Countering intelligent-dependent malicious nodes in target detection wireless sensor networks

S Althunibat, A Antonopoulos, E Kartsakli… - IEEE Sensors …, 2016 - ieeexplore.ieee.org
Target detection wireless sensor networks (WSNs), where binary decisions are transmitted
to declare the presence or absence of a given target, are expected to have a fundamental …

Malicious node detection using a dual threshold in wireless sensor networks

SY Lim, YH Choi - Journal of sensor and actuator Networks, 2013 - mdpi.com
Sensor networks for various event detection applications cannot function effectively if they
are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading …

[HTML][HTML] Neighbor-based malicious node detection in wireless sensor networks

SJ Yim, YH Choi - 2012 - scirp.org
The primary function of wireless sensor networks is to gather sensor data from the monitored
area. Due to faults or malicious nodes, however, the sensor data collected or reported might …

The detection scheme against selective forwarding of smart malicious nodes with reinforcement learning in wireless sensor networks

J Ding, H Wang, Y Wu - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are extremely vulnerable to different attacks because of
open communication, and distribution in unattended areas. The selective forwarding attack …

A survey on detection of malicious nodes in wireless sensor networks

M Sahu, N Sethi, SK Das - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are often utilized in different places where human access
is limited to monitor physical and environmental factors. They are vulnerable to errors and …

An efficient and secure malicious node detection model for wireless sensor networks

AM Morsi, TM Barakat, AA Nashaat - International Journal of …, 2020 - papers.ssrn.com
In wireless sensor networks (WSNs), there are many factors, such as the reciprocal
interference of wireless links, battlefield applications and nodes are exposed to poor …

CMNTS: Catching malicious nodes with trust support in wireless sensor networks

U Prathap, PD Shenoy… - 2016 IEEE Region 10 …, 2016 - ieeexplore.ieee.org
Security in wireless sensor networks is critical due to its way of open communication. In this
paper we have considered suite of attacks—packet modification, packet dropping, sybil …

Design of wireless sensor networks for mobile target detection

E Amaldi, A Capone, M Cesana… - IEEE/ACM transactions …, 2011 - ieeexplore.ieee.org
We consider surveillance applications through wireless sensor networks (WSNs) where the
areas to be monitored are fully accessible and the WSN topology can be planned a priori to …

Generalized intrusion detection mechanism for empowered intruders in wireless sensor networks

W Wang, H Huang, Q Li, F He, C Sha - IEEE Access, 2020 - ieeexplore.ieee.org
Intrusion detection as one of the most important approaches to guarantee wireless sensing
network security has been studied adequately in previous work. However, with the …

A secure optimum distributed detection scheme in under-attack wireless sensor networks

E Nurellari, D McLernon… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We address the problem of centralized detection of a binary event in the presence of fraction
falsifiable sensor nodes (SNs)(ie, controlled by an attacker) for a bandwidth-constrained …