By Topic

Detection of Malicious Node in Wireless Sensor Network Based on Data Mining

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)

The most attractive feature of sensor nodes is systematic collection of data and further transmitting the gathered data to a distant base station. The security parameter can be incurred if the data is transferred in sensitive areas like Defense, Health, Banking etc. However, the sensitivity of Wireless Sensor Networks makes them prone to attacks which lead to extraction or damage of data or information that flows between distinct nodes. The main objective of this paper is to construct an effective sensor security detection system which is adaptive to the behavioral changes of the nodes and the data flowing between various sensor nodes and hence detect the malicious node in our environment based on its skeptical behavior.

Published in:

Computing Sciences (ICCS), 2012 International Conference on

Date of Conference:

14-15 Sept. 2012