Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation

Anes Yessembayev, Dilip Sarkar, Faisal Sikder

Research output: Contribution to journalArticle

3 Scopus citations

Abstract

Most of the sensor nodes have multiple inexpensive and unreliable sensors embedded in them. For many applications, readings from multiple sensors are aggregated. However, the presence of malicious attacks adds a challenge to sensor data aggregation. Detection of those compromised and unreliable sensors and sensor nodes is important for robust data aggregation as well as their management and maintenance. In this work, we develop a method for identification of good and bad sensor nodes and apply it for secure data aggregation algorithms. We consider altered/unreliable readings as outliers and identify them using an augmented and modified version of a local outlier factor computation method. We use the outlier detection algorithm for reliable and unreliable sensor detection and use the results from this algorithm for an unreliable sensor-node identification algorithm. We show its usefulness for secure data aggregation algorithms. Extensive evaluations of the proposed algorithm show that it identifies good and bad nodes and estimates true sensor value efficiently.

Original languageEnglish (US)
Article number8247263
Pages (from-to)549-563
Number of pages15
JournalIEEE Transactions on Signal and Information Processing over Networks
Volume4
Issue number3
DOIs
StatePublished - Sep 1 2018

Keywords

  • collusion attacks
  • data aggregation
  • good and bad sensor-node detection
  • local outlier factor
  • Sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

Fingerprint Dive into the research topics of 'Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation'. Together they form a unique fingerprint.

  • Cite this