{"title":"Detection of Malicious Node in Wireless Sensor Network Based on Data Mining","authors":"M. Singh, G. Mehta, C. Vaid, P. Oberoi","doi":"10.1109/ICCS.2012.24","DOIUrl":null,"url":null,"abstract":"The most attractive feature of sensor nodes is systematic collection of data and further transmitting the gathered data to a distant base station. The security parameter can be incurred if the data is transferred in sensitive areas like Defense, Health, Banking etc. However, the sensitivity of Wireless Sensor Networks makes them prone to attacks which lead to extraction or damage of data or information that flows between distinct nodes. The main objective of this paper is to construct an effective sensor security detection system which is adaptive to the behavioral changes of the nodes and the data flowing between various sensor nodes and hence detect the malicious node in our environment based on its skeptical behavior.","PeriodicalId":429916,"journal":{"name":"2012 International Conference on Computing Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Computing Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS.2012.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 16
Abstract
The most attractive feature of sensor nodes is systematic collection of data and further transmitting the gathered data to a distant base station. The security parameter can be incurred if the data is transferred in sensitive areas like Defense, Health, Banking etc. However, the sensitivity of Wireless Sensor Networks makes them prone to attacks which lead to extraction or damage of data or information that flows between distinct nodes. The main objective of this paper is to construct an effective sensor security detection system which is adaptive to the behavioral changes of the nodes and the data flowing between various sensor nodes and hence detect the malicious node in our environment based on its skeptical behavior.