Compromised sensor nodes may collude to segregate a specific region of the sensor network preventing event reporting packets in this region from reaching the basestation. Additionally, they can cause skepticism over all data collected. Identifying and segregating such compromised nodes while identifying the type of attack with a certain confidence level is critical to the smooth functioning of a sensor network. Existing work specializes in preventing or identifying a specific type of attack and lacks a unified architecture to identify multiple attack types. Dynamic Camouflage Event-Based Malicious Node Detection Architecture (D-CENDA) is a proactive architecture that uses camouflage events generated by mobile-nodes to detect malicious nodes while identifying the type of attack. We exploit the spatial and temporal information of camouflage event while analyzing the packets to identify malicious activity. We have simulated D-CENDA to compare its performance with other techniques that provide protection against individual attack types and the results show marked improvement in malicious node detection while having significantly less false positive rate. Moreover, D-CENDA can identify the type of attack and is flexible to be configured to include other attack types in future.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426
Chen H, Wu H, Zhou X, Gao C (2007) Reputation-based trust in wireless sensor networks. In: MUE ’07: proceedings of the 2007 international conference on multimedia and ubiquitous engineering. IEEE Computer Society, Washington, pp 603–607
Ganeriwal S, Srivastava MB (2004) Reputation-based framework for high integrity sensor networks. In: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks, NY, USA
Karlof C, Sastry N, Wagner D (2004) Tinysec a link layer security architecture for wireless sensor networks. In: SenSys ’04: proceedings of the 2nd international conference on embedded networked sensor systems. ACM, New York, pp 162–175
Krontiris I, Dimitriou T, Giannetsos T, Mpasoukos M (2008) Intrusion detection of sinkhole attacks in wireless sensor networks, algorithmic aspects of wireless sensor networks. Springer, Berlin
Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput Commun 30(11–12):2353–2364
Pathan ASK, Hong CS (2008) Serp: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann Télécommun 63(9–10):529–541
Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534
Pirzada A, Mcdonald C (2005) Circumventing sinkholes and wormholes in ad-hoc wireless networks. In: International workshop on wireless ad-hoc networks, London
Pongaliur K, Xiao L, Liu A (2009) CENDA: Camouflage event based malicious node detection architecture. In: Proceedings of the 2nd IEEE international symposium on trust security and privacy for pervasive apageslications (TSP 2009), Macau, China
Roman R, Fernandez-Gago MC, Lopez J (2007) Featuring trust and reputation management systems for constrained hardware devices. In: Proceedings of the 1st international conference on autonomic computing and communication systems, Brussels, Belgium
Roosta T, Shieh S, Sastry S (2006) Taxonomy of security attacks in sensor networks and countermeasures. In: Proceedings of the first IEEE international conference on system integration and reliability improvements, Hanoi
Su CC, Chang KM, Kuo YH, Horng MF (2005) The new intrusion prevention and detection apagesroaches for clustering-based sensor networks. In: Wireless communications and networking conference, vol 4. IEEE Press, New York, pp 1927–1932
Watro R, Kong D, Cuti Sf, Gardiner C, Lynn C, Kruus P (2004) Tinypk: securing sensor networks with public key technology. In: SASN ’04: proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp 59–64
Xiao B, Yu B, Gao C (2007) Chemas: Identify suspect nodes in selective forwarding attacks. J Parallel Distrib Comput 67(11):1218–1230
Xiao Y (2006) Security in sensor networks. Auerbach Publications, Boca Raton
About this article
Cite this article
Pongaliur, K., Xiao, L. & Liu, A.X. Dynamic camouflage event based malicious node detection architecture. J Supercomput 64, 717–743 (2013). https://doi.org/10.1007/s11227-010-0508-x