A Comparison based Clustering Algorithm to Counter SSDF attack in CWSN

被引:2
|
作者
Chatterjee, Sukanya [1 ]
Chatterjee, Pinaki S. [1 ]
机构
[1] KIIT Univ, Sch Comp Engn, Bhubaneswar, Orissa, India
关键词
Cognitive Wireless Sensor Network; Denial of Service attack; Spectrum Sensing Data Falsification attack;
D O I
10.1109/CINE.2015.46
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cognitive Wireless Sensor Networks follow IEEE 802.22 standard which is based on the concept of cognitive radio. In this paper we have studied the Denial of Service (DOS) attack. Spectrum Sensing Data Falsification (SSDF) attack is one such type of DOS attack. In this attack the attackers modify the sensing report in order to compel the Secondary User (SU) to take a wrong decision regarding the vacant spectrum band in other's network. In this paper we have proposed a similarity-based clustering of sensing data to counter the above attack.
引用
收藏
页码:194 / 195
页数:2
相关论文
共 50 条
  • [41] A Grid Based Clustering Algorithm
    Zhang, Qiang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [42] A clustering algorithm based on mechanics
    Zhang, Xianchao
    Jiang, He
    Liu, Xinyue
    Yu, Hong
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, 4426 : 367 - +
  • [43] Characterization of a Bayesian genetic clustering algorithm based on a Dirichlet process prior and comparison among Bayesian clustering methods
    Akio Onogi
    Masanobu Nurimoto
    Mitsuo Morita
    BMC Bioinformatics, 12
  • [44] Characterization of a Bayesian genetic clustering algorithm based on a Dirichlet process prior and comparison among Bayesian clustering methods
    Onogi, Akio
    Nurimoto, Masanobu
    Morita, Mitsuo
    BMC BIOINFORMATICS, 2011, 12
  • [45] Clustering Algorithm Comparison of Search Results Documents
    David
    Kosala, Raymondus Raymond
    2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 328 - 333
  • [46] Bayesian-Inference-Based Sliding Window Trust Model Against Probabilistic SSDF Attack in Cognitive Radio Networks
    Fu, Yuanhua
    He, Zhiming
    IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1764 - 1775
  • [47] Network anomalous attack detection based on clustering and classifier
    Yang, Hongyu
    Xie, Feng
    Lu, Yi
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 672 - +
  • [48] Attack scenario construction based on rule and fuzzy clustering
    Ma, LR
    Yang, L
    Wang, JX
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 328 - 333
  • [49] Correlation Clustering Based on Genetic Algorithm for Documents Clustering
    Zhang, Zhenya
    Cheng, Hongmei
    Chen, Wanli
    Zhang, Shuguang
    Fang, Qiansheng
    2008 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1-8, 2008, : 3193 - +
  • [50] Text clustering based on kernel KNN clustering algorithm
    Xiong, Hao
    Sun, Sheng
    Feng, Yunfang
    International Journal of Applied Mathematics and Statistics, 2013, 46 (16): : 69 - 75