ENHANCING RELIABILITY AND EFFICIENCY OF DETECTING MALICIOUS DATA INJECTION IN WIRELESS SENSOR NETWORKS: AN IN-DEPTH ANALYSIS

Authors

  • Vinay Shrivastava AKS University, SATNA, MP, India
  • Mukta Bhatele AKS University, SATNA, MP, India
  • Akhilesh A. Waoo AKS University, SATNA, MP, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i5.2024.1900

Keywords:

Wireless Sensor Network, Malicious Data Injection, Security, Network Performance

Abstract [English]

Wireless sensor networks (WSNs) have gained significant attention in recent years due to their versatile applications ranging from wildlife tracking to environmental monitoring. However, WSNs are susceptible to various challenges such as hardware failures, communication link faults, and malicious attacks, which can significantly affect their reliability and performance. In this paper, we focus on the issue of malicious data injection in WSNs and propose a survey to explore its impact on network security and performance.

References

Vittorio P. Illiano and Emil C. Lupu, "Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks," IEEE Transactions on Network and Service Management, vol. 12, no. 3, pp. 496-512, Sep. 2015. DOI: https://doi.org/10.1109/TNSM.2015.2448656

T. S. Rappaport et al., "Wireless Communications: Principles and Practice," Prentice-Hall, 1996.

W. Dong et al., "Measurement and analysis on the packet delivery performance in a large-scale sensor network," IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 1952-1963, Dec. 2014. DOI: https://doi.org/10.1109/TNET.2013.2288646

H. Chang et al., "Spinning beacons for precise indoor localization," in Proceedings of ACM SenSys, 2008, pp. 127-140. DOI: https://doi.org/10.1145/1460412.1460426

Qiang Ma et al., "Link Scanner: Faulty Link Detection for Wireless Sensor Networks," IEEE Transactions on Wireless Communications, vol. 14, pp. 4428-4438, Aug. 2015. DOI: https://doi.org/10.1109/TWC.2015.2421353

S. S. Ahuja et al., "Single-link failure detection in all-optical networks using monitoring cycles and paths," IEEE/ACM Transactions on Networking, vol. 17, no. 4, pp. 1080-1093, Aug. 2009. DOI: https://doi.org/10.1109/TNET.2008.2008000

Q. Cao et al., "Declarative tracepoints: A programmable and application independent debugging system for wireless sensor networks," in Proceedings of ACM SenSys, 2008, pp. 85-98. DOI: https://doi.org/10.1145/1460412.1460422

A. Cerpa et al., "Statistical model of lossy links in wireless sensor networks," in Proceedings of IEEE IPSN, 2005, pp. 81-88. DOI: https://doi.org/10.1109/IPSN.2005.1440900

L. Girod et al., "EmStar: A software environment for developing and deploying wireless sensor networks," in Proceedings of USENIX Annual Technical Conference, 2004, p. 24.

Y. Hamazumi et al., "Optical path fault management in layered networks," in Proceedings of IEEE GLOBECOM, 1998, pp. 2309-2314. DOI: https://doi.org/10.1109/GLOCOM.1998.775942

C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2/3, pp. 293-315, 2003. DOI: https://doi.org/10.1016/S1570-8705(03)00008-8

A. Perrig et al., "Security in wireless sensor networks," Communications Magazine, vol. 47, no. 6, pp. 53-57, Jun. 2004. DOI: https://doi.org/10.1145/990680.990707

El Emary, I.M.M.; Ramakrishnan, S. (Eds.) Wireless Sensor Networks: From Theory to Applications; CRC Press: Boca Raton, FL, USA, 2013 DOI: https://doi.org/10.1201/b15425

Rani, A.; Kumar, S. A survey of security in wireless sensor networks. In Proceedings of the 3rd International Conference on CICT, Ghaziabad, India, 9–10 February 2017; pp. 1–5. DOI: https://doi.org/10.1109/CIACT.2017.7977334

Jiamin Hu, Xiaofan Yang, Lu-Xing Yang a framework for detecting false data injection in large scale wireless sensor network. March 2024 Sensors 24(5):1643. DOI: https://doi.org/10.3390/s24051643

M. S. Beg and A. A. Waoo, “A comprehensive study in wireless sensor network (WSN) Using artificial bee colony (ABC) algorithms,” International Research Journal of Engineering and Technology (IRJET), vol. 6, no. 9, pp. 873–879, 2019.

Waoo, A., and Sanjay Sharma. "Threshold Sensitive Stable Election Multi-path Energy Aware Hierarchical Protocol for Clustered Heterogeneous Wireless Sensor Networks." International Journal of Recent Trends in Engineering & Research 3.09 (2017): 158-16. DOI: https://doi.org/10.23883/IJRTER.2017.3443.IJZP2

Jain, Jay Kumar, and Akhilesh A. Waoo. "An Analytical Study of Energy Efficient Routing Approaches in Wireless Sensor Network." THEETAS 2022: Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India. European Alliance for Innovation, 2022. DOI: https://doi.org/10.4108/eai.16-4-2022.2318162

Waoo, A. A., and Sharma, S., “Analysis of Energy Efficient Coverage and Prolonging Lifetime by Comparing Homogenous and Heterogeneous Wireless Sensor Networks”, International Conference on Advanced Computation and Telecommunication (ICACAT), 2018. DOI: https://doi.org/10.1109/ICACAT.2018.8933686

Downloads

Published

2024-05-31

How to Cite

Shrivastava, V., Bhatele, M., & Waoo, A. A. (2024). ENHANCING RELIABILITY AND EFFICIENCY OF DETECTING MALICIOUS DATA INJECTION IN WIRELESS SENSOR NETWORKS: AN IN-DEPTH ANALYSIS. ShodhKosh: Journal of Visual and Performing Arts, 5(5), 404–408. https://doi.org/10.29121/shodhkosh.v5.i5.2024.1900