Sie sind auf Seite 1von 6

International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

Available online at: www.ijaetis.org


Volume 3, Issue 1, Page No: 01-07
January-February 2017
ISSN:2455-1651

Malicious data injection Detection in Wireless Sensor Network: A Survey


1 2
Vinay Shrivastava , Ravi H. Gedam
Student, Assistant Professor
Department of Computer Sc. & Engg
Shri Balaji Institute of Technology and Management,BETUL(M.P.)
E-mail: vinayshrivastava547@yahoo.in, ravihemraj@yahoo.com
ABSTRACT
WSNs have received noteworthy consideration in current years due to their potential applications in wildlife tracking, armed sensing,
traffic investigation, fitness care, atmosphere monitoring, building constructions monitoring, etc. Wireless sensor networks establish
a specific type of wireless data communication networks. Consistency of WSN is affected by errors that might take place due to a
number of causes such as soft-ware failures, dislocation, faulty hardware, or environmental threats. Linking letdown is unique
problem against the WSNs and can interrupt the whole sensor system communication. The variability of procedure against damaged
connection detection is overwhelming. Malicious data injection plays a noteworthy contribution in network disaster detection and
network management. In this paper we propose a survey of malicious data injection in wireless sensor network.

Keywords: Wireless Sensor Network, malicious data injection, Security, Security management, Link failure

INTRODUCTION:
A wireless sensor network comprises of several the computation ability to physical atmosphere
small sized sensor nodes that have computation where human beings cannot reach. They can work
capabilities. Wireless sensor networks (WSNs)[1] for lengthy periods in locales that are antagonistic,
have been widely used in many application areas challenging or environmentally too sensitive for
such as infrastructure protection, environment human examination.
monitoring and habitat tracing. Associated to the The location of each sensor is planned before
wired networks, it seems considerable more placement. Sensors are associated to the assigned
important to sense malicious data injection rather
locations by human. Obviously, solution is inscalable
than node responsibilities in WSNs. Every sensor as much work is required for the installation.
node can sense physical characteristics. WSNs have Furthermore, it is occasionally infeasible to have
been the favorite choice for the succeeding manual arrangement as the location information of
generation monitoring and control systems. It can sensors is anonymous before actual placement.
sense temperature, light, vibration, electromagnetic Alternative solution for localization is equipping each
strength, humidity, and so on, and transmit the sensor with a GPS receiver. Sensors can find
sensed data to the sink node from end to end a themselves independently using the GPS signals.
series of numerous intermediary nodes that However, connecting a GPS receiver for each sensor
assistance forward the value. It has now become node significantly rise the total cost of the sensor
possible to install enormous quantities of low cost network. In addition, the introduction of GPS
sensors to monitor big regions over ground receiver increases the energy consumption[2] of a
underwater, surface, or atmosphere. WSNs have
node and hence restrains its life time. Finally, the
received noteworthy consideration in current years location gained from GPS-receiver may not be
due to their potential applications in wildlife precise enough for certain applications and the
tracking, armed sensing, traffic investigation, fitness accuracy of GPS is affected by numerous ecological
care, atmosphere monitoring, building constructions issues. Precision can be of tenths of meters for
monitoring, etc. Nodes in WSNs are disposed to general GPS. The mistake can be lowered to less
letdown due to hardware letdown, energy than ten meters for GPS growth systems like
reduction, communication link faults, mischievous Differential GPS (DGPS) but with an advanced cost.
attack, and so on. The greatest noteworthy
advantage of sensor networks is that they increased
1

Corresponding Author: Vinay Shrivastava www.ijaetis.org


Vinay Shrivastava et al. International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

