Comparing reputation schemes for detecting malicious nodes in sensor networks

19Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Remotely deployed sensor networks are vulnerable to both physical and electronic security breaches. The sensor nodes, once compromised, can send erroneous data to the base station, thereby possibly compromising network effectiveness. We assume that sensor nodes are organized in a hierarchy and use an offline neural network-based learning technique to predict the data sensed at any node given the data reported by its siblings in the hierarchy. This allows us to detect malicious nodes even when the siblings are not sensing data from the same distribution. The speed of detection of compromised nodes, however, critically depends on the mechanism used to update the reputation of the sensor nodes over time. We compare and contrast the relative strengths of a statistically grounded scheme and a reinforcement learning-based scheme both for their robustness to noise and responsiveness to change in sensor behavior. We first extend an existing mechanism to improve detection capability for smaller errors. Next we analyze the influence of different discount factors, including unweighted, exponential and linear discounts, on the tradeoff between responsiveness and robustness. We both develop a theoretical analysis to understand the tradeoff and perform experimental verification of our predictions by varying the patterns in sensed data. © The Author 2010. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved.

Cite

CITATION STYLE

APA

Mukherjee, P., & Sen, S. (2011). Comparing reputation schemes for detecting malicious nodes in sensor networks. Computer Journal, 54(3), 482–489. https://doi.org/10.1093/comjnl/bxq035

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free