International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 110

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 10, October 2016


Survey on Recent Malicious Data Injection Detection Techniques

Pragati Hadole [2] | Vidya Dhamdhere [6]


Abstract: Wireless Sensor Networks are used to monitor the environmental parameters, for quick response of event detection. It is used to predict the happening of upcoming events such as, fire alarm system, intrusion detection, heart attack detection systems, military applications etc. But most of the time sensors are compromise by external entities, which arises a serious issue of security in such networks. Such Compromised sensors can report the false readings, which produce the inappropriate and most of the time dangerous responses. So there is a need of system that can appropriately identify the malicious data injected by unauthorized entities at sensor nodes. It is necessary because it is very difficult to detect such malicious data injection attacks on sensor node, if it is occur at multiple sensor nodes simultaneously in network. This paper makes survey of some recent approaches or techniques that are used for malicious data injected nodes in WSN. Also compare these approaches based on various parameters such as technique used, their advantages and limitations. At the end we suggest some research directions which will be used for further study in same field.


Keywords: Compromised nodes, event detection, wireless sensor network, malicious data injection


Edition: Volume 5 Issue 10, October 2016,


Pages: 1052 - 1055


How to Cite this Article?

Pragati Hadole, Vidya Dhamdhere, "Survey on Recent Malicious Data Injection Detection Techniques", International Journal of Science and Research (IJSR), Volume 5 Issue 10, October 2016, pp. 1052-1055, https://www.ijsr.net/get_abstract.php?paper_id=ART20162165

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Compromised nodes'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1287 - 1291

Survey on Straining Attacker's Impact in WSN using Secure Data Aggregation

Devendra Hapase [3] | S. D. Satav [4]

Share this Article

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1827 - 1832

A Device to Device Communication with Trusted Node Mapping in Cellular Network

Vivek Kumar Sinha [2] | Kedarnath Singh

Share this Article


Top