Simulation of Malicious Nodes Detection Based on Machine Learing for WSN

被引:0
|
作者
Zou, Kuancheng [1 ]
Ouyang, Yuanling [1 ]
Niu, Chuncheng [1 ]
Zou, Yi [2 ]
机构
[1] Changchun Univ Technol, Sch Comp Sci & Engn, Changchun 130012, Jilin, Peoples R China
[2] Dalian Fire Protect Engn Co LTD, Dalian 116013, Liaoning, Peoples R China
关键词
malicious nodes; Selective Forwarding; HELLO Flooding; Machine Learing; simulation; INTRUSION DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Machine Leafing based malicious nodes detection scheme was designed and simulated in this paper, which has modelded the characteristic behavior of Selective Forwarding, Hello Flooding and abstracted four properties of these two types of malicious nodes closely related. The nodes can be classified by using Machine Learning algorithms. The experimental results show that this method can correctly classify a certain number of sensor nodes with a lower error rate.
引用
收藏
页码:492 / +
页数:3
相关论文
共 50 条
  • [1] Detection and location of malicious nodes based on source coding and multi-path transmission in WSN
    Wang, Weiping
    Xu, Jinhong
    Wang, Jianxin
    HPCC: 2009 11TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2009, : 458 - 463
  • [2] Detection of malicious nodes based on consortium blockchain
    Luo, Song
    Lai, Lianghai
    Hu, Tan
    Hu, Xin
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [3] Trust Based Malicious Nodes Detection in MANET
    Gong, Wei
    You, Zhiyang
    Chen, Danning
    Zhao, Xibin
    Gu, Ming
    Lam, Kwok-Yan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 205 - +
  • [4] Detection of malicious nodes based on consortium blockchain
    Luo S.
    Lai L.
    Hu T.
    Hu X.
    PeerJ Computer Science, 2024, 10 : 1 - 26
  • [5] Decentralised malicious node detection in WSN
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (01) : 15 - 25
  • [6] Malicious URL Detection based on Machine Learning
    Cho Do Xuan
    Hoa Dinh Nguyen
    Nikolaevich, Tisenko Victor
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 148 - 153
  • [7] A blockchain and stacked machine learning approach for malicious nodes’ detection in internet of things
    Shakira Musa Baig
    Muhammad Umar Javed
    Ahmad Almogren
    Nadeem Javaid
    Mohsin Jamil
    Peer-to-Peer Networking and Applications, 2023, 16 : 2811 - 2832
  • [8] A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things
    Baig, Shakira Musa
    Javed, Muhammad Umar
    Almogren, Ahmad
    Javaid, Nadeem
    Jamil, Mohsin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (06) : 2811 - 2832
  • [9] Trust Based Certificate Authority for Detection of Malicious Nodes in MANET
    Manoj, V.
    Raghavendiran, N.
    Aaqib, M.
    Vijayan, R.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 392 - 401
  • [10] A detection mechanism on malicious nodes in IoT
    Li, Bohan
    Ye, Renjun
    Gu, Gao
    Liang, Ruochen
    Liu, Wei
    Cai, Ken
    COMPUTER COMMUNICATIONS, 2020, 151 (151) : 51 - 59