Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks

被引:0
|
作者
Vijayan, Nisha [1 ]
Johny, Alphonsa [1 ]
机构
[1] St Josephs Coll Engn & Technol, Kottayam, Kerala, India
来源
1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016 | 2016年 / 25卷
关键词
Security management; Ad-Hoc and sensor networks; Mining and statistical methods;
D O I
10.1016/j.protcy.2016.08.121
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless Sensor Networks are widely being used today. Though efficient, fast and easy to use these wireless sensors are highly vulnerable. Once installed, they do not need any further maintenance. Therefore they are less secure. An attacker can study the network behavior and easily attack these sensors. There are many safety measures taken for this. There are software's available to detect malicious sensors. The greatest challenge in the wireless sensor network security is when more number of sensors are infected. It becomes difficult to decide which sensor is malicious and which is genuine. This leads to the study of Wireless Sensor Network Security. This paper shows various security measures taken and some challenges faced by them. (C) 2016 Published by Elsevier Ltd.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [31] A stochastic model of malicious data packet propagation in Mobile Wireless Sensor Networks
    Wang, Xiao-Ming
    Li, Cheng-Bo
    Li, Ying-Shu
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (06): : 1290 - 1297
  • [32] Online Data Fault Detection For Wireless Sensor Networks - Case Study
    Hamdan, Dima
    Aktouf, Oum-El-Kheir
    Parissis, Ioannis
    El Hassan, Bachar
    Hijazi, Abbas
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS IN UNUSUAL AND CONFINED AREAS (ICWCUCA), 2012,
  • [33] Detection of Malicious Route in Wireless Adhoc Networks
    Malhotra, Amarjit
    Kirtani, Saurabh
    Agarwal, Tushar
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 94 - 97
  • [34] Communication-estimation tradeoffs in wireless sensor networks
    Son, SH
    Kulkarni, SR
    Schwartz, SC
    Roan, M
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 1065 - 1068
  • [35] A Multipath Secure Routing Protocol Based on Malicious Node Detection in Wireless Sensor Networks
    Yao Lan
    Gao Fuxiang
    Zhao Zhibin
    ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 799 - 804
  • [36] Locating Jamming Attackers in Malicious Wireless Sensor Networks
    Xiong, Kaiqi
    Thuente, David
    2012 IEEE 31ST INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2012, : 400 - 407
  • [37] System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks
    Grgic, Kresimir
    Zagar, Drago
    Cik, Visnja Krizanovic
    JOURNAL OF SENSORS, 2016, 2016
  • [38] Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment
    Nii, Eiji
    Kitanouma, Takamasa
    Adachi, Naotoshi
    Takizawa, Yasuhisa
    2017 IEEE ASIA PACIFIC MICROWAVE CONFERENCE (APMC), 2017, : 521 - 524
  • [39] Localized Identification of Malicious Nodes in Wireless Sensor Networks
    Akram, Vahid Khalilpour
    Erten, Yusuf Murat
    2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
  • [40] Synthetical Malicious Behavior Detection of MAC Layer Multiple Attack in Wireless Sensor Networks
    Jiang, Shuai
    Wang, Jian
    INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,