Detection of Anomalous Cluster Heads and Nodes in Wireless Sensor Networks

Sare Gorgbandi, Reza Brangi
{"title":"Detection of Anomalous Cluster Heads and Nodes in Wireless Sensor Networks","authors":"Sare Gorgbandi, Reza Brangi","doi":"10.1109/ICWR54782.2022.9786227","DOIUrl":null,"url":null,"abstract":"Almost all security protocols of wireless sensor networks believe that the enemy or attacker can take full control of a sensor node through direct connection. Security is very important in accepting and using sensor networks in many applications. In order to clarify this issue, we focus on detecting anomalies in the nodes and cluster heads of wireless sensor networks, and look for a solution to detect anomalies in the nodes and cluster heads and determine new cluster heads. A group of researchers to detect anomalies have suggested Mobile Data Collectors (MDCs) machines, where some abnormal nodes may be inactive at the time of inspection and not be identified, and due to environmental problems, the machine cannot go to those places, it is also very expensive and cannot work online and cannot quickly overcome attacks. Due to the large number of sensors, it is not scalable. In this article, we first review the methods that have been proposed until now and describe their advantages and disadvantages and then propose a method that detects the anomalies of the nodes in the cluster heads and detects the anomalies of the cluster heads in the sink node, it runs without the need for external circuits and does not impose additional costs, it works online and can quickly overcome attacks. Our proposed method for evaluating performance was simulated by MATLAB software and it uses Intel Research Laboratory Database.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 8th International Conference on Web Research (ICWR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWR54782.2022.9786227","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Almost all security protocols of wireless sensor networks believe that the enemy or attacker can take full control of a sensor node through direct connection. Security is very important in accepting and using sensor networks in many applications. In order to clarify this issue, we focus on detecting anomalies in the nodes and cluster heads of wireless sensor networks, and look for a solution to detect anomalies in the nodes and cluster heads and determine new cluster heads. A group of researchers to detect anomalies have suggested Mobile Data Collectors (MDCs) machines, where some abnormal nodes may be inactive at the time of inspection and not be identified, and due to environmental problems, the machine cannot go to those places, it is also very expensive and cannot work online and cannot quickly overcome attacks. Due to the large number of sensors, it is not scalable. In this article, we first review the methods that have been proposed until now and describe their advantages and disadvantages and then propose a method that detects the anomalies of the nodes in the cluster heads and detects the anomalies of the cluster heads in the sink node, it runs without the need for external circuits and does not impose additional costs, it works online and can quickly overcome attacks. Our proposed method for evaluating performance was simulated by MATLAB software and it uses Intel Research Laboratory Database.
无线传感器网络中异常簇头和节点的检测
几乎所有无线传感器网络的安全协议都认为敌人或攻击者可以通过直接连接完全控制传感器节点。在许多应用中接受和使用传感器网络,安全性是非常重要的。为了澄清这一问题,我们将重点放在无线传感器网络中节点和簇头的异常检测上,并寻找一种检测节点和簇头异常并确定新簇头的解决方案。一组检测异常的研究人员建议使用移动数据采集器(mdc)机器,其中一些异常节点可能在检查时处于非活动状态而无法被识别,并且由于环境问题,机器无法去那些地方,它也非常昂贵,不能在线工作,不能快速克服攻击。由于大量的传感器,它是不可扩展的。在本文中,我们首先回顾了迄今为止提出的方法,并描述了它们的优缺点,然后提出了一种方法,该方法可以检测簇头中节点的异常,并在汇聚节点中检测簇头的异常,它不需要外部电路,也不增加额外的成本,它在线工作,可以快速克服攻击。采用MATLAB软件和Intel研究实验室数据库对所提出的性能评估方法进行了仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信