Simulation of Malicious Nodes Detection Based on Machine Learing for WSN

被引:0
|
作者
Zou, Kuancheng [1 ]
Ouyang, Yuanling [1 ]
Niu, Chuncheng [1 ]
Zou, Yi [2 ]
机构
[1] Changchun Univ Technol, Sch Comp Sci & Engn, Changchun 130012, Jilin, Peoples R China
[2] Dalian Fire Protect Engn Co LTD, Dalian 116013, Liaoning, Peoples R China
关键词
malicious nodes; Selective Forwarding; HELLO Flooding; Machine Learing; simulation; INTRUSION DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Machine Leafing based malicious nodes detection scheme was designed and simulated in this paper, which has modelded the characteristic behavior of Selective Forwarding, Hello Flooding and abstracted four properties of these two types of malicious nodes closely related. The nodes can be classified by using Machine Learning algorithms. The experimental results show that this method can correctly classify a certain number of sensor nodes with a lower error rate.
引用
收藏
页码:492 / +
页数:3
相关论文
共 50 条
  • [31] Machine Learning & Concept Drift based Approach for Malicious Website Detection
    Singhal, Siddharth
    Chawla, Utkarsh
    Shorey, Rajeev
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [32] Multi-probability sampling-based detection of malicious switching nodes in SDN
    Xiao, Jingxu
    Chang, Chaowen
    Wu, Ping
    Yuan, Lu
    COMPUTERS & SECURITY, 2025, 151
  • [33] A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique
    Alsarhan A.
    Al-Ghuwairi A.-R.
    Alshdaifat E.
    Idhaim H.
    alkhawaldeh O.
    International Journal of Interactive Mobile Technologies, 2022, 16 (03) : 136 - 150
  • [34] Node Default Detection and Optimal Placement of Nodes in WSN
    Nikhith, K.
    Sriram, Sripad
    Fancy, C.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [35] The limitations of unsupervised machine learning for identifying malicious nodes in IoT networks
    Sadek, Fatima Salma
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1984 - 1989
  • [36] An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression
    Ioannou, Christiana
    Vassiliou, Vasos
    MSWIM'18: PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2018, : 259 - 263
  • [37] Simulation on static detection of malicious code based on behavior information gain
    Wei, Pengcheng
    Shi, Chengxiang
    He, Fangcheng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7683 - 7692
  • [38] Detection of malicious URLs using machine learning
    Reyes-Dorta, Nuria
    Caballero-Gil, Pino
    Rosa-Remedios, Carlos
    WIRELESS NETWORKS, 2024, 30 (09) : 7543 - 7560
  • [39] The Location of the WSN-Nodes Based on RSSI
    Zheng, Jiachun
    APPLIED INFORMATICS AND COMMUNICATION, PT I, 2011, 224 : 550 - 559
  • [40] The Location of the WSN-Nodes Based on RSSI
    Zheng, Jiachun
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 322 - 325