Malicious Attack Detection in Underwater Wireless Sensor Network

被引:0
|
作者
Ahmed, Muhammad R. [1 ]
Tehsien, Syeda Manjia [2 ]
Aseeri, Mohammed [3 ]
Kaiser, M. Shamim [4 ]
机构
[1] Mil Technol Coll, Muscat, Oman
[2] Mil Inst Sci & Technol, Dhaka, Bangladesh
[3] King Abdul Aziz City Sci & Technol, Riyadh, Saudi Arabia
[4] Jahangrinagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
关键词
Underwater Wireless Sensor Network (UWSN); Maliciuos attacks; Security; support vector machnie;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Under-water wireless sensor network (UWSN) in one of the auspicious technology for marine observation. The applications of underwater sensing has several domain that range from oil industry to aquaculture. Some of the UWSN applications includes device checking, underwater ecosystems monitoring, forecasting of natural disasters and disturbances, exploration and survey missions, as well as study of oceanic life. With the characteristics and applications platform of UWSN, security of UWSN is a critical issue and had drawn significant attention to the researchers. In order to have a functional UWSN to extract the authentic data safeguarding and protection mechanisms are crucial. Malicious node attacks has accomplished eminence and constitute the utmost challenging attacks to UWSN. Several research has been conducted to protect UWSN from malicious attacks but majority of the works depend on a defined threshold prior to the deployment or a training data set. It is a complication and challenge for UWSN that with no established security groundwork a UWSN required to detect the malicious attacks. In this paper, we support vector machine to identify the malicious attacks in a UWSN. SVM delivers good result and its training time is much smaller comparing with neural networks.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Detection of Sinkhole Attack in Wireless Sensor Network
    Raju, Imandi
    Parwekar, Pritee
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 629 - 636
  • [2] Detection and mitigation of sinkhole attack in wireless sensor network
    [J]. 2016, Institute of Electrical and Electronics Engineers Inc., United States
  • [3] Detection and Defence of Sinkhole Attack in Wireless Sensor Network
    Jin Qi
    Tang Hong
    Kuang Xiaohui
    Liu Qiang
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 809 - 813
  • [4] Detection and Mitigation of Sinkhole Attack in wireless sensor network
    Kaur, Manpreet
    Singh, Amarvir
    [J]. 2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 217 - 221
  • [5] A Novel Reputation Model for Malicious Node Detection in Wireless Sensor Network
    Yin, Guisheng
    Yang, Guang
    Yang, Wu
    Yu, Xiang
    Zuo, Dongmei
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3462 - +
  • [6] Synthetical Malicious Behavior Detection of MAC Layer Multiple Attack in Wireless Sensor Networks
    Jiang, Shuai
    Wang, Jian
    [J]. INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [7] Malicious attack detection based on continuous Hidden Markov Models in Wireless sensor networks
    Moundounga, Anselme Russel Affane
    Satori, Hassan
    Boutazart, Youssef
    Abderrahim, Ezzine
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2023, 101
  • [8] Underwater Wireless Sensor Network
    Faugstadmo, Jan Erik
    Pettersen, Magne
    Hovem, Jens M.
    Lie, Arne
    Reinen, Tor Arne
    [J]. 2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 422 - 427
  • [9] Attack Detection in Wireless Sensor Network: A Big Data Perspective
    Kulkarni, A. V.
    Mithra, V.
    Menon, Radhika
    [J]. CYBERNETICS AND SYSTEMS, 2022, 55 (08) : 2512 - 2539
  • [10] Detection of Jamming Style DoS attack in Wireless Sensor Network
    Manju, V. C.
    Kumar, Sasi M.
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 563 - 567