Malicious Data Detection Using Binary Data with Event Detection in Wireless Sensor Network

Authors

  • Surendra Kumar  Department of Computer Science and Engineering, V. M. Institute of Engineering & Technology, Nagpur, Maharashtra, India
  • Prof. Gurudev B. Sawarkar  Department of Computer Science and Engineering, V. M. Institute of Engineering & Technology, Nagpur, Maharashtra, India

Keywords:

Wireless sensor networks, Malicious node, Event detection, Fault tolerant, Binary data

Abstract

Wireless sensor networks (WSNs) is simpler to get to either physically or remotely. In this system, malicious data is injected on sensor hubs to create fake occasions. Existing frameworks distinguish the malicious data injections on hubs. This framework needs a dataset which is utilized to distinguish the occasions. This framework lessens the execution and effectiveness of the occasion discovery prepare. To conquer these confinements, this paper investigates the handiness of a Wireless Sensor Network for identifying various occasion sources by using paired data. Sensor hub has typical nature, detecting can be irritated which brings about invalid perceptions. So it is important to utilization of occasion perceiving calculation in Wireless Sensor Networks (WSNs) distinguish blame tolerant nature to track malicious hubs. This paper executes a less trouble, circulated, continuous calculation which utilizes the paired examination of the sensors rather than datasets to recognize, confine and following of occasions. Exploratory results demonstrate that the proposed calculation enhances following precision in nearness of commotion and issues.

References

  1. Vittorio P. Illiano and Emil C. Lupu, ”Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks”, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 12, NO. 3, SEPTEMBER 2015.
  2. D. Zhang and D. Liu, ”DataGuard: Dynamic data attestation in wireless sensor networks”, in Proc. IEEE/IFIP Int. Conf. DSN, 2010, pp. 261270.
  3. B. Sun, X. Shan, K. Wu, and Y. Xiao, ”Anomaly detection based secure in-network aggregation for wireless sensor networks”, Syst. J., vol. 7, no. 1, pp. 1325, Mar. 2013.
  4. Y. Liu, P. Ning, andM. K. Reiter, ”False data injection attacks against state estimation in electric power grids”, Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 2132, May 2011.
  5. F. Bao, I.-R.Chen, M. Chang, and J.-H.Cho, ”Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection”, IEEE Trans. Netw. Service Manage., vol. 9, no. 2, pp. 169183, Jun. 2012.
  6. Y. Zhang et al., ”Statistics-based outlier detection for wireless sensor networks”, Int. J. Geogr. Inf. Sci., vol. 26, no. 8, pp. 1373-1392, 2012.
  7. M. Mathews, M. Song, S. Shetty, and R. McKenzie, ”Detecting compromised nodes in wireless sensor networks”, in Proc. SNPD, 2007, vol. 1, pp. 273278.
  8. A. Liu and P. Ning, ”TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks”, in Proc. IPSN, 2008, pp. 245256.
  9. O. Salem, Y. Liu, A. Mehaoua, and R. Boutaba, ”Online anomaly detection in wireless body area networks for reliable healthcare monitoring”, J. Biomed. Health Informat., vol. 18, no. 5, pp. 15411551, Sep. 2014.
  10. A. Seshadri, M. Luk, A. Perrig, L. van Doorn, and P. Khosla, ”SCUBA: Secure code update by attestation in sensor networks”, in Proc.WorkshopWireless Security, 2006, pp. 8594. 47
  11. F. Liu, X. Cheng, and D. Chen, ”Insider attacker detection in wireless sensor networks”, in Proc. 26th IEEE INFOCOM, 2007, pp. 19731945.
  12. Vittorio P. Illiano and Emil C. Lupu, ”Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks”, IEEE Transactions On Network And Service Management, Vol. 12, No. 3, September 2015. inProc. 7th ACM Int. Symp. Mobile Ad Hoc Netw.Comput., 2006, pp. 356367.
  13. S. Rajasegarar, C. Leckie, M. Palaniswami, and J. C. Bezdek, “Quarter sphere based distributed anomaly detection in wireless sensor networks,” in Proc. IEEE ICC, 2007, pp. 3864–3869.
  14. V. Chatzigiannakis and S. Papavassiliou, “Diagnosing anomalies and identifying faulty nodes in sensor networks,” IEEE Sensors J., vol. 7, no. 5, pp. 637–645, May 2007.
  15. S. Rajasegarar, J. C. Bezdek, C. Leckie, and M. Palaniswami, “Elliptical anomalies in wireless sensor networks,” Trans. Sensor Netw., vol. 6, no. 1, pp. 1550– 579, 2009.
  16. A. B. Sharma, L. Golubchik, R. Govindan, “Sensor faults: Detection methods and prevalence in real-world datasets,” Trans. Sensor Netw., vol. 6, no. 3, pp. 23–61, 2010.
  17. Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” Trans. Inf. Syst. Secur., vol. 14, no. 1, pp. 21–32, May 2011.
  18. Q. Zhang, T. Yu, and P. Ning, “A framework for identifying compromised nodes in wireless sensor networks,” Trans. Inf. Syst. Secur., vol. 11, no. 3, pp. 1–37, Mar. 2008.
  19. C. V. Hinds, “Efficient detection of compromised nodes in a wireless sensor network,” in Proc. SpringSim, 2009, Art ID. 95.
  20. W. Zhang, S. K. Das, and Y. Yonghe, “A trust based framework for secure data aggregation in wireless sensor networks,” in Proc. 3rd Annu. IEEE SECON, 2006, pp. 60–69.
  21. F. Bao, I.-R. Chen, M. Chang, and J.-H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Service Manage., vol. 9, no. 2, pp. 169–183, Jun. 2012.
  22. B. Przydatek, D. X. Song, and A. Perrig, “SIA: Secure information aggregation in sensor networks,” in Proc. SenSys, 2003, pp. 255–265.
  23. S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact,” IEEE Trans. Inf. Forensics Security, 2014, pp. 681–694.
  24. Y. Sun, H. Luo, and S. K. Das, “A trust-based framework for faulttolerant data aggregation in wireless multimedia sensor networks,” IEEE Trans. Dependable Security Comput., vol. 9, no. 6, pp. 785–797, Nov./Dec. 2012.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Surendra Kumar, Prof. Gurudev B. Sawarkar, " Malicious Data Detection Using Binary Data with Event Detection in Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.531-536, May-June-2017.