Downloads: 118 | Views: 234
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013 | Popularity: 6.3 / 10
A Survey on Malicious Node Detection in Wireless Sensor Networks
Patel Nakul
Abstract: Wireless sensor network becomes popular both in civil and military jobs. WSNs are of particular interest to adversaries due to their frequent deployments in open and unprotected environments. Sensor nodes have limited communication capability and low computation resources so each node is weak entity that can be easily compromised by adversary by launching malicious software inside the network As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Many mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection algorithm to identify malicious attackers. Intrusion detection in a wireless sensor network is of significant importance in many applications to detect malicious or unexpected intruder (s). The intruder can be an enemy in a battlefield or an unusual environmental change in a chemical industry etc. Our intrusion detection system is based on specific detection rules.
Keywords: intrusion detection, security, wireless sensor network, sensor node
Edition: Volume 2 Issue 1, January 2013
Pages: 691 - 694
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad