Downloads: 110 | Views: 275
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016 | Popularity: 6.4 / 10
Survey on Recent Malicious Data Injection Detection Techniques
Pragati Hadole, Vidya Dhamdhere
Abstract: Wireless Sensor Networks are used to monitor the environmental parameters, for quick response of event detection. It is used to predict the happening of upcoming events such as, fire alarm system, intrusion detection, heart attack detection systems, military applications etc. But most of the time sensors are compromise by external entities, which arises a serious issue of security in such networks. Such Compromised sensors can report the false readings, which produce the inappropriate and most of the time dangerous responses. So there is a need of system that can appropriately identify the malicious data injected by unauthorized entities at sensor nodes. It is necessary because it is very difficult to detect such malicious data injection attacks on sensor node, if it is occur at multiple sensor nodes simultaneously in network. This paper makes survey of some recent approaches or techniques that are used for malicious data injected nodes in WSN. Also compare these approaches based on various parameters such as technique used, their advantages and limitations. At the end we suggest some research directions which will be used for further study in same field.
Keywords: Compromised nodes, event detection, wireless sensor network, malicious data injection
Edition: Volume 5 Issue 10, October 2016
Pages: 1052 - 1055
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 805 - 811Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method
Aruna Reddy H., Shivamurthy G., Rajanna M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey