ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on Problems Faced in Identification of Malicious Data Insertion in Wireless Sensor Networks and Rectification of It

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 2526-2529

Keywords : Malicious Data Injection; Detection; Wireless Sensor Network; Mining and statistical methods; security management; ad hoc and sensor networks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The purpose of this survey is to present overview of approaches to detecting malicious data injections in wireless sensor network. It also discusses the advantages and disadvantages of different detection methods and compare different approaches them. Wireless sensor networks (WSNs) are defenseless and can be maliciously traded off, either physically or remotely, with potentially devastating impacts. At the point when sensor systems are utilized to recognize the occurrence of events, for example, fires, intruders, or heart attacks, malicious data can be injected to create fake events, and along these lines trigger an undesired reaction, or to cover the occurrence of actual events. Therefore there is a need to identify malicious data injections and build measurement estimates that are resistant to several compromised sensors even when they collude in the attack either willingly or under duress.

Last modified: 2021-07-01 14:26:37