Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks

There has been a rise in the use of Wireless Sensor Networks (WSNs) in several fields. Depending on the malicious actions, attacks on WSN can take many forms. This research demonstrates how to leverage request and response data from each node to pinpoint the location of malicious nodes. If a node is...

Full description

Saved in:
Bibliographic Details
Main Authors: Bhanu Priyanka Valluri, Nitin Sharma
Format: Article
Language:English
Published: Elsevier 2024-12-01
Series:Measurement: Sensors
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2665917424001351
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846145974953574400
author Bhanu Priyanka Valluri
Nitin Sharma
author_facet Bhanu Priyanka Valluri
Nitin Sharma
author_sort Bhanu Priyanka Valluri
collection DOAJ
description There has been a rise in the use of Wireless Sensor Networks (WSNs) in several fields. Depending on the malicious actions, attacks on WSN can take many forms. This research demonstrates how to leverage request and response data from each node to pinpoint the location of malicious nodes. If a node is malevolent, it will prohibit data from being sent to other nodes. They do an excellent job of pretending to be someone else. To enhance route quality, packet dropping can be used to perform a Denial of Service (DoS) assault by rejecting data packets and cutting them off from their destinations. The primary goal of this research is to expose malicious nodes within the network. To avoid being attacked by the false information fed by the adversary through compromised nodes, it is crucial to discover and isolate the nodes that have been compromised. Unfortunately, flat topology networks are difficult to keep safe because of their limited scalability and substantial communication overhead. By computing the packet drop and throughput values with valid nodes, efficient security architecture for the WSN can be proposed, allowing for the detection of malicious activity. If sensor networks are susceptible to attacks, they will be unable to fulfill their duty in a variety of event detection applications. Malicious nodes can cause unacceptable drops in event detection effectiveness and spikes in false alarm rates by producing fake readings and deceptive information. In this research, a method for identifying malicious nodes in WSNs is proposed. This research considers a Trusted Head Node (THN) for monitoring the nodes behaviour in the network to detect the malicious actions in the network. This research proposes a Trusted Head Node for Node Behaviour Analysis for Malicious Node Detection (THN-NBA-MND) in WSN. The proposed model based on node behaviour analysis in frequent time intervals; detect the malicious nodes to improve the network performance in data transmission. The proposed model when contrasted with the existing model performs better in malicious node detection.
format Article
id doaj-art-aca807fa843b4d928ccecae92198399b
institution Kabale University
issn 2665-9174
language English
publishDate 2024-12-01
publisher Elsevier
record_format Article
series Measurement: Sensors
spelling doaj-art-aca807fa843b4d928ccecae92198399b2024-12-02T05:05:17ZengElsevierMeasurement: Sensors2665-91742024-12-0136101159Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networksBhanu Priyanka Valluri0Nitin Sharma1Corresponding author.; Department of Electronics and Communication Engineering, Chandigarh University, Gharuan, Punjab, 140413, IndiaDepartment of Electronics and Communication Engineering, Chandigarh University, Gharuan, Punjab, 140413, IndiaThere has been a rise in the use of Wireless Sensor Networks (WSNs) in several fields. Depending on the malicious actions, attacks on WSN can take many forms. This research demonstrates how to leverage request and response data from each node to pinpoint the location of malicious nodes. If a node is malevolent, it will prohibit data from being sent to other nodes. They do an excellent job of pretending to be someone else. To enhance route quality, packet dropping can be used to perform a Denial of Service (DoS) assault by rejecting data packets and cutting them off from their destinations. The primary goal of this research is to expose malicious nodes within the network. To avoid being attacked by the false information fed by the adversary through compromised nodes, it is crucial to discover and isolate the nodes that have been compromised. Unfortunately, flat topology networks are difficult to keep safe because of their limited scalability and substantial communication overhead. By computing the packet drop and throughput values with valid nodes, efficient security architecture for the WSN can be proposed, allowing for the detection of malicious activity. If sensor networks are susceptible to attacks, they will be unable to fulfill their duty in a variety of event detection applications. Malicious nodes can cause unacceptable drops in event detection effectiveness and spikes in false alarm rates by producing fake readings and deceptive information. In this research, a method for identifying malicious nodes in WSNs is proposed. This research considers a Trusted Head Node (THN) for monitoring the nodes behaviour in the network to detect the malicious actions in the network. This research proposes a Trusted Head Node for Node Behaviour Analysis for Malicious Node Detection (THN-NBA-MND) in WSN. The proposed model based on node behaviour analysis in frequent time intervals; detect the malicious nodes to improve the network performance in data transmission. The proposed model when contrasted with the existing model performs better in malicious node detection.http://www.sciencedirect.com/science/article/pii/S2665917424001351Wireless sensor networksTrusted nodesNode behaviourData lossMalicious nodeNetwork performance
spellingShingle Bhanu Priyanka Valluri
Nitin Sharma
Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
Measurement: Sensors
Wireless sensor networks
Trusted nodes
Node behaviour
Data loss
Malicious node
Network performance
title Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
title_full Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
title_fullStr Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
title_full_unstemmed Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
title_short Trusted head node for Node Behaviour Analysis for malicious node detection in wireless sensor networks
title_sort trusted head node for node behaviour analysis for malicious node detection in wireless sensor networks
topic Wireless sensor networks
Trusted nodes
Node behaviour
Data loss
Malicious node
Network performance
url http://www.sciencedirect.com/science/article/pii/S2665917424001351
work_keys_str_mv AT bhanupriyankavalluri trustedheadnodefornodebehaviouranalysisformaliciousnodedetectioninwirelesssensornetworks
AT nitinsharma trustedheadnodefornodebehaviouranalysisformaliciousnodedetectioninwirelesssensornetworks