Detecting Malicious Nodes in Wireless Sensor Networks

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5

Abstract

Abstract:A typical wireless sensor network consists of several tiny and low-power sensors which use radio frequencies to perform distributed sensing tasks. Wireless sensor networks are used to detect the occurrence of events such as fires, intruders, or heart attacks, malicious data can be injected to create fake events, and thus trigger an undesired response, or to mask the occurrence of actual events. In this project we consider directly the scenario where an attacker gains full control of one or more sensors and can run arbitrary malware on them to fabricate new measurements and report them in place of the observed ones. Our base work only concentratedon the malicious data injection, we enhanced our base work with detecting the sink hole attack and avoiding the sink hole node to transfer the data.

Authors and Affiliations

K. V. V. S. Pravallika, M. Tech ; , Mrs. S. Venkata Lakshmi, M. Tech

Keywords

Related Articles

 Crawler with Search Engine based Simple Web Application System for Forum Mining

 Abstract : Now-a-days the growth of online users increased infinitely depending upon the information in web sources. Web mining is an important term to manage the data from web which has different categorization as...

 Assessing Buffering with Scheduling Schemes in a QoS Internet  Router

 A key requirement for service differentiation as required in Internet of the future and QoS to work effectively is the extension of traffic management routines of the current TCP/IP protocol. Two among of such &n...

A Study on Energy Model Prototyping in Various Simulators of WSN

Simulators are used to abstract the real hardware behaviors and proceed the research more economically. Various simulators of Wireless Sensor Network (WSN) are used to access the performance and transmission processes in...

 Mining Conceptual Relations from Textual Web Content Using Leximancer

 Abstract: Concept mining is a process that focuses on extracting ideas and concepts found in documents. The approach is somewhat similar to text mining, with the main difference being that mining a text focuses on...

Development of Virtual Computing Lab Using Private Cloud

Abstract: Virtual Computing Lab (VCL) is a very effective answer for the educational institution to meet the increasing demand of physical machines, different computational laboratories and large number of users in alimi...

Download PDF file
  • EP ID EP164770
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

K. V. V. S. Pravallika, M. Tech ;, Mrs. S. Venkata Lakshmi, M. Tech (2016). Detecting Malicious Nodes in Wireless Sensor Networks. IOSR Journals (IOSR Journal of Computer Engineering), 18(5), 1-7. https://europub.co.uk/articles/-A-164770