2017
DOI: 10.4018/ijcwt.2017040103
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks

Abstract: Wireless sensor networks have gained attention over the last few years and have significant applications for example remote supervising and target watching. They can communicate with each other though wireless interface and configure a network. Wireless sensor networks are often deployed in an unfriendly location and most of time it works without human management; individual node may possibly be compromised by the adversary due to some constraints. In this manner, the security of a wireless sensor network is c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 17 publications
(1 reference statement)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?