In wireless sensor networks, malicious data for overlong times in locales that are antagonistic,
injection[1] detection plays a serious role in network challenging or environmentally too sensitive for
analysis and organization. During flooding processes human examination. Moreover it has the probable
link scanner passively collects hop counts of received to send prosperity of data about the setting in which
probe messages at sensor nodes. Based on the they are organized and send their outcomes across
surveillance that damaged links can result in the network to the users. A sensor node is a tiny
disparity between received hop counts and network component that is proficient of computation,
topology. The object of link scanner is to provide a sensing and communication competences. Sensor
blacklist containing all possible faulty links. With node is the main component of WSN. Sensor data
such a blacklist, further analysis and recovery nodes can be helpful to sense moisture and
processes become possible, including (a) discovering temperature. It is also used to sense temp. and light.
the root causes of observed indications in the Since a single sensor transports only limited
network, (b) altering routing policy for the related information; a system of these maneuvers is cast-off
nodes, (c) contribution the spare list of links for to achieve huge surroundings.
every node. In this paper we propose a survey of The communication component in sensor nodes is
malicious data injection in wireless sensor network. used to transfer information. It has nowadays turn
The rest of the paper is organized as follows. out to be conceivable to install enormous quantities
of low cost sensors to monitor big regions over
Section 2 provides the background, relevant for the
ground underwater, surfce, or atmosphere. WSNs
context. Section 3 provides the literature survey
have received noteworthy consideration in current
related to malicious data injection in wireless sensor
years due to their potential applications in wildlife
network. Section 4 concludes the paper with a
tracking, armed sensing, traffic investigation, fitness
summary of the main findings concluding remarks,
care, atmosphere monitoring, building constructions
and limitation discussion.
monitoring, etc. Nodes in WSNs are disposed to
II. BACKGROUND letdown due to hardware letdown, energy
A wireless sensor network is which organized itself reduction, communication link faults, mischievous
rendering to the circumstances. It’s a collection of attack, and so on.
nodes. The nodes are low cost and low battery WSN have the following individual features and
power sensor devices. WSN can be positioned on the limitations: Self configurable[4]: Sensor nodes are
ground, in the air[3]. It can be positioned in vehicles, usually arbitrarily prearranged and particularly
on bodies of the human or animals. It can be assemble themselves into a communication range.
deployed under water, and inside the houses. The
Battery-powred sensor nodes: Sensor nodes are
main components of wireless sensor networks are
naturally power-drivn by battery and are
sensing unit, and a wireless transceiver. The function
prearranged in a corrective situation where it is very
of sensing unit is capture events of attention. The
stimulating to change or boost the batteries.
main function of wireless transceiver is transmute
the apprehended actions back to the main base Dense sensor node situation: Sensor nodes are
station. The main base station is called sink node. logically professionally situated and can be
Sensor nodes cooperate with every other to achieve numerous orders of magnitude higher than that in a
tasks of data identifying, data communication, and MANET.
data processing. In WSNs serious incident data
Untrustworthy sensor nodes: Since sensor nodes are
collected by the sensor node-s used for specialist probable to physical damages or letdowns due to its
care of an environment. The greatest noteworthy placement in corrective or antagonistic atmosphere.
advantage of sensor networks is that they increased
the computation ability to physical atmosphere Severe energy, computation, and storage
2

where human beings cannot reach. They could work restrictions: Sensors nodes are taking extremely
Page

Volume 3, Issue 1; January-February 2017; Page No.01-07


© 2017 IJAETIS. All Rights Reserved
Vinay Shrivastava et al. International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

