[HTML][HTML] Malicious node detection using a dual threshold in wireless sensor networks

SY Lim, YH Choi - Journal of sensor and actuator Networks, 2013 - mdpi.com
Sensor networks for various event detection applications cannot function effectively if they
are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading …

[HTML][HTML] A malicious and malfunctioning node detection scheme for wireless sensor networks

SH Oh, CO Hong, YH Choi - Wireless sensor network, 2012 - scirp.org
Wireless sensor networks are often used to monitor physical and environmental conditions
in various regions where human access is limited. Due to limited resources and deployment …

[HTML][HTML] Neighbor-based malicious node detection in wireless sensor networks

SJ Yim, YH Choi - 2012 - scirp.org
The primary function of wireless sensor networks is to gather sensor data from the monitored
area. Due to faults or malicious nodes, however, the sensor data collected or reported might …

A novel wireless sensor networks malicious node detection method

H Yang, X Zhang, F Cheng - Security and Privacy in New Computing …, 2019 - Springer
This paper proposed a malicious node detection model based on reputation with enhanced
low energy adaptive clustering hierarchy (Enhanced LEACH) routing protocol (MNDREL) …

An efficient and secure malicious node detection model for wireless sensor networks

AM Morsi, TM Barakat, AA Nashaat - International Journal of …, 2020 - papers.ssrn.com
In wireless sensor networks (WSNs), there are many factors, such as the reciprocal
interference of wireless links, battlefield applications and nodes are exposed to poor …

Distributed detection of mobile malicious node attacks in wireless sensor networks

JW Ho, M Wright, SK Das - Ad Hoc Networks, 2012 - Elsevier
In wireless sensor networks, sensor nodes are usually fixed to their locations after
deployment. However, an attacker who compromises a subset of the nodes does not need to …

An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks

F Zawaideh, M Salamah - International Journal of …, 2019 - Wiley Online Library
The aim of wireless sensor networks (WSNs) is to gather sensor data from a monitored
environment. However, the collected or reported information might be falsified by faults or …

A survey on detection of malicious nodes in wireless sensor networks

M Sahu, N Sethi, SK Das - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are often utilized in different places where human access
is limited to monitor physical and environmental factors. They are vulnerable to errors and …

Distributed detection of node capture attacks in wireless sensor networks

JW Ho - smart wireless sensor networks, 2010 - books.google.com
Wireless sensor networks are vulnerable to node capture attacks because sensor nodes are
usually deployed in unattended manner. Once attacker captures sensor nodes, he can …

[PDF][PDF] An Efficient Compromised Nodes Detection System in Wireless Sensor Networks.

X Xu, Z Gao, L Han - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Wireless sensor networks have limited resources and are deployed in an open environment,
this makes it vulnerable to attacks. The CND method we proposed can accurately detect the …