International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 155 - Number 4 |
Year of Publication: 2016 |
Authors: Koriata P. Tuyaa, W. Okelo-Odongo |
10.5120/ijca2016912298 |
Koriata P. Tuyaa, W. Okelo-Odongo . Enhanced Weighted Trust Evaluation Scheme for Detection of Malicious Nodes in Wireless Sensor Networks. International Journal of Computer Applications. 155, 4 ( Dec 2016), 32-38. DOI=10.5120/ijca2016912298
Wireless Sensor Networks (WSNs) present myriad application opportunities for several applications areas such as precision agriculture, environmental monitoring, traffic control, industrial process monitoring and control, home automation and mission-critical applications such as military surveillance, healthcare applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission-critical tasks, security is an essential requirement. An adversary can easily compromise sensor nodes due to unique constraints inherent in WSNs such as limited sensor node energy, limited computational and communication capabilities and the hostile deployment environments. These WSNs unique challenges render existing traditional security schemes used in traditional networks inadequate and inefficient. An adversary may take control of some sensor nodes and use them to inject false data with the aim of misleading the network’s operator (Byzantine attack). It is therefore critical and crucial to detect and isolate malicious nodes so as to prevent attacks that can be launched from these nodes and more importantly avoid being misled by incorrect falsified information introduced by the adversary. This research explores and gives emphasis on improving Weighted Trust Evaluation (WTE) as a technique for detecting and isolating these malevolent nodes. Extensive simulation is performed using MATLAB in which the results show the proposed enhanced WTE based algorithm has the ability to detect and isolate malicious nodes; both malicious sensor nodes and malicious forwarding nodes in WSNs at a reasonable detection rate and short response time whilst achieving good scalability.