incomplete energy, computation, and storage environment, data aggregation, diverse sensing
abilities. application requirements, scalability.
Data duplication: In utmost sensor network use, Because of the challenges of designing of routing
sensor nodes are powerfully positioned in an area of protocols of wireless sensor network we have many
attention and work together to accomplish a shared constraints. WSN have limitations due to resources.
recognizing work. Thus, the data identified by WSN have low storage capacity[5], low bandwidth.
numerous sensor nodes naturally have a certain The other limitations are low central processing unit
level of relationship or duplication. and limited battery energy. The design challenges of
WSN are limited hardware resources, limited energy
Repeated topology modification: Network topology
capacity, sensor locations, random and massive node
modifications regularly because of the node
positioning, scalability, network characteristics and
letdowns, destruction, addition, energy decrease, or
unreliable environment, data aggregation, diverse
station disappearing.
sensing application requirements.
Application precise: A sensor network is typically
Nodes in WSNs are disposed to letdown due to
intended and positioned for a precise application.
hardware letdown, energy reduction,
The design necessities of a sensor network alteration
communication link faults, mischievous attack, and
with its application.
so on. The main WSN objectives are low node cost,
The battery is the main energy source in the wireless small node size, low power consumption, scalability,
sensor network. For better performance battery self configurability, better channel utilization, fault
power should be sufficient. Sensing unit consists of tolerance, adaptability, Qos support and security.
sensor and ADC (Analog to Digital Converter). Sensor Low node cost: The cost of node is necessary factor
senses the events and acts as an input for analog to to design a WSN. Reduced cost node also reduces
digital converter. The analog to digital converter the entire network cost. The WSN can be
converts the analog signal into digital form. Then the implemented in military, forest area which when
output of sensing unit is input to the processing unit destroyed cannot be reclaimed so cost may be
of wireless sensor network. Processing unit consists effective parameter for wireless sensor network
of microprocessor and memory. Microprocessor is design.
the main component of processing unit. All the
Scalability: The network should be scalable i.e. the
processing of wireless sensor network performed in
nodes can be without difficulty added to the wireless
microprocessor. Memory is used to store processing
data and can be used for other related events. sensor network as and when required. In most cases
wireless sensor network can be implemented in wild
Communication unit is the unit used to
region so small sized network may be easily
communicate to the outside world.
manageable.
The main WSN objectives are low node cost, small
Small node size: The size of node is also important
node size, low power consumption, scalability, self
for WSN design. Small node size reduces the price
configurability, better channel utilization, fault
and power intake of network. In most cases wireless
tolerance, adaptability, Qos support and security.
sensor network can be implemented in wild region
Therefore, error free and reliable data transfer
so small sized network may be easily manageable.
between source and destination is the challenges in
The faulty link detection and security can be easily
WSN. Consistent transfer of data is the surety that
implemented in WSN.
the packet carrying event's information reaches at
the endpoint. The design challenges of WSN are Self configurable: The wireless sensor network
limited energy capacity, sensor locations, limited should be self configurable i.e. network should be
hardware resources, massive and random node automatically organize themselves as needed.
deployment, network characteristics and unreliable
3
Page

Volume 3, Issue 1; January-February 2017; Page No.01-07


© 2017 IJAETIS. All Rights Reserved
Vinay Shrivastava et al. International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

Low power consumption: Sensor node is always conditions, obstacles. It is also depends on
powered by battery. For better network interference.
performance low power consumption is an Routing in wireless network is different from simple
important factor. All the nodes in wireless sensor adhoc network. Wireless sensor network is
network are powered by battery. So node should infrastructure less. Wireless links are not reliable. All
consume less power as compared to other adhoc the routing protocols of wireless sensor network
network. require good energy. Wireless sensor node may fail
Reliability: The network should be reliable. The data because of infrastructure. The wireless sensor
transmission between destination and source should network protocols are location based protocols,
be reliable and secure. In most cases wireless sensor hierarchical protocols, data centric protocols,
network can be implemented in wild region so the multipath based protocols, QoS based protocols,
network should be reliable. mobility based protocols, and heterogeneity based
protocol. Location based protocols are GAF, TBF,
Security: Security is also very important for better
SMECH, GeRaF, MECN, GEAR, Span, BVGF.
network. The data transmission should be secure.
Hierarchical Protocols are APTEEN, LEACH[6], HEED,
So the main network design parameters are small
PEGASIS, TEEN.
power intake, reliability and security.
Data-centric Protocols are Rumor Routing, ACQUIRE,
Localization in wireless sensor networks is to fix the
Quorum-Based Information Dissemination, SPIN,
geographical locations of sensors in a WSN. The
EAD, Information-Directed Routing, HABID, GBR,
minimum solution is manual outline. The location of
EAR, IDR, COUGAR, DD.
each sensor is planned before placement. Sensors
are associated to the assigned locations by human. Heterogeneity-based Protocols are CHR, CADR, IDSQ.
Obviously, solution is inscalable as much work is Multipath-based Protocols are Braided Multipath,
required for the installation. Furthermore, it is Sensor-Disjoint Multipath , N-to-1 Multipath
occasionally infeasible to have manual arrangement Discovery. Mobility-based Protocols are TTDD, Data
as the location information of sensors is anonymous MULES, SEAD, Joint Mobility and Routing, and
before actual placement. Dynamic Proxy Tree-Base Data Dissemination.
In WSNs, consistency can be categorized into diverse QoS-based protocols are SPEED, Energy-aware
levels event or Packet dependability Level, End-to- routing, SAR.
End or Hop-by-Hop dependability Level Low-energy adaptive clustering hierarchy (LEACH):
Nodes in WSNs are disposed to letdown due to LEACH is the first and most popular energy-efficient
hardware letdown, energy reduction, hierarchical clustering algorithm for WSNs that was
communication link faults, mischievous attack, and proposed for reducing power consumption. The
so on. Consistency of WSN is affected by mistakes operation of LEACH is divided into rounds having
that may happen due to numerous reasons such as two phases each namely (i) a setup phase to
software malfunctions, malfunctioning hardware, organize the network into clusters, CH
dislocation, or environmental hazards. Nodes in advertisement, and transmission schedule creation
sensor networks have very limited energy. In ad-hoc and (ii) a steady-state phase for data aggregation,
network batteries can be replaced as and when compression, and transmission to the sink.
needed. The battery condition of WSN node is very
LEACH is completely distributed and requires no
important factor for better communication. The global knowledge of network. It reduces energy
hardware in good condition is very necessary for consumption by (a) minimizing the communication
WSN communication. The communication of WSN is cost between sensors and their cluster heads and (b)
not only effected by antenna angle but also weather turning off non-head nodes as much as possible.
4

