IJMTES – DETECTING DATA INJECTION ATTACK IN WIRELESS SENSOR NETWORKS (WSNS)

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : Jagathambikai.R | Prabhu deva.S | Sangeetha.B  unnamed

Volume 03 Issue 05 2016

ISSN no:  2348-3121

Page no: 60-64

Abstract – Wireless Sensor Networks (WSNs) are unprotected and can be maliciously, either physically or remotely, with potentially spoilate effects. When sensor networks are used to detect the occurrence of events such as fires, intruders or heart attacks, malicious data can be injected to create fraudulent events and, thus spark an undesired response, or to mask the occurrence of actual events. We propose a neoteric and novel algorithm to identify malicious data injections and build measurement estimates that are resistant to several compromised sensors event when they collude in the attack. We also propose a methodology to apply this algorithm in different application context and checkout its results on three different datasets drawn from sharp WSN categorization. This leads us to identify different accords in the design of such algorithms and how they are persuaded by the application context.

Keywords— Sensor networks, Ad-Hoc, Security management, Fault detection 

Reference

  1. Vittorio P. Illiano and Emil C. Lupu, “Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks.” TNSM 2015.
  2. O. Salem, Y. Liu et al. “Online Anomaly Detection in Wireless Body Area Networks for Reliable Healthcare Monitoring.” J. of Biomedical and Health Informatics 2014.
  3. B. Sun, X. Shan et al. “Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks.” Systems J. 2013.
  4. F. Bao, I.-R. Chen et al. “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.” Trans. Netw. and Serv. Manag. 2012.
  5. D. Zhang and D. Liu, “DataGuard: Dynamic data attestation in Wireless Sensor Networks.” DSN 2010.
  6. A. Liu and P. Ning, “TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks.” IPSN 2008.
  7. A. Seshadri, M. Luk et al. “SCUBA: Secure Code Update by Attestation in Sensor Networks.”Workshop on Wireless Security 2006.
  8. C. Otto, A. Milenkovic et al. “System Architecture of a Wireless Body Area Sensor Network for Ubiquitous Health Monitoring,” J. Mob. Multimed. 2005.
  9. T. He, S. Krishnamurthy, J. A. Stankovic et al., “Energy-Efficient Surveillance System using Wireless Sensor Networks.” Mobisys 2004.
Scroll Up