Journal article Open Access

Countering Intelligent Dependent Malicious Nodes in Target Detection Wireless Sensor Networks

Althunibat, Saud; Antonopoulos, Angelos; Kartsakli, Elli; Granelli, Fabrizio; Verikoukis, Christos

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="URL"></identifier>
      <creatorName>Althunibat, Saud</creatorName>
      <affiliation>Al-Hussein Bin Talal University (AHU)</affiliation>
      <creatorName>Antonopoulos, Angelos</creatorName>
      <affiliation>Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)</affiliation>
      <creatorName>Kartsakli, Elli</creatorName>
      <affiliation>IQUADRAT Informatica S.L</affiliation>
      <creatorName>Granelli, Fabrizio</creatorName>
      <affiliation>University of Trento</affiliation>
      <creatorName>Verikoukis, Christos</creatorName>
      <affiliation>Centre Tecnològic de Telecomunicacions de Catalunya (CTTC)</affiliation>
    <title>Countering Intelligent Dependent Malicious Nodes in Target Detection Wireless Sensor Networks</title>
    <date dateType="Issued">2016-09-01</date>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.1109/JSEN.2016.2606759</relatedIdentifier>
    <rights rightsURI="">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">&lt;p&gt;Target detection wireless sensor networks (WSNs), where binary decisions are transmitted to declare the presence or absence of a given target, are expected to have a fundamental role in the Internet of Things era. However, their simplicity makes these networks very susceptible to malicious attacks, while the problem is aggravated in the presence of intelligent malicious nodes that adapt their strategy depending on the behavior of other nodes in the network. In this paper, first, we analytically demonstrate that dependent and independent malicious nodes have the same impact on the overall performance of target detection WSNs in terms of detection and false alarm rates. Then, taking into account that dependent malicious users cannot be detected by conventional algorithms, we introduce an effective algorithm that detects malicious nodes in the network regardless of their type and number. Finally, theoretical and simulation results are provided to show the effects of dependent malicious nodes and analyze the performance of the proposed algorithm compared with the existing state-of-the-art works.&lt;/p&gt;</description>
    <description descriptionType="Other">Grant numbers : This work is funded by CellFive (TEC2014-60130-P) and by the Catalan Government 2014-SGR-1551.© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.</description>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/692480/">692480</awardNumber>
      <awardTitle>Flexible FE/BE Sensor Pilot Line for the Internet of Everything</awardTitle>
Views 45
Downloads 62
Data volume 76.4 MB
Unique views 45
Unique downloads 62


Cite as