ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Adversary Detection in Wireless Sensor Networks Under Byzantine Attacks

Journal: International Journal of Engineering and Technical Research ( (Vol.1, No. 10)

Publication Date:

Authors : ; ;

Page : 43-45

Keywords : erpublication; IJETR;

Source : Downloadexternal Find it from : Google Scholarexternal


This work discovers reliable data fusion which overcome coverage problem in mobile access wireless sensor networks under Byzantine attacks. Consider the q-out-of-m rule, in which final decision is made based on the q sensing reports out of m polled nodes and can achieve a good trade-off between the miss detection probability and the false alarm rate. In this work, first, propose a simplified, topology construction which construct and maintains an efficient network topology. Second, propose a multicast message transmission where multicasting requires special techniques that make clear who is in the intended group of recipients. Finally, propose a simple and effective malicious node detection approach, where the malicious sensors are identified by comparing the decisions of the individual sensors with that of the fusion center. This work further proposes the adversary node detection approach and adapts the fusion parameters based on the detected malicious sensors. Simulation examples are presented to illustrate the performance of proposed approaches.

Last modified: 2017-06-25 16:21:54