Enhanced LEACH Protocol Based Wireless Sensor Network Malicious Node Detection Model

被引:0
|
作者
Yang H.-Y. [1 ]
Cheng F. [1 ]
机构
[1] School of Computer Science and Technology, Civil Aviation University of China, Tianjin
关键词
Cluster; Determine; Malicious node; Reputation value; Wireless sensor network;
D O I
10.15918/j.tbit1001-0645.2019.03.013
中图分类号
学科分类号
摘要
To solve the efficiency problem of the existing malicious node detection methods in wireless sensor networks (WSN), a malicious node detection model was proposed based on enhanced low energy adaptive clustering hierarchy (LEACH) routing protocol with reputation (MNDELR). Firstly, in wireless sensor network, the enhanced LEACH routing protocol was used to select the cluster-head nodes and make other nodes to be corresponding cluster-head nodes to form the clusters and determine the packets delivery paths in the network. Then, some information, including the node numbers and the reputation evaluation, were added to the data packets of nodes, and the data packets were sent to the sink node according to the delivery paths. The node numbers in the packets were parsed and compared with the source node numbers in the convergent node to form a list of suspicious nodes. Finally, the reputation values of the nodes were calculated and compared with the threshold to determine the malicious nodes in the network. The experiment results show that, compared with other methods, MNDELR model can detect malicious nodes in WSN more effectively. © 2019, Editorial Department of Transaction of Beijing Institute of Technology. All right reserved.
引用
收藏
页码:304 / 310
页数:6
相关论文
共 12 条
  • [1] Zhang Y., The Study on Security Problems of Wireless Sensor Networks, pp. 5-18, (2013)
  • [2] Prathap U., Shenoy P.D., Venugopal K.R., CMNTS: catching malicious nodes with trust support in wireless sensor networks, 2016 IEEE Region 10 Symposium, pp. 77-82, (2016)
  • [3] Althunibat S., Antonopoulos A., Kartsakli E., Et al., Countering intelligent-dependent malicious nodes in target detection wireless sensor networks, IEEE Sensors Journal, 16, 23, pp. 8627-8639, (2016)
  • [4] Cui H., Pan J., Yan D., Malicious node detection algorithm based on reputation with voting machanism in wireless sensor networks, Journal of China University of Metrology, 24, 4, pp. 353-359, (2013)
  • [5] Singh S.S., Jinila Y.B., Sensor node failure detection using check point recovery algorithm, 2016 International Conference on Recent Trends in Information Technology, pp. 1-4, (2016)
  • [6] Prabha V.R., Latha P., Fuzzy trust protocol for malicious node detection in wireless sensor networks, Wireless Personal Communications, 94, 4, pp. 1-11, (2016)
  • [7] Varshney K.K., Samundiswary P., Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network, 2014 International Conference on Information Communication and Embedded Systems, pp. 1-5, (2014)
  • [8] Das S., Das A., An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol, 2015 International Conference on Advances in Computer Engineering and Applications, pp. 875-881, (2015)
  • [9] Ma Z., A study on cluster head selection scheme for LEACH-C in wireless sensor network, (2016)
  • [10] Liu H., Cui J., Dai H., Multivariate classification-based malicious detection for wireless sensor network, Chinese Journal of Sensors and Actuators, 24, 5, pp. 771-777, (2011)