Comparative Analysis of Detection Techniques for Malicious Node Identification in Wireless Sensor Networks

  • Mani Gopalsamy
  • , M. S. Nidhya
  • , Pulicherla Siva Prasad
  • , Balajee Maram
  • , Gauri Kalnoor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This research investigates the challenges of malicious node detection in Wireless Sensor Networks (WSNs). The study provides a comparative analysis of various detection techniques, including Trust-Based Mechanisms, Anomaly Detection, Reputation-Based Systems, Intrusion Detection Systems (IDS), Energy-Based Detection, and Hybrid Approaches. Each technique is evaluated based on its description, advantages, disadvantages, and common applications. The analysis highlights the tradeoffs between resource efficiency and detection accuracy, underscoring the need for adaptive and lightweight solutions to address the unique challenges of WSN security. This research provides valuable insights into the development of robust and secure WSNs, enabling their effective deployment in critical applications.

Original languageEnglish
Title of host publicationProceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1500-1502
Number of pages3
ISBN (Electronic)9798331529635
DOIs
Publication statusPublished - 2024
Event4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024 - Gobichettipalayam, India
Duration: 12-12-202413-12-2024

Publication series

NameProceedings of the 4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024

Conference

Conference4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
Country/TerritoryIndia
CityGobichettipalayam
Period12-12-2413-12-24

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Information Systems
  • Information Systems and Management
  • Health Informatics

Fingerprint

Dive into the research topics of 'Comparative Analysis of Detection Techniques for Malicious Node Identification in Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this