MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS

Similar documents
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

E±cient Detection Of Compromised Nodes In A Wireless Sensor Network

Improvement of Traffic System of Distributed Architecture in Wireless Sensor Networks by Entropy Calculation

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

MultiHop Routing for Delay Minimization in WSN

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

Selective Forwarding Attacks Detection in WSNs

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

Lecture 8 Wireless Sensor Networks: Overview

IMPROVE NETWORK LIFETIME AND LOAD BALANCING MOBILE DATA CLUSTERING FOR WIRELESS SENSOR NETWORKS

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Time Synchronization in Wireless Sensor Networks: CCTS

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Fault-tolerant Event Boundary Detection in Wireless Sensor Networks

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Fig. 2: Architecture of sensor node

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Communication Layer, Attacks and Security Mechanisms of Wireless Sensor Network

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

Secure Data Collection for Wireless Sensor Networks

Securing Data Packets from Vampire Attacks in Wireless Ad-hoc Sensor Network.

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

Detection of Wormhole Attacks in Wireless Sensor Networks

Spoofing Detection in Wireless Networks

Study on Wireless Sensor Networks Challenges and Routing Protocols

Scalable Distributed Diagnosis Algorithm for Wireless Sensor Networks

ISSN: [Krishan Bala* et al., 6(12): December, 2017] Impact Factor: 4.116

Comparison of Energy-Efficient Data Acquisition Techniques in WSN through Spatial Correlation

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Packet Estimation with CBDS Approach to secure MANET

Neighbor Co-ordination based Fault Node Detection Algorithm for Distributed Wireless Sensor Networks

Wireless Sensor Networks (WSN)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Intrusion Detection: Energy Efficient Approach in Assorted Wireless Sensor Networks

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

WSN Routing Protocols

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Quadratic Route Factor Estimation Technique for Routing Attack Detection in Wireless Adhoc Networks

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

References. The vision of ambient intelligence. The missing component...

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

Research on Relative Coordinate Localization of Nodes Based on Topology Control

SECURE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR NETWORKS IN THE PRESENCE OF SECURITY THREATS

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

An Intrusion Detection System for Critical Information Infrastructures Using Wireless Sensor Network Technologies

Part I. Wireless Communication

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Impact of Mobile Sink Speed on the Performance of Wireless Sensor Networks

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Application Aware Data Aggregation in Wireless Sensor Networks

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

A Novel Approach for Preventing Black-Hole Attack in MANETs Rashmi 1, Ameeta Seehra 2

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Wireless Embedded Systems ( x) Ad hoc and Sensor Networks

Effective Failure Detection Based On Round Trip Delay and Paths in Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Context-Aware Query for High-Voltage Transmission Line Fault Detection using Wireless Sensor Network

Trust Based Ad-hoc on Demand Routing Protocol for MANET

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Hierarchical Energy Efficient Clustering Algorithm for WSN

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Enhancing Security in MANET Using CCRVC Scheme

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

A Real-Time MATLAB based GUI for node placement and a shortestpath alternate route path algorithm in Wireless Sensor Networks

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

Node Clone Detection in Wireless Sensor Networks

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

Detection of Sybil Attack in Wireless Sensor Network

Reservation Packet Medium Access Control for Wireless Sensor Networks

Energy Efficient Collection Tree Protocol in Wireless Sensor Networks

High Speed Data Collection in Wireless Sensor Network

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Attack Prevention for Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks using ARC

Transcription:

MALICIOUS NODE DETECTION USING A DUAL THRESHOLD IN WIRELESS SENSOR NETWORKS Vimala.T PG Student,Master of Computer Applications, Bharathidasan Institute of Technology, Anna University, Tiruchirappalli. vimalat2011@gmail.com Nalini.S AP,Master of compuer Application, Bharathidasan institute of Technology, Anna University, Tiruchirappalli. ms_nalv@yahoo.com Abstract Sensor networks for various event detection applications cannot function effectively if they are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading reports in such a way that event detection accuracy and false alarm rates are unacceptably low and high, respectively. In our work we present a malicious node detection scheme for wireless sensor networks. Unlike others using a single threshold, the proposed scheme employs two thresholds to cope with the strong trade-off between event detection accuracy and false alarm rate, resulting in improved malicious node detection performance. In addition, each sensor node maintains the trust values of its neighboring nodes to reflect their behavior in decision-making. We use Leach Protocol for detecting the intruder (malicious) node in network with the help of secure routing approaches. Our simulation results show the comparison between the nodes with false alarm rate and Packet delivery ratio with LEACH protocol. Keywords Malicious node detection, LEACH, Wireless Sensor Network 1.1 Background I INTRODUCTION A wireless sensor network is a spatially distributed autonomous sensors networks to monitor physical and environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the networks to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance, today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The WSN is built of "nodes from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts, a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. 1344

Fig. 1 Architecture of WSNs The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. Fig: 2 :Multi-hop Clustering (Flat Architecture) Fig. 3. : Multi-hop Clustering (Hierarchal Architecture) 1.2 Related work Wireless sensor networks consist of a large number of tiny low-power sensor nodes, each with sensing, computation and wireless communication capabilities [1,2]. Since sensor nodes are often deployed in open and unattended environments, they are vulnerable to a wide variety of attacks. Compromised sensor nodes may report data opposite to their own readings to their neighbors or the base station, and thus, any decision based on the reports might be wrong. Such malicious nodes behaving arbitrarily might cause significant damage or shorten the network lifetime. Hence, it is necessary to detect malicious nodes in the presence of noise, faults and events and to isolate them from the rest of the network. Various fault or anomaly detection schemes have been proposed in the literature [3 6] to enhance the reliability of wireless sensor networks. Due to the communication overhead, most schemes are developed based on either distributed or hierarchical models. As the fault or error models for detection, noise, transient and permanent faults are typically used. Sensor readings that appear to be inconsistent with the remainder of the data set are the 1345

main target of the detection. Event detection in the presence of faults in wireless sensor networks has also been investigated in [7 12]. In [7], Bayesian fault recognition algorithms are presented, exploiting the notion that sensor errors due to faulty equipment are likely to be uncorrelated, while environmental conditions are spatially correlated. Ding et al. [8] proposed a localized fault-tolerant event boundary detection algorithm for sensor networks based on statistics. A clustering technique using the maximum spanning trees is presented in [10] to achieve faulttolerance in event boundary detection. The importance of the discrimination between events and measurement errors in sensor networks has been emphasized in [12]. In fault, event or anomaly detection in wireless sensor networks, malicious nodes are often ignored or lightly treated, although they are likely to appear in the networks. In the case where malicious nodes generate arbitrary readings that do not conform to the defined fault model, the resulting performance might be much poorer than the estimated one. Moreover, if they behave intelligently, it would be more difficult to detect events in the face of misleading reports or to distinguish events from false alarms due to the malicious nodes. Several schemes have been presented to detect malicious nodes in wireless sensor networks [13 17]. Curiac et al. [13] proposed a detection scheme using the auto regression technique. Signal strength is used to detect malicious nodes in [14], where a message transmission is considered suspicious if the strength is incompatible with the originator s geographical position. Xiao et al. developed a mechanism for rating sensors in terms of correlation by exploring the Markov Chain [15]. A network voting algorithm is introduced to determine faulty sensor readings. Atakli et al. [16] proposed a malicious node detection scheme using weighted trust evaluation for a three-layer hierarchical sensor network. Trust values are employed and updated to identify malicious nodes behaving opposite to the sensor readings. Based on the same model, a weight recovery mechanism is introduced in [17]. Another intrusion detection scheme based on similar weighted trust evaluation was proposed in [18]. The mistaken ratio of each individual sensor node is used in updating the trust values. Trust management schemes have been proposed in routing and communications [19]. Some efforts are also being made to combine communication and data trusts [20]. However, malicious node detection in the presence of various types of misleading sensor readings due to the compromised nodes have not been deeply investigated. In addition, the problem of distinguishing malicious nodes from events has not sufficiently been taken into account. In this paper, we present a malicious node detection scheme for fault-prone wireless sensor networks. Malicious nodes are detected in the presence of noise, sensor faults and events. Two thresholds are used to minimize false alarms while maintaining high malicious node detection accuracy. Trust values of sensor nodes are employed to reflect their past behavior in decision-making. Besides, the scheme achieves an improved event region detection accuracy, resulting in more accurate malicious node detection performance. II IMPLEMENTATION Several schemes have been presented to detect malicious nodes in wireless sensor networks. Curiac et al. proposed a detection scheme using the auto regression technique. Signal strength I s used to detect malicious nodes, where a message transmission is considered suspicious if the strength is incompatible with the originator s geographical position. Xiao et al. developed a mechanism for rating sensors in terms of correlation by exploring the Markov Chain. A network voting algorithm is introduced to determine faulty sensor readings. Atakli et al. proposed a malicious node detection scheme using weighted trust evaluation for a three-layer hierarchical sensor network. Trust values are employed and updated to identify malicious nodes behaving opposite to the sensor readings. Based on the same model, a weight recovery mechanism is introduced Another intrusion detection scheme based on similar weighted trust evaluation was proposed. The mistaken ratio of each individual sensor node is used in updating the trust values. Trust management schemes have been proposed in routing and communications. Some efforts are also being made to combine communication and data trusts. However, malicious node detection in the presence of various types of misleading sensor readings due to the compromised nodes have not been deeply investigated. In addition, the problem of distinguishing malicious nodes from events has not sufficiently been taken into account. 1346

