2016
DOI: 10.1177/1550147716657246
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks

Abstract: A sparse wireless sensor network for forest fire detection is considered. It is assumed that two types of malicious nodes can exist in this network. The malicious behaviors are assumed to be concealed through some statistical behavior. A lightweight centralized trust-based model is proposed to detect malicious or misbehaving nodes. We assume that all nodes contribute to this process through the gathering of statistical data related to communication with their neighbors. These data are periodically sent to a ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…Rikli et al [33] proposed a trust-profiling based mechanism that detects cloned nodes attack in wireless sensor networks. In this method, trust values called threshold values are determined for the subsequent adjacent nodes, and then these values are used to decide whether the observed values are less than the calculated threshold values.…”
Section: Related Workmentioning
confidence: 99%
“…Rikli et al [33] proposed a trust-profiling based mechanism that detects cloned nodes attack in wireless sensor networks. In this method, trust values called threshold values are determined for the subsequent adjacent nodes, and then these values are used to decide whether the observed values are less than the calculated threshold values.…”
Section: Related Workmentioning
confidence: 99%
“…This TS-MNDS was determined to improve the rate of detection with reduced energy cost for facilitating a superior increase in the lifetime of the network. Finally, a Trust-based Lightweight Selfish Node Detection Scheme (TLSNDS) was proposed for identifying the concealed characteristics of malicious sensor nodes in the network (Rikli and Alnasser 2016). This TLSNDS was inferred to be potential in handling the issues that emerge due to the influence of selfish and jamming attack.…”
Section: Related Workmentioning
confidence: 99%
“…5 The mobile nodes that are responsible for packet transfer have the possibility of joining or leaving the network without any constraints generally resulting in an unpredictable network structure. 6 Node cooperation in MANETs with the assumption of trustworthiness is essential due to the absence of centralized administration. The assumptions of genuineness and trustworthiness are practically violated due to the malicious intent and selfish behavior of mobile nodes.…”
Section: Introductionmentioning
confidence: 99%