A Review on Recent Malicious Data Injection Detection Techniques |
Author(s): |
Surendra Kumar , M.Tech Student, Dept of Computer Science & Engineering V. M. Institute Of Engineering & Technology, Nagpur.; Prof. Gurudev Sawarkar, V. M. Institute Of Engineering & Technology, Nagpur |
Keywords: |
Compromised Nodes, Event Detection, Wireless Sensor Network, Malicious Data Injection |
Abstract |
Wireless Sensor Networks are utilized to screen the ecological parameters, for speedy reaction of occasion identification. It is utilized to foresee the incident of up and coming occasions, for example, fire alert framework, interruption location, heart assault identification frameworks, military applications and so forth. In any case, more often than not sensors are trade off by outside elements, which emerges a major issue of security in such systems. Such Compromised sensors can report the false readings, which deliver the wrong and more often than not hazardous reactions. So there is a need of framework that can suitably recognize the malicious data injected by unapproved elements at sensor hubs. It is fundamental since it is extremely hard to recognize such malicious data infusion assaults on sensor hub, in the event that it is happen at numerous sensor hubs all the while in system. This paper makes overview of some current methodologies or procedures that are utilized for malicious data injected hubs in WSN. Additionally look at these methodologies in light of different parameters, for example, procedure utilized, their favorable circumstances and constraints. Toward the end we propose some examination bearings which will be utilized for further review in same field. |
Other Details |
Paper ID: IJSRDV4I120355 Published in: Volume : 4, Issue : 12 Publication Date: 01/03/2017 Page(s): 527-531 |
Article Preview |
|
|