International Conference on Networking and Services (ICNS '07) 2007
DOI: 10.1109/icns.2007.79
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique

Abstract: In this paper we propose a strategy based on past/present values provided by each sensor of a network for detecting their malicious activity. Basically, we will compare at each moment the sensor's output with its estimated value computed by an autoregressive predictor. In case the difference between the two values is higher then a chosen threshold, the sensor node becomes suspicious and a decision block is activated.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0
1

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(28 citation statements)
references
References 14 publications
0
26
0
1
Order By: Relevance
“…The work reported in Curiac et al (2007) is the closest to our approach. They proposed to detect a malicious node by comparing its output with an aggregation value.…”
Section: Related Workmentioning
confidence: 97%
“…The work reported in Curiac et al (2007) is the closest to our approach. They proposed to detect a malicious node by comparing its output with an aggregation value.…”
Section: Related Workmentioning
confidence: 97%
“…We evaluated our approach for outlier detection by comparing with MBOD [3] and AROD [6] on data sets from [1]. Figure 3 (a) shows the outliers detected by the three methods (MBOD, AROD and KDE-Track) when applied on the dew point data set from [1] from January to June, 2011, with more than 260K data points.…”
Section: Density-based Outlier Detectionmentioning
confidence: 99%
“…An auto-regression based outlier detection (AROD) proposed in [6] identifies malicious nodes in wireless sensor network by building an AR-model to predict the value of the new incoming data based on the latest set of observed data samples. If the difference between the predicted and the actual values is greater than a predefined threshold then the point is declared as an outlier.…”
Section: Density-based Outlier Detectionmentioning
confidence: 99%
“…In [16][17][18] researchers were primarily concerned with identifying suspicious nodes. In [19], Curiac et al proposed detecting a malicious node by comparing its output with its estimated value computed by an autoregressive predictor. In [20], Du et al proposed a scheme to detect malicious attacks in localizations.…”
Section: Related Workmentioning
confidence: 99%