Abstract
Wireless sensor networks are usually deployed in complex environments; an attacker can easily inject false data by capturing nodes, causing serious consequences. The main work of this paper is as follows. Firstly, the logical loop model is created based on the estimated value of the source events of every wireless sensor network node. Secondly, each node based on RSSI find neighbor nodes by establishing consistency loop model. Finally, the malicious node is determined by comparing the similarities and differences of the nodes between the two loop models. The simulation shows that this mechanism is effective to inhibit the infringement of malicious nodes to the network, and improve network security performance.
This research was supported by the Key Technology R&D Project of Jiangsu Province (Grant No. BE2010026).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lindsey, S., Raghavendra, C., Sivalingam, K.M.: Data gathering a1gorithms in sensor network using energy metrics. IEEE Trans on Parallel and Distributed Systems 13(9), 924–935 (2002)
Yuan, L., Qu, G.: Design Space Exploration for Energy-Efficient Secure Sensor Network. In: ASAP (2002)
Silva, A.R.D., Martins, M., Rocha, B.: Decentralized Intrusion Detection in Wireless Sensor Networks. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet 2005), pp. 16–22 (2005)
Josang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 618–644 (2007)
Hur, J., Lee, Y., Hong, S.M., Yoon, H.: Trust Management for Resilient Wireless Sensor Networks. In: Proceedings of the 8th International Conference on Information Security and Cryptology, pp. 56–68 (2005)
Vuran, M.C., Akyildiz, I.F.: Spatiotemporal correlation theory and applications for wireless sensor networks. Computer Networks Journal 45(3), 245–261 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, P., Sun, L., Yang, W., Fang, Q., Xie, J., Ma, K. (2013). False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks. In: Tan, Y., Shi, Y., Mo, H. (eds) Advances in Swarm Intelligence. ICSI 2013. Lecture Notes in Computer Science, vol 7929. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38715-9_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-38715-9_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38714-2
Online ISBN: 978-3-642-38715-9
eBook Packages: Computer ScienceComputer Science (R0)