International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 118 | Views: 234

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013 | Popularity: 6.3 / 10


     

A Survey on Malicious Node Detection in Wireless Sensor Networks

Patel Nakul


Abstract: Wireless sensor network becomes popular both in civil and military jobs. WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected environments. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Many mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection algorithm to identify malicious attackers. Intrusion detection in a wireless sensor network is of significant importance in many applications to detect malicious or unexpected intruder (s). The intruder can be an enemy in a battlefield or an unusual environmental change in a chemical industry etc. Our intrusion detection system is based on specific detection rules.


Keywords: intrusion detection, security, wireless sensor network, sensor node


Edition: Volume 2 Issue 1, January 2013


Pages: 691 - 694



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Patel Nakul, "A Survey on Malicious Node Detection in Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 2 Issue 1, January 2013, pp. 691-694, https://www.ijsr.net/getabstract.php?paperid=IJSROFF2013021, DOI: https://www.doi.org/10.21275/IJSROFF2013021

Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article



Top