Sensor networks for various event detection applications cannot function effectively if they are vulnerable to attacks. Malicious nodes can generate incorrect readings and misleading reports in such a way that event detection accuracy and false alarm rates are unacceptably low and high, respectively. In our work we present a malicious node detection scheme for wireless sensor networks. Unlike others using a single threshold, the proposed scheme employs two thresholds to cope with the strong trade-off between event detection accuracy and false alarm rate, resulting in improved malicious node detection performance. In addition, each sensor node maintains the trust values of its neighboring nodes to reflect their behavior in decision-making. We use Leach Protocol for detecting the intruder (malicious) node in network with the help of thresholding values in secure routing approaches. Our simulation results show the comparison between the nodes with false alarm rate and Packet delivery ratio with LEACH protocol. Using LEACH protocol to detect the malicious nodes with the help of trust values in nodes in wireless sensor network 4. Performance analysis for false alarm rate with node characteristics 2.1 Network Creation: In this module, we are going to connect the network.each node is connected the neighboring node and it is independently deployed in network area. And also deploy the each port no is authorized in a node. 2.2 Node Network Configuration In this module, browse and select the source file. And selected data is converted into fixed size of packets. And the packet is send from source to detector. 2.3 Threshold validation The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this module check whether the path is authorized or unauthorized. If path is authorized the packet is send to valid destination. Otherwise the packet will be deleted. According port no only we are going to find the path is authorized or Unauthorized node via. We can check the thresholding values in nodes with respective to sink node. 2.4 Performance Analysis: In this module, we analyze the false alarm rate and other performances with respect to thresholding based intrusion detection process.. III RESULTS AND DISCUSSIONS Fig 4 : A representation of trust values using digraph. Implementation Module 1. Create the random number of nodes for making Network 2. Parameter initialization with cluster formation 3. Trust and threshold value validation Malicious node detection schemes have to achieve high MDR while maintaining low MR. They also need to maintain high EDA while eeping FAR extremely low. In addition, ERDR and BFAR that help identify malicious nodes in an event region also need to be high and low, respectively. To show the effectiveness of the proposed scheme, we first performed a simulation to estimate MDR, MR and FAR for various values of pma when d = 12, pt = 0.1, pp = 0.1, pm = 0.1, = 0.1 and = 0.02. 1347

The results after 100 cycles of operation are shown in Figure 4, where three different values of (1,2), (0.5,0.4), (0.5,0.5) and (0.6,0.4) are chosen for comparison purposes. MDR for pma >0.2 are very close to 1 for all the three cases under comparison, as shown in Figure 4(a) since = 5. For the chosen values of and, even the nodes reporting a 1 every five cycles on average lose their weights to be eventually detected. As pma approaches 0, malicious nodes behave similar to normal nodes. Hence, it is not easy to detect them, although they do not cause any significant harm. Further improvements in MDR, as long as Pinv > pt, can be made by decreasing the value of accordingly. MDR for = 0.1 and = 0.0125 instead is shown in Figure 5, where notable improvements in MDR are observed for relatively small values of pma. Since 8 in that case, sensor nodes reporting a 1 every eight cycles still lose their weights with time to be eventually detected. If pt = 0.1 and pma = 0.1, for example, Pinv = 0.1 0.9 + 0.9 0.1 = 0.18. Hence, malicious nodes with pma = 0.1, when pt = 0.1, report a 1 every five cycles, approximately, and thus, they cannot remain undetected, although it takes more time to detect them. Fig 6: comparison between pma with false alarm rate Fig7: compare with existing and proposed method Fig 5 : Node creation in wireless sensor network IV CONCLUSION A malicious node detection scheme using a dual threshold in wireless sensor networks is presented. Each sensor node maintains trust values of neighboring nodes to reflect their past behavior in decision-making. Two thresholds are used to reduce the false alarm rate and enhance the event region detection accuracy, resulting in more accurate malicious node detection performance without sacrificing normal nodes. Simulation results have shown that the scheme with a dual threshold outperforms that with a single threshold. The proposed scheme employs a few parameters whose values can be properly chosen depending on applications. They can also be dynamically adjusted, if necessary, to optimize the performance. 1348

