{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:38Z","timestamp":1740141818002,"version":"3.37.3"},"reference-count":14,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100002555","name":"Seoul Women\u2019s University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002555","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,9,1]]},"abstract":"<jats:p> In ad hoc and sensor networks, reputation-based trust management schemes have been widely used to identify the malicious nodes. These schemes leverage each node's behaviors for malicious node detection and thus require a certain amount of time to observe the behaviors of nodes. In mobile sensor networks, however, malicious nodes frequently move to different locations, and thus it is likely difficult to collect enough evidence for them. Moreover, when reputation-based schemes are employed, it is not easy to revoke the malicious nodes due to the risk of false positives. To mitigate these limitations of reputation-based schemes, we propose mobile malicious node detection schemes based on software attestation technique, which virtually fulfills zero false positives. In particular, we propose a probabilistic detection scheme in which each node attests its neighboring node with a certain probability. In order to reduce the attestation overhead of the probabilistic detection scheme, we also propose the SPRT (Sequential Probability Ratio Test) based detection scheme that uses the SPRT to determine when to perform the attestations. Through analysis and simulation, we show that our proposed schemes detect mobile malicious nodes through software attestations in robust and efficient manner. <\/jats:p>","DOI":"10.1155\/2013\/839523","type":"journal-article","created":{"date-parts":[[2013,9,26]],"date-time":"2013-09-26T21:12:41Z","timestamp":1380229961000},"page":"839523","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Detection of Malicious Nodes in Mobile Sensor Networks Using Software Attestation"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-9861","authenticated-orcid":false,"given":"Jun-Won","family":"Ho","sequence":"first","affiliation":[{"name":"Department of Information Security, Seoul Women's University, Seoul 139-774, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2013,9,26]]},"reference":[{"issue":"1","key":"B1-2013-839523","first-page":"121","volume":"13","author":"Tamer A.","year":"2011","journal-title":"Ad-Hoc and Sensor Wireless Networks"},{"first-page":"66","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN \u203204)","author":"Ganeriwal S.","key":"B3-2013-839523"},{"key":"B5-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700307"},{"key":"B6-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.226"},{"key":"B8-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.44"},{"key":"B9-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"first-page":"27","volume-title":"Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS \u203205)","author":"Shaneck M.","key":"B10-2013-839523"},{"key":"B11-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"B13-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.4365698"},{"key":"B14-2013-839523","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544307"},{"volume-title":"Sequential Analysis","year":"2004","author":"Wald A.","key":"B12-2013-839523"},{"volume-title":"Proceedings of the Advanced Signal Processing (ASP \u203212)","author":"Ho J. W.","key":"B4-2013-839523"},{"first-page":"2743","volume-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM \u203205)","author":"Le Boudec J.-Y.","key":"B2-2013-839523"},{"first-page":"72","volume-title":"Proceedings of the 38th Annual Simulation Symposium","author":"PalChaudhuri S.","key":"B7-2013-839523"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/839523","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/839523","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/839523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:30:03Z","timestamp":1621197003000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/839523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,1]]},"references-count":14,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9,1]]}},"alternative-id":["10.1155\/2013\/839523"],"URL":"https:\/\/doi.org\/10.1155\/2013\/839523","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,9,1]]}}}