Simulation of Malicious Nodes Detection Based on Machine Learing for WSN

被引:0
|
作者
Zou, Kuancheng [1 ]
Ouyang, Yuanling [1 ]
Niu, Chuncheng [1 ]
Zou, Yi [2 ]
机构
[1] Changchun Univ Technol, Sch Comp Sci & Engn, Changchun 130012, Jilin, Peoples R China
[2] Dalian Fire Protect Engn Co LTD, Dalian 116013, Liaoning, Peoples R China
关键词
malicious nodes; Selective Forwarding; HELLO Flooding; Machine Learing; simulation; INTRUSION DETECTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Machine Leafing based malicious nodes detection scheme was designed and simulated in this paper, which has modelded the characteristic behavior of Selective Forwarding, Hello Flooding and abstracted four properties of these two types of malicious nodes closely related. The nodes can be classified by using Machine Learning algorithms. The experimental results show that this method can correctly classify a certain number of sensor nodes with a lower error rate.
引用
收藏
页码:492 / +
页数:3
相关论文
共 50 条
  • [41] INTRUSION DETECTION SYSTEM TO DETECT MALICIOUS MISBEHAVIOUR NODES IN MANET
    Vijay, M.
    Sujatha, R.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [42] A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET
    Dhanalakshmi, S.
    Rajaram, M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (10): : 184 - 190
  • [43] Advanced detection of selfish or malicious nodes in ad hoc networks
    Kargl, F
    Klenk, A
    Schlott, S
    Weber, M
    SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
  • [44] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
  • [45] Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes
    Choi, Sunoh
    Ghinita, Gabriel
    Bertino, Elisa
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 19 - 27
  • [46] Malicious web content detection by machine learning
    Hou, Yung-Tsung
    Chang, Yimeng
    Chen, Tsuhan
    Laih, Chi-Sung
    Chen, Chia-Mei
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 55 - 60
  • [47] A Multipath Reliable Routing for Detection and Isolation of Malicious Nodes in MANET
    Somasundaram, Dhanalakshmi
    Marimuthu, Rajaram
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 176 - +
  • [48] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [49] A Novel Detection Scheme for Malicious Nodes in Smart Meter System
    Wen, Hong
    Zhang, Xiaochun
    Cai, Lei
    Tang, Jie
    Zhu, Xiping
    Jiang, Yixin
    Guo, Xiaobin
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 379 - +
  • [50] Malicious URL Detection Using Machine Learning
    Hani, Dr Raed Bani
    Amoura, Motasem
    Ammourah, Mohammad
    Abu Khalil, Yazeed
    2024 15TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS, ICICS 2024, 2024,