LEACH uses single-hop routing where each node can


Page

Volume 3, Issue 1; January-February 2017; Page No.01-07


© 2017 IJAETIS. All Rights Reserved
Vinay Shrivastava et al. International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

transmit directly to the cluster-head and the sink. detection scheme, in which monitors are assigned to
Therefore, it is not applicable to networks deployed each optical multiplexing and transmission section.
in large regions. Furthermore, the idea of dynamic These approaches usually compute the probe paths
clustering brings extra overhead, e.g. head changes, according to different network symptoms, so as to
advertisements etc., which may diminish the gain in combine the network topology to infer the link
energy consumption. status. For a large scale sensor network, however,
deploying monitors in the wild not only increases the
III. LITERATURE SURVEY
cost, but also needs to guarantee sustainable
Network diagnosis has been extensively studied in management. Sniffers can be used to collect the
recent years. Existing approaches can be broadly information.
divided into two categories: debugging tools and
Malicious data injection becomes more problematic
inference schemes. This work belongs to the later
in the multihop networks due to topology structures.
category. [7] is a notable tool which focuses on
Malicious data injection plays an important part in
debugging sensor nodes at the source-level, and
network failure detection and network
enables developers to wirelessly connect to a
management. The backup node is used to secure
remote sensor and execute debugging commands.
data transmission. The data should be transmitted
Declarative Tracepoints allows the developers to
securely irrespective of malicious data injection
insert a group of action-associated checkpoints at
occurs on not. A wireless link itself nearly exists,
runtime, which are programmed in an SQL-like
which means we can’t directly see and appraise
declarative language. Existing inference-based
whether it achieves well or not. Malicious data
diagnosis schemes for WSNs like or trust deeply on
injection may cause failure of link in wireless sensor
an add in procedure that occasionally reports a big
network. It demonstrates problematic to localize the
amount of network information from separate
broken-down links under a dynamic mal-condition in
sensor nodes to the sink, announcing enormous
the remote, for the link quality will be meaningfully
overhead to the resource forced and traffic sensitive
impacted by the natural environment like flow in the
sensor network. In order to minimize the overhead,
ocean and trees in the forest. Malicious data
some researchers propose to establish inference
injection discovery becomes more difficult in the
models by marking the data packets and then parse
multi-hop networks due to topology structures.
the results at the sink to infer the network status, or
conduct the diagnosis process in local areas. [8] IV. CONCLUSION
apply Belief Network with the bipartite graph to WSNs have been the favorite choice for the
represent dependencies among links and end to end succeeding generation monitoring and control
connections, then the root causes can be deduced systems. Nodes in WSNs are disposed to letdown
by conducting inference on the Belief Network. [9] due to hardware letdown, energy reduction,
explores the bottleneck nodes in a WSN, and communication link faults, mischievous attack, and
enhances the network visibility by analyzing the so on. The data transmission is possible only if like
events and status in history. failure does not occur in wireless sensor network. In
Besides, most approaches actively design their any circumstances if link down the network cannot
probes to fetch desired information for faulty link continue to transfer the data to destination. .
detection [10], especially in the managed enterprise Malevolent info and data injection shows a
WLANs and wireless mesh networks, where the remarkable part in net system let-down recognition
monitors are easy to deploy. For each cycle, a node and network organisation. This paper presented a
is required to monitor the cycle’s performance. [11] survey of malicious data injection in wireless sensor
develops a non-adaptive fault diagnosis through a network.
set of probes where all the probes are employed in References
5

