Adaptive security design with malicious node detection in cluster-based sensor networks

نویسندگان

  • Meng-Yen Hsieh
  • Yueh-Min Huang
  • Han-Chieh Chao
چکیده

Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Therefore, sensor networks need to support an authentication service for sensor identity and message transmission. Furthermore, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. This study provides adaptive security modules to improve secure communication of cluster-based sensor networks. A dynamic authentication scheme in the proposed primary security module enables existing nodes to authenticate new incoming nodes, triggering the establishment of secure links and broadcast authentication between neighboring nodes. This primary security design prevents intrusion from external malicious nodes using the authentication scheme. For advanced security design, the proposed intrusion detection module can exclude internal compromised nodes, which contains alarm return, trust evaluation, and black/white lists schemes. This study adopts the two above mentioned modules to achieve secure communication in cluster-based sensor networks when the network lifetime is divided into multiple cluster rounds. Finally, the security analysis results indicate that the proposed design can prevent and detect malicious nodes with a high probability of success by cluster-based and neighbor monitor mechanisms. According to the performance evaluation results, the proposed security modules cause low storage, computation, and communication overhead to sensor nodes. 2007 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks

Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...

متن کامل

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

Role of Key Management for Detection of Malicious Nodes in Wireless Sensor Networks

In order to obtain security in Wireless Sensor Networks (WSN), it is imperative to be able to encrypt messages sent among sensor nodes. Keys must be distributed in an organized way and must be agreed upon by various communicating nodes. Achieving such key agreement in resource constrained sensor nodes is a great challenge. The paper outlines some important concepts and requirements in key manag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2007