007

Conference

ConferenceInternational Conference On Network Security And Workshop
CountryIndia
Period29/01/0731/01/07

Fingerprint Dive into the research topics of 'Malicious Node Detection by a Monitoring Mechanism in Wireless Sensor Networks'. Together they form a unique fingerprint.

  • Cite this

    Zia, T., & Zomaya, A. (2007). Malicious Node Detection by a Monitoring Mechanism in Wireless Sensor Networks. In V. Venkatachalam, & G. Sivakumar (Eds.), Network Security: Proceedings Of International Conference On Network Security And Workshop (icons 2007) (pp. 273-281). Macmillan Publishers.