Skip to main content

REsilient Double WEighted TruST Based (REDWEST) WSN Using SAX

  • Conference paper
  • 470 Accesses

Abstract

Wireless Sensor Networks (WSNs) are becoming the most widely used applications in monitoring environment and military operations. However, in such applications sensors are deployed in harsh environments and sometimes are inaccessible once deployed making them vulnerable to both physical and software attacks. Malicious nodes can send misleading data to the controller affecting monitoring results. Sophisticated security applications cannot be used to overcome this problem due to the limited power of the sensors. A new mechanism is needed which first identifies malicious nodes in an accurate manner and offers indispensible characteristics namely, resiliency and reliability to the WSN. In this paper, we develop a malicious and malfunctioning node detection scheme using a resilient double weighted trust evaluation technique in a hierarchical sensor network. Our system evaluates all sensor nodes, increases and decreases trust value accordingly and excludes nodes having under threshold trust values. The simulation results show that our approach is very efficient even in harsh environments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., Su, Z.: Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation. In: The Symposium on Simulation of Systems Security (SSSS 2008), Ottawa, Canada, April 14-17 (2008)

    Google Scholar 

  2. Ju, L., Li, H., Liu, Y., Xue, W., Li, K., Chi, Z.: An Improved Intrusion Detection Scheme based on Weighted Trust Evaluation. In: The IEEE 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, CUTE (2010)

    Google Scholar 

  3. Harte, S., Rahman., A.: Fault Tolerance in Sensor Networks Using Self-Diagnosing Sensor Nodes. In: The IEE International Workshop on Intelligent Environment, pp. 7–12 (June 2005)

    Google Scholar 

  4. Benini, L., Castelli, G., Macii, A., Macii, E., Poncino, M., Scarsi, R.: A Discrete-Time Battery Model for High-Level Power Estimation. In: Proceeding of the Design, Automation and Test in Europe Conference and Exhibition 2000, pp. 35–39 (2000)

    Google Scholar 

  5. Rakhmatov, D., Vrudhula, S.B.: Time-to-Failure Estimation for Batteries in Portable Electronic Systems. In: Proceedings of the 2001 International Symposium on Low Power Electronics and Design, pp. 88–91 (2001)

    Google Scholar 

  6. Ding, M., Chen, D., Xing, K., Cheng, X.: Localized fault-tolerant event boundary detection in sensor networks. In: INFOCOM (2005)

    Google Scholar 

  7. Krishnamachari, B., Iyengar, S.: Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks. IEEE Transactions on Computers 53, 241–250 (2004)

    Article  Google Scholar 

  8. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265 (2000)

    Google Scholar 

  9. Ruiz, L.B., Wong, H.C., Siqueira, I.G., Marcos, J., Nogueira, S., Loureiro, A.A.F.: Fault Management in Event-driven Wireless Sensor Networks. In: Proceedings of the 7th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 149–156 (June 2004)

    Google Scholar 

  10. Du, W., Fang, L., Ning, P.: LAD: Localization Anomaly Detection for Wireless Sensor Networks. In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), Denver, Colorado, USA, April 3-8 (2005)

    Google Scholar 

  11. Junior, W., Figueriredo, T., Wong, H.-C., Loureiro, A.: Malicious Node Detection in Wireless Sensor Networks. In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), Santa Fe, New Mexico, USA, April 26-30 (2004)

    Google Scholar 

  12. Szewczyk, R., Mainwaring, A., Polastre, J., Anderson, J., Culler, D.: An analysis of a large scale habitat monitoring application. In: SenSys 2004 Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 214–226. ACM Press (2004)

    Google Scholar 

  13. Lin, J., Keogh, E., Lonardi, S., Chiu, B.: A Symbolic Representation of Time Series, with Implications for Streaming Algorithms. In: Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (2003)

    Google Scholar 

  14. Hyun, O.S., Hong, C.O., Hwa Choi, Y.: A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Network. Wireless Sensor Network Scientific Research, SciRes Journal 4(3), 84–90 (2012)

    Google Scholar 

  15. Newsome, J., Shi, E., Song, D., Perrg, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: The Third International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  16. Matlab and Simulink for technical computing, http://www.mathworks.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Siranossian, A.S., Maalouf, H.W. (2013). REsilient Double WEighted TruST Based (REDWEST) WSN Using SAX. In: Zuniga, M., Dini, G. (eds) Sensor Systems and Software. S-CUBE 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 122. Springer, Cham. https://doi.org/10.1007/978-3-319-04166-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04166-7_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04165-0

  • Online ISBN: 978-3-319-04166-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics