Exploiting malicious node detection for lifetime extension of sensor networks

  • Authors:
  • R. Behnke;J. Salzmann;D. Lieckfeldt;K. Thurow;F. Golatowski;D. Timmermann

  • Affiliations:
  • University of Rostock, Institute of Applied Microelectronics and Computer Engineering, Germany;University of Rostock, Institute of Applied Microelectronics and Computer Engineering, Germany;University of Rostock, Institute of Applied Microelectronics and Computer Engineering, Germany;Center For Life Science Automation, Rostock, Germany;Center For Life Science Automation, Rostock, Germany;University of Rostock, Institute of Applied Microelectronics and Computer Engineering, Germany

  • Venue:
  • CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Wireless Sensor Networks (WSN) have attracted considerable research effort in the community during the past couple of years. One of the most challenging issues so far is the extension of network lifetime with regards to small battery capacity and self-sustained operation. Endeavors to save energy have been made on various frontiers, ranging from hardware improvements over medium access and routing protocols to network clustering and role changing strategies. In addition some authors studied failures in communication regarded as error detection. Yet, only weak attention has been paid to the detection of malicious nodes and its potential for lifetime extension. In this work, we present a short overview of detection and classification of malicious nodes in WSN and describe its potential in terms of network lifetime and reliability.