advance. The authors in [12] propose a failure


Page

Volume 3, Issue 1; January-February 2017; Page No.01-07


© 2017 IJAETIS. All Rights Reserved
Vinay Shrivastava et al. International Journal of Advanced Engineering Technology and Innovative Science (IJAETIS)

[1] Vittorio P. Illiano and Emil C. Lupu, Detecting [7] Q. Cao, T. Abdelzaher, J. Stankovic, K.
Malicious Data Injections in Event Detection Whitehouse, and L. Luo, “Declarative tracepoints: A
Wireless Sensor Networks, IEEE TRANSACTIONS ON programmable and application independent
NETWORK AND SERVICE MANAGEMENT, VOL. 12, debugging system for wireless sensor networks,” in
NO. 3, SEPTEMBER 2015, pp-496-512 Proc. ACM SenSys, Raleigh, NC, USA, 2008, pp. 85–
98.
[2] T. S. Rappaport et al., Wireless Communications:
Principles and Practice, vol. 207, Englewood Cliffs, [8] A. Cerpa, J. L. Wong, L. Kuang, M. Potkonjak, and
NJ, USA: Prentice-Hall, 1996. D. Estrin, “Statistical model of lossy links in wireless
sensor networks,” in Proc. IEEE IPSN, 2005, pp. 81–
[3] W. Dong, Y. Liu, Y. He, T. Zhu, and C. Chen,
88.
“Measurement and analysis on the packet delivery
performance in a large-scale sensor network,” [9] L. Girod et al., “EmStar: A software environment
IEEE/ACM Trans. Netw., vol. 22, no. 6, pp. 1952– for developing and deploying wireless sensor
1963, Dec. 2014. networks,” in Proc. USENIX Annu. Tech. Conf.,
Boston, MA, USA, 2004, p. 24.
[4] H. Chang et al., “Spinning beacons for precise
indoor localization,” in Proc. ACM SenSys, Raleigh, [10] Y. Hamazumi, M. Koga, K. Kawai, H. Ichino, and
NC, USA, 2008, pp. 127–140. K. Sato, “Optical path fault management in layered
networks,” in Proc. IEEE GLOBECOM, Sydney, NSW,
[5] Qiang Ma, Kebin Liu, Zhichao Cao, Tong Zhu,
Australia, 1998, pp. 2309–2314.
Yunhao Liu, Link Scanner: Faulty Link Detection for
Wireless Sensor Networks, IEEE TRANSACTIONS ON [11] C. Karlof and D. Wagner, “Secure routing in
WIRELESS COMMUNICATIONS, VOL. 14, pp 4428- wireless sensor networks: Attacks and
4438, Aug 2015 countermeasures,” AdHoc Netw., vol. 1, no. 2/3, pp.
293–315, 2003.
[6] S. S. Ahuja, S. Ramasubramanian, and M. M.
Krunz, “Single-link failure detection in all-optical [12] A. Perrig, J. Stankovic, and D. Wagner, “Security
networks using monitoring cycles and paths,” in wireless sensor networks,” Mag. Commun.,
vol. 47, no. 6, pp. 53–57, Jun. 2004
IEEE/ACM Trans. Netw., vol. 17, no. 4, pp. 1080–
1093, Aug. 2009.

6
Page

Volume 3, Issue 1; January-February 2017; Page No.01-07


© 2017 IJAETIS. All Rights Reserved

Das könnte Ihnen auch gefallen