Research Article

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks

Table 1

Comparison of advantages and disadvantages of each scheme.

SchemesAdvantagesDisadvantages

TWOACK [14]Can be easily added to source routing protocols such as the DSR protocolGreatly increases conflict and collision of network messages
CHEMAS [15]Reduce the conflict and collision of network messagesCannot resist the collusive attacks
PHACK [16]Not only can detect a selective forwarding attack but also can recover the routing from the location at which the data were droppedThe scheme produces more ACK packets, which will consume more energy
MNDREL [17]By analyzing the reputation value for the parent node evaluated by the child node, the malicious nodes in the network are effectively identifiedThe real-time performance of the deletion model has to be improved
GRFSN [18]This scheme only needs to determine a trust thresholdNeed complex evaluation model and the trust threshold is static, and the misjudgment rate of normal nodes being judged as malicious nodes is high
DNSMTM [19]Can effectively detect malicious nodes and, with a higher detection rate, reduce the energy consumption of nodesNeed a complex evaluation model and the responsibility of monitoring nodes is too heavy
MSGSFS [20]Can effectively alleviate selective forwarding attack and has less energy consumptionNeed a complex game model and it can only solve the malicious packet loss behavior of single-hop nodes
ITEMBB [21]The model overcomes the limitations of subjective weight allocationNeed complex evaluation model and the problem of static reputation value has not been solved
SMCSF [22]Combine the neighbor node monitoring and watchdog mechanismThe responsibility of monitoring nodes is also heavy
IDSBS [23]The collected information and its treatment are performed in a distributed wayThe false detection rate of the system is high in the initial stage
MCMND [24]Use multivariate classification to classify nodesThe false detection rate is high
BTM [25]Using a blockchain intelligent contract, which can ensure the traceability of the detection processThe consensus method in the model is the traditional POW workload proof method, which requires relatively large computational power and high energy consumption
IPA [26]Each node maintains a suspicious node setNeed n rounds of detection, which will greatly increase the network communication overhead