REFERENCES 1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cyirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393 422. 2. Mainwaring, A.; Polaste, J.; Szewczyk, R.; Culler, D.; Anderson, J. Wireless Sensor Networks for Habitat Monitoring. In Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, GA, USA, 28 September 2002; pp. 88 97. 3. Yu, M.; Mokhtar, H.; Merabti, M. Fault management in wireless sensor networks. IEEE Wirel. Commun. 2007, 14, 13 19. 4. Xu, X.; Zhou, B.; Wan, J. Tree Topology Based Fault Diagnosis in Wireless Sensor Networks. In Proceedings of the International Conference on Wirleess Networks and Infomation Systems, Shanghai, China, 28 29 December 2009; pp. 65 69. 5. Lee, M.H.; Choi, Y.-H. Fault detection of wireless sensor networks. Comput. Commun. 2008, 31, 3469 3475. 6. Rajasegarar, S.; Leckie, C.; Palaniswami, M. Anomaly detection in wireless sensor networks. IEEE Wire. Commun. 2008, 15, 34 40. 7. Krishnamachari, B.; Iyengar, S. Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks. IEEE Trans. Comput. 2004, 53, 241 250. 8. Ding, M.; Chen, D.; Xing, K.; Cheng, X. Localized Faulttolerant Event Boundary Detection in Sensor Networks. In Proceedings of the IEEE International Conference on Computer Communications, Miami, FL, USA, 13 17 March 2005; pp. 902 913. 9. Luo, X.; Dong, M.; Huang, Y. On distributed fault-tolerant detection in wireless sensor networks. IEEE Trans. Comput. 2006, 55, 58 70. 10. Li, C.-R.; Liang, C.-K. A fault-tolerant event boundary detection algorithm in sensor networks. LNCS 2008, 5200, 406 414. 11. Xiang, Y.; Li, H.; Xie, Z.; Li, P. Distributed Weighting Fault-Tolerant Algorithm for Event Region Detection in Wireless Sensor Networks. In Proceedings of the International Conference on Communications, Circuits and Systems, Changsha, China, 25 27 May 2008; pp. 414 418. 12. Cui, X.; Li, Q.; Zhao, B. Data discrimination in fault-prone sensor networks. Wirel. Sens. Netw. 2010, 12, 285 292. 13. Curiac, D.I.; Banias, O.; Dragan, F.; Volosencu, C.; Dranga, O. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique. In Proceedings of the 3 rd International Conference on Networking and Services, Athens, Greece, 19 25 June 2007; p. 83. 14. Pires, W.R., Jr.; Figueiredo, T.; Wong, H.; Loureiro, A. Malicious Node Detection in Wireless Sensor Networks. In Proceedings of the 18th International Parallel and Distributed Processing Symposiuim, Santa Fe, NM, USA, 26 30 April 2004. 15. Xiao, X.-Y.; Peng, W.-C.; Hung, C.-C.; Lee, W.-C. Using Sensor Ranks for In-network Detection of Faulty Readings in Wireless Sensor Networks. In Proceedings of the International Workshop Data Engieering for Wireless and Mobile Access, Beijing, China, 10 June 2007; pp. 1 8. 16. Atakli, I.M.; Hu, H.; Chen, Y.; Ku, W.-S.; Su, Z. Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation. In Proceedings of the 2008 Spring Simulation Multiconference, Ottawa, Canada, 14-17 April 2008; pp. 836 842. 17. Hu, H.; Chen, Y.; Ku, W.-S.; Su, Z.; Chen, C.-H. Weighted trust evaluation-based malicious node detection for wireless sensor networks. Int. J. Inf. Comput. Security 2009, 3, 132 149. 18. Ju, L.; Li, H.; Liu, Y.; Xue, W.; Li, K.; Chi, Z. An Improved Detection Scheme Based on Weighted Trust Evaluation forwireless Sensor Networks. In Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications, Hainan, China, 16 18 December 2010; pp. 1 6. 19. Momani, M.; Challa, S. Survey of trust models in different network domain. Int. J. Ad hoc Sens. Ubiquitous Comput. (IJASUC) 2010, 1, 1 19. 20. Momani, M.; Challa, S.; Alhmouz, R. Can We Trust Trusted Nodes in Wireless Sensor Networks?In Proceedings of the International Conference Computer and Communication Engineering, Kuala Lumpur, Malaysia, 13 15 May 2008; pp. 1227 1232. 1349