Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Rohini Divase, S. N. Kini
Abstract: The purpose of this survey is to present overview of approaches to detecting malicious data injections in wireless sensor network. It also discusses the advantages and disadvantages of different detection methods and compare different approaches them. Wireless sensor networks (WSNs) are defenseless and can be maliciously traded off, either physically or remotely, with potentially devastating impacts. At the point when sensor systems are utilized to recognize the occurrence of events, for example, fires, intruders, or heart attacks, malicious data can be injected to create fake events, and along these lines trigger an undesired reaction, or to cover the occurrence of actual events. Therefore there is a need to identify malicious data injections and build measurement estimates that are resistant to several compromised sensors even when they collude in the attack either willingly or under duress.
Keywords: Malicious Data Injection, Detection, Wireless Sensor Network, Mining and statistical methods, security management, ad hoc and sensor networks
Edition: Volume 4 Issue 11, November 2015,
Pages: 2526 - 2529
How to Cite this Article?
Rohini Divase, S. N. Kini, "A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV151803, Volume 4 Issue 11, November 2015, 2526 - 2529
How to Share this Article?
Similar Articles with Keyword 'Detection'
Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Survey on Various Image Segmentation Techniques
Similar Articles with Keyword 'Wireless Sensor Network'
Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Similar Articles with Keyword 'security management'
Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
GMFAD and CDAL-M Models for Identification of Adversary Attacks in Wireless Sensor Network using RSS
Santosh S. Doifode, D. C. Mehetre
Similar Articles with Keyword 'Malicious'
Secure Methods for Supplychain Management to Protect from Attacks in Blockchain
B. Ratnakanth, K. Venkata Ramana
Detection of Malicious URLs using Classification Algorithm
Muskan V. Jaiswal, Dr. Anjali B. Raut
Similar Articles with Keyword 'Data'
Heart Disease Prediction with Machine Learning Approaches
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Similar Articles with Keyword 'Injection'
Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande