Abstract

In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node's behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner.

Highlights

  • In mobile sensor networks, the attacker may capture sensor nodes and subvert them to be malicious

  • The attacker may capture sensor nodes and subvert them to be malicious. With these mobile malicious nodes, he can distort the various operations of the mobile sensor networks

  • We improve the performance of the probabilistic scheme by developing a scheme based on the SPRT (Sequential Probability Ratio Test) [11]

Read more

Summary

Introduction

The attacker may capture sensor nodes and subvert them to be malicious. To diminish this damage incurred by mobile malicious nodes, it is imperative to detect and revoke them as quickly as possible To meet this need, many researchers have proposed a variety of malicious node detection schemes in the context of ad hoc and sensor networks [1,2,3,4,5,6,7,8,9,10]. Mobile malicious nodes can control their movements in such a way to make it difficult for their malicious behaviors to be observed Another approach to deal with the malicious node detection in sensor networks is software attestation [1, 3, 5,6,7, 9, 10].

Related Work
Models
Scheme I
Scheme II
Simulation Study
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.