CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Sensor Validation Schemes: Contemporary Affirmation of the Recent Literature

by Abdo M.T. Nasser, V.P. Pawar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 11
Year of Publication: 2015
Authors: Abdo M.T. Nasser, V.P. Pawar
10.5120/ijca2015906669

Abdo M.T. Nasser, V.P. Pawar . Sensor Validation Schemes: Contemporary Affirmation of the Recent Literature. International Journal of Computer Applications. 128, 11 ( October 2015), 18-24. DOI=10.5120/ijca2015906669

@article{ 10.5120/ijca2015906669,
author = { Abdo M.T. Nasser, V.P. Pawar },
title = { Sensor Validation Schemes: Contemporary Affirmation of the Recent Literature },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 11 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number11/22918-2015906669/ },
doi = { 10.5120/ijca2015906669 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:09.343954+05:30
%A Abdo M.T. Nasser
%A V.P. Pawar
%T Sensor Validation Schemes: Contemporary Affirmation of the Recent Literature
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 11
%P 18-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sensors are currently used in a lot of application areas such as health related application, military application, control and tracking application and habitat monitoring and environment applications. This paper introduces various number of sensor validation schemes in sensor network as an overview in this area. This paper entitles the description of the types of attacks and statement of the motivation for sensor validation in sensor network. Then, it introduces challenges of developing a typical sensor validation scheme for sensor networks which is followed by the major principle requirements of a good candidate sensor validation schemes. State-of-art of sensor validation schemes provided in this paper based on the techniques used in each schemes. Four major techniques of sensor validation are categorized as follows: Data mining, computational intelligence-based, rule-based, statistical-based and game theoretical based. Each schemes in this category is analyzed, showing their advantages and disadvantages. Finally, the survey concludes with presenting recommendations that provide some importance research opportunities in this area for future researcher.

References
  1. G. Steinbauer. a survey on the nature of faults of autonomous robot systems. http://www.ist.tugraz.at/rfs/index.php/Main_Page
  2. Stetsko, A., L. Folkman and V. Matyas, 2010. Neighbor-based sensor validation for Sensor Networks. Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), Sept. 20-25, IEEE Xplore Press, Valencia, pp: 420-425. DOI: 10.1109/ICWMC.2010.61 Tan, P.N., 2007. Introduction To Data Mining. 1st Edn., Pearson Education India, ISBN-10: 8131714721, pp: 792.
  3. Lemos, M.V.D.S., L.B. Leal and R.H. Filho, 2010. A new collaborative approach for intrusion detection system on wireless sensor networks. Novel Algorithms Techniques Telecommun. Netw.
  4. Chi, S.H. and T.H. Cho, 2006. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks. Proceedings of the 3rd International Conference on Fuzzy Systems and Knowledge Discovery, (FSKD’ 26), SpringerVerlag Berlin, Heidelberg, pp: 725-734.
  5. Moon, S.Y. and T.H. Cho, 2009. Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. Int. J. Comput.Sci. Netw. Security, 9: 118-122.
  6. Ponomarchuk, Y.A. and Seo D.W., 2010. Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J. Convergence, 1: 35-42.
  7. Loo, C., M. Ng, C. Leckie and M. Palaniswami, 2006. Intrusion detection for routing attacks in sensor networks. Int. J. Distributed Sensor Netw., 2: 313-332.
  8. Kaplantzis, S., A. Shilton, N. Mani and Y.A. Sekercioglu, 2007. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information Dec. 3-6, IEEE Xplore Press, Melbourne, Qld., pp: 335-340.
  9. Huai-Bin, W., Y. Zheng and W. Chun-Dong, 2009.Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. Proceedings of the International Conference on Communications and Mobile Computing, WRI.
  10. Muraleedharan, R. and L.A. Osadciw, 2009. An intrusion detection framework for sensor networks using ant colony. Proceedings of the 43rd Asilomar Conference on Signals, Systems and Computers, IEEE Xplore Press, Pacific Grove, California, USA, pp: 275-278.
  11. Juneja, D. and N. Arora. 2010. An Ant based framework for preventing DDoS attack in wireless sensor networks. Int. J. Adv. Technol., 1: 1-11.
  12. Doumit, S.S. and D.P. Agrawal, 2003. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks.Proceedings of the Conference on IEEE Military Communications, Oct. 13-16
  13. Wang, S.S., K.Q. Yan, S.C. Wang and C.W. Liu, 2011.An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks, Expert Syst. Appli., 38: 15234-15243.
  14. Agah, A., S.K. Das, K. Basu and M. Asadi, 2004. Intrusion detection in sensor networks: A noncooperative game approach. Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications, 30 Aug.-1 Sept., IEEE Xpolore Press, pp: 343-346
  15. McCune, J.M., E. Shi, A. Perrig and M.K. Reiter, 2005.Detection of denial-of-message attacks on sensor network broadcasts. Proceedings of the IEEE Symposium on Security and Privacy, May 8-11, IEEE Xplore Press, pp: 64-78
  16. Reddy, Y.B. and S. Srivathsan, 2009. Game theory model for selective forward attacks in wireless sensor networks, Proceedings of the 17th Mediterranean Conference on Control and Automation, Jun. 24-26, IEEE Xplore Press,Thessaloniki, pp: 458-463.
  17. Buttyán, L., L. Dóra and I. Vajda, 2005. Statistical Wormhole Detection in Sensor Networks. In: Security and Privacy in Ad-hoc and Sensor Networks, Molva
Index Terms

Computer Science
Information Sciences

Keywords

Data mining computational intelligence (CI) rule-based.