[HTML][HTML] Neighbor-based malicious node detection in wireless sensor networks

SJ Yim, YH Choi - 2012 - scirp.org
The primary function of wireless sensor networks is to gather sensor data from the monitored
area. Due to faults or malicious nodes, however, the sensor data collected or reported might …

Malicious node detection using a dual threshold in wireless sensor networks

SY Lim, YH Choi - Journal of sensor and actuator Networks, 2013 - mdpi.com
Sensor networks for various event detection applications cannot function effectively if they
are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading …

Distributed detection of mobile malicious node attacks in wireless sensor networks

JW Ho, M Wright, SK Das - Ad Hoc Networks, 2012 - Elsevier
In wireless sensor networks, sensor nodes are usually fixed to their locations after
deployment. However, an attacker who compromises a subset of the nodes does not need to …

A survey on detection of malicious nodes in wireless sensor networks

M Sahu, N Sethi, SK Das - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are often utilized in different places where human access
is limited to monitor physical and environmental factors. They are vulnerable to errors and …

[HTML][HTML] A malicious and malfunctioning node detection scheme for wireless sensor networks

SH Oh, CO Hong, YH Choi - Wireless sensor network, 2012 - scirp.org
Wireless sensor networks are often used to monitor physical and environmental conditions
in various regions where human access is limited. Due to limited resources and deployment …

An efficient and secure malicious node detection model for wireless sensor networks

AM Morsi, TM Barakat, AA Nashaat - International Journal of …, 2020 - papers.ssrn.com
In wireless sensor networks (WSNs), there are many factors, such as the reciprocal
interference of wireless links, battlefield applications and nodes are exposed to poor …

A novel wireless sensor networks malicious node detection method

H Yang, X Zhang, F Cheng - Security and Privacy in New Computing …, 2019 - Springer
This paper proposed a malicious node detection model based on reputation with enhanced
low energy adaptive clustering hierarchy (Enhanced LEACH) routing protocol (MNDREL) …

Mobile malicious node detection using mobile agent in cluster-based wireless sensor networks

L Gandhimathi, G Murugaboopathi - Wireless Personal Communications, 2021 - Springer
Many application domains require that sensor node to be deployed in harsh or hostile
environments, such as active volcano area tracking endangered species, etc. making these …

[PDF][PDF] Neighbour-based intrusion detection in wireless sensor networks

L Folkman, V Matyas - IEEE Xplore Press, 2010 - is.muni.cz
Sensor nodes situated spatially close to each other tend to have similar behaviour. The
neighbour-based detection technique is based on this principle and should provide means …

[PDF][PDF] ComSen: A detection system for identifying compromised nodes in wireless sensor networks

YT Wang, R Bagrodia - The Sixth International Conference on …, 2012 - personales.upv.es
Wireless sensor networks (WSNs) are vulnerable to adversaries as they are frequently
deployed in open and unattended environments. Adversaries can extract vital information …