A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Rohini Divase; S. N. Kini;
Page : 2526-2529
Keywords : Malicious Data Injection; Detection; Wireless Sensor Network; Mining and statistical methods; security management; ad hoc and sensor networks;
Abstract
The purpose of this survey is to present overview of approaches to detecting malicious data injections in wireless sensor network. It also discusses the advantages and disadvantages of different detection methods and compare different approaches them. Wireless sensor networks (WSNs) are defenseless and can be maliciously traded off, either physically or remotely, with potentially devastating impacts. At the point when sensor systems are utilized to recognize the occurrence of events, for example, fires, intruders, or heart attacks, malicious data can be injected to create fake events, and along these lines trigger an undesired reaction, or to cover the occurrence of actual events. Therefore there is a need to identify malicious data injections and build measurement estimates that are resistant to several compromised sensors even when they collude in the attack either willingly or under duress.
Other Latest Articles
- Study of Semantic Retrieval by Data Similarity of Trademarks
- A Review on Various Issues and Applications in Wireless Sensor Networks
- A Survey on Social Circle Influenced Personalized Recommendation System
- A Survey on Extended MI technique for Edit Recommendation using Hybrid History Mining and Relevance Feedback
- Specific Personal Alias Withdrawal from Web and Clustering of Similar Web Documents
Last modified: 2021-07-01 14:26:37