A Survey on Malicious Node Detection in Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

A Survey on Malicious Node Detection in Wireless Sensor Networks

Patel Nakul

Wireless sensor network becomes popular both in civil and military jobs. WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected environments. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Many mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection algorithm to identify malicious attackers. Intrusion detection in a wireless sensor network is of significant importance in many applications to detect malicious or unexpected intruder (s). The intruder can be an enemy in a battlefield or an unusual environmental change in a chemical industry etc. Our intrusion detection system is based on specific detection rules.

Keywords: intrusion detection, security, wireless sensor network, sensor node

Edition: Volume 2 Issue 1, January 2013

Pages: 691 - 694

Share this Article

How to Cite this Article?

Patel Nakul, "A Survey on Malicious Node Detection in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013021, Volume 2 Issue 1, January 2013, 691 - 694

144 PDF Views | 115 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'intrusion detection'

| Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

| Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

| Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Similar Articles with Keyword 'security'

| Weekly Popularity: ⮙20

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

| Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

| Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Similar Articles with Keyword 'wireless sensor network'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

| Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

| Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'sensor node'

| Weekly Popularity: ⮙18

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

| Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3170 - 3173

Wireless Sensor Networks for Traffic Congestion Monitoring

Nitish R Chavan, Ravinarayana.B, Ravikumar.D

Share this Article

| Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2275 - 2278

Data Collection from Clusters in Wireless Sensor Network with Help of Mobile Nodes

Suraj Borge, Mayura Kinikar

Share this Article

| Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article
Top