Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers

Research Article

Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs

Download32 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-04283-1_23,
        author={Quazi Mamun and Rafiqul Islam and Mohammed Kaosar},
        title={Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs},
        proceedings={Security and Privacy in Communication Networks. 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2014},
        month={6},
        keywords={WSN data integrity mobile data collector compromise malicious anomaly},
        doi={10.1007/978-3-319-04283-1_23}
    }
    
  • Quazi Mamun
    Rafiqul Islam
    Mohammed Kaosar
    Year: 2014
    Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNs
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-04283-1_23
Quazi Mamun1,*, Rafiqul Islam1,*, Mohammed Kaosar1,*
  • 1: Charles Sturt University
*Contact email: qmamun@csu.edu.au, mislam@csu.edu.au, mkaosar@csu.edu.au

Abstract

This paper presents a model for ensuring data integrity using anomalous node identification in non-homogeneous wireless sensor networks (WSNs). We propose the anomaly detection technique while collecting data using mobile data collectors (MDCs), which detect the malicious activities before sending to the base station (BS). Our technique also protects the leader nodes (LNs) from malicious activities to ensure data integrity between the MDC and the LNs. The proposed approach learns the data characteristics from each sensor node and passes it to the MDC, where detection engine identifies the victim node and eventually alarm the LNs in order to keep the normal behaviour in the network. Our empirical evidence shows the effectiveness our approach.