Study on Tradeoffs in Detection of Malicious Data Injections in Wireless Sensor Networks

被引:0
|
作者
Vijayan, Nisha [1 ]
Johny, Alphonsa [1 ]
机构
[1] St Josephs Coll Engn & Technol, Kottayam, Kerala, India
来源
1ST GLOBAL COLLOQUIUM ON RECENT ADVANCEMENTS AND EFFECTUAL RESEARCHES IN ENGINEERING, SCIENCE AND TECHNOLOGY - RAEREST 2016 | 2016年 / 25卷
关键词
Security management; Ad-Hoc and sensor networks; Mining and statistical methods;
D O I
10.1016/j.protcy.2016.08.121
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Wireless Sensor Networks are widely being used today. Though efficient, fast and easy to use these wireless sensors are highly vulnerable. Once installed, they do not need any further maintenance. Therefore they are less secure. An attacker can study the network behavior and easily attack these sensors. There are many safety measures taken for this. There are software's available to detect malicious sensors. The greatest challenge in the wireless sensor network security is when more number of sensors are infected. It becomes difficult to decide which sensor is malicious and which is genuine. This leads to the study of Wireless Sensor Network Security. This paper shows various security measures taken and some challenges faced by them. (C) 2016 Published by Elsevier Ltd.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [41] Countering Intelligent-Dependent Malicious Nodes in Target Detection Wireless Sensor Networks
    Althunibat, Saud
    Antonopoulos, Angelos
    Kartsakli, Elli
    Granelli, Fabrizio
    Verikoukis, Christos
    IEEE SENSORS JOURNAL, 2016, 16 (23) : 8627 - 8639
  • [42] Locating Malicious Agents in Mobile Wireless Sensor Networks
    Sei, Yuichi
    Ohsuga, Akihiko
    PRIMA 2014: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2014, 8861 : 206 - 221
  • [43] Locating jamming attackers in malicious wireless sensor networks
    Xiong, Kaiqi
    Thuente, David
    2012 IEEE 31st International Performance Computing and Communications Conference, IPCCC 2012, 2012, : 400 - 407
  • [44] Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks
    Moundounga, Anselme Russel Affane
    Satori, Hassan
    Boutazart, Youssef
    Abderrahim, Ezzine
    MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [45] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [46] Tradeoffs among Delay, Energy and Accuracy of Partial Data Aggregation in Wireless Sensor Networks
    Li, Wuyungerile
    Bandai, Masaki
    Watanabe, Takashi
    2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, : 917 - 924
  • [47] Data Integrity And Intrusion Detection In Wireless Sensor Networks
    Acharya, Rathanakar
    Asha, K.
    PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 462 - +
  • [48] A study on boundary detection in wireless sensor networks
    Kundu, Srabani
    Das, Nabanita
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2023, 19 (02) : 217 - 225
  • [49] A study on boundary detection in wireless sensor networks
    Srabani Kundu
    Nabanita Das
    Innovations in Systems and Software Engineering, 2023, 19 : 217 - 225
  • [50] A Study of Data Forwarding in Wireless Sensor Networks
    Jiang, Wei
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 576 - 584