Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Rohini Divase, S. N. Kini
The purpose of this survey is to present overview of approaches to detecting malicious data injections in wireless sensor network. It also discusses the advantages and disadvantages of different detection methods and compare different approaches them. Wireless sensor networks (WSNs) are defenseless and can be maliciously traded off, either physically or remotely, with potentially devastating impacts. At the point when sensor systems are utilized to recognize the occurrence of events, for example, fires, intruders, or heart attacks, malicious data can be injected to create fake events, and along these lines trigger an undesired reaction, or to cover the occurrence of actual events. Therefore there is a need to identify malicious data injections and build measurement estimates that are resistant to several compromised sensors even when they collude in the attack either willingly or under duress.
Keywords: Malicious Data Injection, Detection, Wireless Sensor Network, Mining and statistical methods, security management, ad hoc and sensor networks
Edition: Volume 4 Issue 11, November 2015
Pages: 2526 - 2529
How to Cite this Article?
Rohini Divase, S. N. Kini, "A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151803, Volume 4 Issue 11, November 2015, 2526 - 2529
99 PDF Views | 79 PDF Downloads
Similar Articles with Keyword 'Malicious Data Injection'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2526 - 2529A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Rohini Divase, S. N. Kini
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1052 - 1055Survey on Recent Malicious Data Injection Detection Techniques
Pragati Hadole, Vidya Dhamdhere
Similar Articles with Keyword 'Detection'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1615 - 1620Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm
Premsai Cheedella
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2623 - 2629Object Detection and Pose Tracking In Augmented Reality
Vipul P.Chauhan, Dr. Manish M. Kayasth
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Similar Articles with Keyword 'Wireless Sensor Network'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 3170 - 3173Wireless Sensor Networks for Traffic Congestion Monitoring
Nitish R Chavan, Ravinarayana.B, Ravikumar.D
Similar Articles with Keyword 'security management'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2526 - 2529A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Rohini Divase, S. N. Kini
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1536 - 1540Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2386 - 2390GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode, D. C. Mehetre
Research Paper, Computer Science & Engineering, Sudan, Volume 4 Issue 4, April 2015
Pages: 742 - 748Assembly Classifier Approach to Analyze Intrusion Detection Dataset in Networks by Using Data Mining Techniques
Ayad Mohammed Mahyoub Ghaleb, Samani A. Talab
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1893 - 1896A Study on Critical Capabilities for Security Information and Event Management
Kavita Agrawal, Hemant Makwana