Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks

被引:0
|
作者
Vijayan, Nisha [1 ]
Johny, Alphonsa [1 ]
机构
[1] St Josephs Coll Engn & Technol, Kottayam, Kerala, India
来源
1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016 | 2016年 / 25卷
关键词
Security management; Ad-Hoc and sensor networks; Mining and statistical methods;
D O I
10.1016/j.protcy.2016.08.121
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless Sensor Networks are widely being used today. Though efficient, fast and easy to use these wireless sensors are highly vulnerable. Once installed, they do not need any further maintenance. Therefore they are less secure. An attacker can study the network behavior and easily attack these sensors. There are many safety measures taken for this. There are software's available to detect malicious sensors. The greatest challenge in the wireless sensor network security is when more number of sensors are infected. It becomes difficult to decide which sensor is malicious and which is genuine. This leads to the study of Wireless Sensor Network Security. This paper shows various security measures taken and some challenges faced by them. (C) 2016 Published by Elsevier Ltd.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [1] Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks
    Illiano, Vittorio P.
    Lupu, Emil C.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03): : 496 - 510
  • [2] Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
    Illiano, Vittorio P.
    Lupu, Emil C.
    ACM COMPUTING SURVEYS, 2015, 48 (02)
  • [3] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [4] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246
  • [5] Malicious beacon detection for localization in wireless sensor networks
    Wang, Weidong
    Zhu, Qingxin
    Zhong, Qianchuan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1410 - +
  • [6] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    Wireless Personal Communications, 2019, 108 : 2117 - 2135
  • [7] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Ismail, Asima
    Amin, Rashid
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (04) : 2117 - 2135
  • [8] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    Gomathi, S.
    Krishnan, C. Gopala
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 1775 - 1790
  • [9] Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol
    S. Gomathi
    C. Gopala Krishnan
    Wireless Personal Communications, 2020, 113 : 1775 - 1790
  • [10] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956