{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:30:41Z","timestamp":1760243441014,"version":"build-2065373602"},"reference-count":20,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T00:00:00Z","timestamp":1360022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSAN"],"abstract":"<jats:p>Sensor networks for various event detection applications cannot function effectively if they are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading reports in such a way that event detection accuracy and false alarm rates are unacceptably low and high, respectively. In this paper, we present a malicious node detection scheme for wireless sensor networks. Unlike others using a single threshold, the proposed scheme employs two thresholds to cope with the strong trade-off between event detection accuracy and false alarm rate, resulting in improved malicious node detection performance. In addition, each sensor node maintains the trust values of its neighboring nodes to reflect their behavior in decision-making. Computer simulation shows that the proposed scheme achieves high malicious node detection accuracy without sacrificing normal sensor nodes and outperforms the scheme using a single threshold.<\/jats:p>","DOI":"10.3390\/jsan2010070","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T11:11:11Z","timestamp":1360062671000},"page":"70-84","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks"],"prefix":"10.3390","volume":"2","author":[{"given":"Sung","family":"Lim","sequence":"first","affiliation":[{"name":"Department of Computer Engineering Hongik University, Seoul 121-791, Korea"}]},{"given":"Yoon-Hwa","family":"Choi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering Hongik University, Seoul 121-791, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2013,2,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","article-title":"Wireless sensor networks: A survey","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mainwaring, A., Polaste, J., Szewczyk, R., Culler, D., and Anderson, J. (2002, January 28). Wireless Sensor Networks for Habitat Monitoring. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA.","DOI":"10.1145\/570738.570751"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MWC.2007.4407222","article-title":"Fault management in wireless sensor networks","volume":"14","author":"Yu","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_4","unstructured":"Xu, X., Zhou, B., and Wan, J. (2009, January 28\u201329). Tree Topology Based Fault Diagnosis in Wireless Sensor Networks. Proceedings of the International Conference on Wirleess Networks and Infomation Systems, Shanghai, China."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1016\/j.comcom.2008.06.014","article-title":"Fault detection of wireless sensor networks","volume":"31","author":"Lee","year":"2008","journal-title":"Comput. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","article-title":"Anomaly detection in wireless sensor networks","volume":"15","author":"Rajasegarar","year":"2008","journal-title":"IEEE Wire. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TC.2004.1261832","article-title":"Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks","volume":"53","author":"Krishnamachari","year":"2004","journal-title":"IEEE Trans. Comput."},{"key":"ref_8","unstructured":"Ding, M., Chen, D., Xing, K., and Cheng, X. (2005, January 13\u201317). Localized Fault-tolerant Event Boundary Detection in Sensor Networks. Proceedings of the IEEE International Conference on Computer Communications, Miami, FL, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TC.2006.13","article-title":"On distributed fault-tolerant detection in wireless sensor networks","volume":"55","author":"Luo","year":"2006","journal-title":"IEEE Trans. Comput."},{"key":"ref_10","first-page":"406","article-title":"A fault-tolerant event boundary detection algorithm in sensor networks","volume":"5200","author":"Li","year":"2008","journal-title":"LNCS"},{"key":"ref_11","unstructured":"Xiang, Y., Li, H., Xie, Z., and Li, P. (2008, January 25\u201327). Distributed Weighting Fault-Tolerant Algorithm for Event Region Detection in Wireless Sensor Networks. Proceedings of the International Conference on Communications, Circuits and Systems, Changsha, China."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"285","DOI":"10.4236\/wsn.2010.24039","article-title":"Data discrimination in fault-prone sensor networks","volume":"12","author":"Cui","year":"2010","journal-title":"Wirel. Sens. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Curiac, D.I., Banias, O., Dragan, F., Volosencu, C., and Dranga, O. (2007, January 19\u201325). Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique. Proceedings of the 3rd International Conference on Networking and Services, Athens, Greece.","DOI":"10.1109\/ICNS.2007.79"},{"key":"ref_14","unstructured":"Pires, W.R., Figueiredo, T., Wong, H., and Loureiro, A. (2004, January 26\u201330). Malicious Node Detection in Wireless Sensor Networks. Proceedings of the 18th International Parallel and Distributed Processing Symposiuim, Santa Fe, NM, USA."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Xiao, X.-Y., Peng, W.-C., Hung, C.-C., and Lee, W.-C. (2007, January 10). Using Sensor Ranks for In-network Detection of Faulty Readings in Wireless Sensor Networks. Proceedings of the International Workshop Data Engieering for Wireless and Mobile Access, Beijing, China.","DOI":"10.1145\/1254850.1254852"},{"key":"ref_16","unstructured":"Atakli, I.M., Hu, H., Chen, Y., Ku, W.-S., and Su, Z. (2008, January 14-17). Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation. Proceedings of the 2008 Spring Simulation Multiconference, Ottawa, Canada."},{"key":"ref_17","first-page":"132","article-title":"Weighted trust evaluation-based malicious node detection for wireless sensor networks","volume":"3","author":"Hu","year":"2009","journal-title":"Int. J. Inf. Comput. Security"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Ju, L., Li, H., Liu, Y., Xue, W., Li, K., and Chi, Z. (2010, January 16\u201318). An Improved Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks. Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, Hainan, China.","DOI":"10.1109\/ICUT.2010.5677764"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijasuc.2010.1301","article-title":"Survey of trust models in different network domain","volume":"1","author":"Momani","year":"2010","journal-title":"Int. J. Ad hoc Sens. Ubiquitous Comput. (IJASUC)"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Momani, M., Challa, S., and Alhmouz, R. (2008, January 13\u201315). Can We Trust Trusted Nodes in Wireless Sensor Networks?. Proceedings of the International Conference Computer and Communication Engineering, Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCCE.2008.4580801"}],"container-title":["Journal of Sensor and Actuator Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2224-2708\/2\/1\/70\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:44:46Z","timestamp":1760219086000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2224-2708\/2\/1\/70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,5]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2013,3]]}},"alternative-id":["jsan2010070"],"URL":"https:\/\/doi.org\/10.3390\/jsan2010070","relation":{},"ISSN":["2224-2708"],"issn-type":[{"type":"electronic","value":"2224-2708"}],"subject":[],"published":{"date-parts":[[2013,2,5]]}}}