WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Authors

  • Junlin Zhang School of Information Technology, Guangdong Technology College, Zhaoqing 526100, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1213

Keywords:

Intrusion detection, malicious node, reputation assessment, WSN

Abstract

Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical environment to obtain data information, and use wireless communication technology to provide users with information transmission services. At this stage, communication and security mechanisms are the main problems faced by WSN. This is because most of the existing sensors are powered by batteries with very limited energy, and most of them are deployed in an outdoor open environment, which is easy to be captured as a malicious node. Network attacks. However, the existing malicious node detection methods have shortcomings such as low efficiency, high energy consumption, and insufficient performance. Therefore, this paper proposes a WSN malicious node intrusion detection method based on genetic algorithm optimization of LEACH hierarchical routing protocol. Based on the optimization of the LEACH protocol by genetic algorithm, the method integrates the reputation evaluation mechanism, and screens and eliminates malicious nodes by calculating direct reputation, indirect reputation and comprehensive reputation, thereby ensuring the safe operation of WSN. The simulation results show that this method can effectively resist the attack of malicious nodes on WSN, and has obvious advantages over other methods.

Downloads

Download data is not yet available.

Author Biography

Junlin Zhang, School of Information Technology, Guangdong Technology College, Zhaoqing 526100, China

Junlin Zhang obtained his master’s degree in engineering from South China Agricultural University (2004). At present, he is working as an associate professor in the School of Information Technology of Guangdong Technology College. He is also a member of the Professional Committee of Teaching Quality Management of Guangdong Private Higher Education Institutions. He has published articles in more than 10 well-known peer-reviewed journals and conference minutes. His areas of interest include computer network security, Internet of Things technology, software technology and higher education management.

Downloads

Published

2023-03-07

How to Cite

1.
Zhang J. WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score. JCSANDM [Internet]. 2023 Mar. 7 [cited 2024 Apr. 25];12(01):55-76. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/18123

Issue

Section

Articles