Journal article Open Access

Countering Intelligent Dependent Malicious Nodes in Target Detection Wireless Sensor Networks

Althunibat, Saud; Antonopoulos, Angelos; Kartsakli, Elli; Granelli, Fabrizio; Verikoukis, Christos


DCAT Export

<?xml version='1.0' encoding='utf-8'?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:adms="http://www.w3.org/ns/adms#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dct="http://purl.org/dc/terms/" xmlns:dctype="http://purl.org/dc/dcmitype/" xmlns:dcat="http://www.w3.org/ns/dcat#" xmlns:duv="http://www.w3.org/ns/duv#" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:frapo="http://purl.org/cerif/frapo/" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:gsp="http://www.opengis.net/ont/geosparql#" xmlns:locn="http://www.w3.org/ns/locn#" xmlns:org="http://www.w3.org/ns/org#" xmlns:owl="http://www.w3.org/2002/07/owl#" xmlns:prov="http://www.w3.org/ns/prov#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:vcard="http://www.w3.org/2006/vcard/ns#" xmlns:wdrs="http://www.w3.org/2007/05/powder-s#">
  <rdf:Description rdf:about="https://zenodo.org/record/399241">
    <rdf:type rdf:resource="http://www.w3.org/ns/dcat#Dataset"/>
    <dct:type rdf:resource="http://purl.org/dc/dcmitype/Text"/>
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/399241</dct:identifier>
    <foaf:page rdf:resource="https://zenodo.org/record/399241"/>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Althunibat, Saud</foaf:name>
        <foaf:givenName>Saud</foaf:givenName>
        <foaf:familyName>Althunibat</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Al-Hussein Bin Talal University (AHU)</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Antonopoulos, Angelos</foaf:name>
        <foaf:givenName>Angelos</foaf:givenName>
        <foaf:familyName>Antonopoulos</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Kartsakli, Elli</foaf:name>
        <foaf:givenName>Elli</foaf:givenName>
        <foaf:familyName>Kartsakli</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>IQUADRAT Informatica S.L</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Granelli, Fabrizio</foaf:name>
        <foaf:givenName>Fabrizio</foaf:givenName>
        <foaf:familyName>Granelli</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>University of Trento</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:creator>
      <rdf:Description>
        <rdf:type rdf:resource="http://xmlns.com/foaf/0.1/Agent"/>
        <foaf:name>Verikoukis, Christos</foaf:name>
        <foaf:givenName>Christos</foaf:givenName>
        <foaf:familyName>Verikoukis</foaf:familyName>
        <org:memberOf>
          <foaf:Organization>
            <foaf:name>Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)</foaf:name>
          </foaf:Organization>
        </org:memberOf>
      </rdf:Description>
    </dct:creator>
    <dct:title>Countering Intelligent Dependent Malicious Nodes in Target Detection Wireless Sensor Networks</dct:title>
    <dct:publisher>
      <foaf:Agent>
        <foaf:name>Zenodo</foaf:name>
      </foaf:Agent>
    </dct:publisher>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#gYear">2016</dct:issued>
    <frapo:isFundedBy rdf:resource="info:eu-repo/grantAgreement/EC/H2020/692480/"/>
    <schema:funder>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </schema:funder>
    <dct:issued rdf:datatype="http://www.w3.org/2001/XMLSchema#date">2016-09-01</dct:issued>
    <owl:sameAs rdf:resource="https://zenodo.org/record/399241"/>
    <adms:identifier>
      <adms:Identifier>
        <skos:notation rdf:datatype="http://www.w3.org/2001/XMLSchema#anyURI">https://zenodo.org/record/399241</skos:notation>
        <adms:schemeAgency>url</adms:schemeAgency>
      </adms:Identifier>
    </adms:identifier>
    <owl:sameAs rdf:resource="https://doi.org/10.1109/JSEN.2016.2606759"/>
    <dct:description>&lt;p&gt;Target detection wireless sensor networks (WSNs), where binary decisions are transmitted to declare the presence or absence of a given target, are expected to have a fundamental role in the Internet of Things era. However, their simplicity makes these networks very susceptible to malicious attacks, while the problem is aggravated in the presence of intelligent malicious nodes that adapt their strategy depending on the behavior of other nodes in the network. In this paper, first, we analytically demonstrate that dependent and independent malicious nodes have the same impact on the overall performance of target detection WSNs in terms of detection and false alarm rates. Then, taking into account that dependent malicious users cannot be detected by conventional algorithms, we introduce an effective algorithm that detects malicious nodes in the network regardless of their type and number. Finally, theoretical and simulation results are provided to show the effects of dependent malicious nodes and analyze the performance of the proposed algorithm compared with the existing state-of-the-art works.&lt;/p&gt;</dct:description>
    <dct:description>Grant numbers : This work is funded by CellFive (TEC2014-60130-P) and by the Catalan Government 2014-SGR-1551.© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</dct:description>
    <dct:accessRights rdf:resource="http://publications.europa.eu/resource/authority/access-right/PUBLIC"/>
    <dct:accessRights>
      <dct:RightsStatement rdf:about="info:eu-repo/semantics/openAccess">
        <rdfs:label>Open Access</rdfs:label>
      </dct:RightsStatement>
    </dct:accessRights>
    <dcat:distribution>
      <dcat:Distribution>
        <dct:license rdf:resource="https://creativecommons.org/licenses/by/4.0/legalcode"/>
        <dcat:accessURL rdf:resource="https://zenodo.org/record/399241"/>
      </dcat:Distribution>
    </dcat:distribution>
    <dcat:distribution>
      <dcat:Distribution>
        <dcat:accessURL>https://doi.org/10.1109/JSEN.2016.2606759</dcat:accessURL>
        <dcat:byteSize>1231696</dcat:byteSize>
        <dcat:downloadURL>https://zenodo.org/record/399241/files/Countering Intelligent Dependent Malicious Nodes.pdf</dcat:downloadURL>
        <dcat:mediaType>application/pdf</dcat:mediaType>
      </dcat:Distribution>
    </dcat:distribution>
  </rdf:Description>
  <foaf:Project rdf:about="info:eu-repo/grantAgreement/EC/H2020/692480/">
    <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">692480</dct:identifier>
    <dct:title>Flexible FE/BE Sensor Pilot Line for the Internet of Everything</dct:title>
    <frapo:isAwardedBy>
      <foaf:Organization>
        <dct:identifier rdf:datatype="http://www.w3.org/2001/XMLSchema#string">10.13039/501100000780</dct:identifier>
        <foaf:name>European Commission</foaf:name>
      </foaf:Organization>
    </frapo:isAwardedBy>
  </foaf:Project>
</rdf:RDF>
45
62
views
downloads
Views 45
Downloads 62
Data volume 76.4 MB
Unique views 45
Unique downloads 62

Share

Cite as