On the impact of localization data in wireless sensor networks with malicious nodes

Author(s):  
Mattia Monga ◽  
Sabrina Sicari
Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3829 ◽  
Author(s):  
Chuanjun Yi ◽  
Geng Yang ◽  
Hua Dai ◽  
Liang Liu ◽  
Ning Li

The existing public key-based en-route filtering schemes are vulnerable to report disruption attacks or selective forwarding attacks, and they fail to consider any measure to detect and punish the malicious nodes. The authors propose a series of public key-based security mechanisms for wireless sensor networks (WSNs) in this paper, including a mechanism for verifying the partial signatures, a substitution mechanism, an effective report forwarding protocol, and a trust value-based mechanism to identify and punish the malicious nodes. Finally, the authors develop a public key-based authentication and en-route filtering scheme (PKAEF), which can resist false data injection attacks, report disruption attacks and selective forwarding attacks, and can mitigate the impact of malicious nodes. Detailed performance analysis and evaluation show that, in most cases, PKAEF outperforms previous works in terms of safety, filtering efficiency, and data availability.


2013 ◽  
Vol 9 (7) ◽  
pp. 471917 ◽  
Author(s):  
Ruan Delgado Gomes ◽  
Marcéu Oliveira Adissi ◽  
Abel Cavalcante Lima-Filho ◽  
Marco Aurélio Spohn ◽  
Francisco Antônio Belo

The fundamental capacity of a sensor system is to accumulate and forward data to the destination. It is crucial to consider the area of gathered data, which is utilized to sort information that can be procured using confinement strategy as a piece of Wireless Sensor Networks (WSNs).Localization is a champion among the most basic progressions since it agreed as an essential part in various applications, e.g., target tracking. If the client can't gain the definite area information, the related applications can't be skillful. The crucial idea in most localization procedures is that some deployed nodes with known positions (e.g., GPS-equipped nodes) transmit signals with their coordinates so as to support other nodes to localize themselves. This paper mainly focuses on the algorithm that has been proposed to securely and robustly decide thelocation of a sensor node. The algorithm works in two phases namely Secure localization phase and Robust Localization phase. By "secure", we imply that malicious nodes should not effectively affect the accuracy of the localized nodes. By “robust”, we indicate that the algorithm works in a 3D environment even in the presence of malicious beacon nodes. The existing methodologies were proposed based on 2D localization; however in this work in addition to security and robustness, exact localization can be determined for 3D areas by utilizing anefficient localization algorithm. Simulation results exhibit that when compared to other existing algorithms, our proposed work performs better in terms of localization error and accuracy.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


Author(s):  
Marcello Cinque ◽  
Catello Di Martino

Recent years have witnessed a proliferation of routing algorithms for Wireless Sensor Networks (WSNs), hence complicating the choice of the proper algorithm to be used for a given application. Simulation frameworks represent a viable solution to anticipate crucial choices, however existing solutions do not encompass the impact of changes (e.g., route updates, node crashes) on the nodes behavior and vice-versa. This article proposes a novel adaptive modeling approach to master the complexity of the thorough simulation of routing algorithms for WSN. Experimental results are provided showing the effectiveness of the proposed approach at managing changes, and dealing with detailed aspects, during the simulation and comparison of several routing algorithms.


Proceedings ◽  
2018 ◽  
Vol 4 (1) ◽  
pp. 28
Author(s):  
Mikel Celaya-Echarri ◽  
Leyre Azpilicueta ◽  
Peio Lopez-Iturri ◽  
Erik Aguirre ◽  
Francisco Falcone

The uncontainable future development of smart regions, as a set of smart cities’ assembled networks, is directly associated with a growing demand of full interactive and connected ubiquitous smart environments. To achieve this goal of global connection, a large number of transceivers and multiple wireless systems will be involved to provide user services and applications (i.e., Ambient Assisted Living, emergency situations, e-health monitoring, or Intelligent Transportation Systems) anytime and anyplace, regardless of the devices, networks, or systems used. Adequate, efficient, and effective radio wave propagation tools, methodologies, and analyses in complex environments (indoor and outdoor) are crucial to prevent communication limitations such as coverage, capacity, speed, or channel interferences due to nodes’ density or channel restrictions. In this work, radio wave propagation characterization in an urban indoor and outdoor environment, at ISM 2.4 GHZ and 5 GHz Wireless Sensor Networks (WSNs), has been assessed. The selected scenario is an auditorium placed in a free open area surrounded by inhomogeneous vegetation. User density within the scenario, in terms of inherent transceivers density, poses challenges to the overall system operation, given by multiple node operation which increases overall interference levels. By means of an in-house developed 3D ray launching algorithm, the impact of variable density wireless sensor network operation within this complex scenario is presented. This analysis and the proposed simulation methodology can lead in an adequate interference characterization, considering conventional transceivers as well as wearables, which provide suitable information for the overall network performance in complex crowded indoor and outdoor scenarios.


Author(s):  
Turki Ali Alghamdi

Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.


2014 ◽  
Vol 23 (10) ◽  
pp. 1450138 ◽  
Author(s):  
THAIER HAYAJNEH ◽  
SAMER KHASAWNEH

Wireless sensor networks (WSNs) are an attractive choice for many applications where sensors are densely and efficiently deployed in an area of interest. For example, in surveillance applications, where deterministic placement is not applicable, the sensors have to be randomly deployed entirely or partially in an area. Whether random or deterministic, the strategy of deploying the sensors has a large impact on the performance of WSNs. In this paper, we propose a systematic methodology for sensors placement based on several random distributions. The quality of deployment is evaluated using a set of proposed measures, the significance of which highly depends on the WSN application. The impact of these deployment strategies on the network performance is thoroughly studied. Moreover, we propose a new hybrid deployment strategy that aims to achieve the best performance based on the suggested deployment quality measures. Both the placement strategies with the deployment quality measures are evaluated using extensive simulations. The results show that the proposed hybrid strategy outperformed other strategies including uniform, random, Gaussian, and exponential distributions. In addition, the paper identifies the family of applications where each of the quality measures is highly critical.


Proceedings ◽  
2018 ◽  
Vol 4 (1) ◽  
pp. 3
Author(s):  
Felipe Antonio Moura Miranda ◽  
Paulo Cardieri

The energy consumption in wireless sensor networks is the critical concern of different studies, especially because of the great effort, or even the impossibility, to replace the battery of their motes. Consequently, it is fundamental to investigate and evaluate the energy spent by every individual task executed by the motes in order to provide an efficient use of their batteries. In this work, we employ different metrics to present a thorough study of how the use of multiple transmission power levels affects multihop wireless sensor networks. This work is motivated by the current employment of the multiple transmission power levels, on both academic works and commercial solutions, which is a novel feature of some radio transceivers commonly used in wireless sensor network motes. Aiming for reliable and extensive analysis, this study employs simulations in different scenarios and models of commonly employed electronic components. The contribution of this works is a detailed investigation of the impact caused by the use of different transmission power levels employing different metrics, offering a wide perspective on the subject. In general, the results of this study indicate that the use of multiple power levels grants both positive and negative results, according to the scenario and metrics analyzed.


Sign in / Sign up

Export Citation Format

Share Document