Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine

被引:0
|
作者
Jaint, Bhavnesh [1 ]
Indu, S. [2 ]
Pandey, Neeta [2 ]
Pahwa, Khushbu [3 ]
机构
[1] Delhi Technol Univ, Dept Elect Engn, Delhi, India
[2] Delhi Technol Univ, Dept Elect & Commun Engn, Delhi, India
[3] Delhi Technol Univ, Dept Elect & Elect Engn, Delhi, India
关键词
Malicious Nodes; Sensor Nodes; SVM; WSN;
D O I
10.1109/rdcape47089.2019.8979125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks are basically a collection of sensor nodes scattered in a large area such that the desired information can be collected. But sensor nodes are also vulnerable to the attacks such as malware, hackers, faulty hardware or from the physical phenomenon etc. Hence, it is mandatory to protect a sensor node from an attack because if it gets attacked then the information sent by the sensor could be wrong and lead to incorrect data analysis and hence can lead to unnecessary outcomes. In this paper, a technique based on machine learning to discover malicious nodes within a randomly deployed sensor network has been proposed. Here, Support Vector Machine for time series prediction has been employed to find the malicious nodes based on the past values acquired by those individual nodes.
引用
收藏
页码:247 / 252
页数:6
相关论文
共 50 条
  • [1] Malicious Node Detection in Wireless Sensor Networks
    Atassi, Alaa
    Sayegh, Naoum
    Elhajj, Imad
    Chehab, Ali
    Kayssi, Ayman
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2013, : 456 - 461
  • [2] Malicious Node Detection Using a Dual Threshold in Wireless Sensor Networks
    Lim, Sung Yul
    Choi, Yoon-Hwa
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2013, 2 (01): : 70 - 84
  • [3] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
    Khashan, Osama A.
    [J]. KNOWLEDGE-BASED SYSTEMS, 2024, 304
  • [4] Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine
    Zhang, Yang
    Meratnia, Nirvana
    Havinga, Paul J. M.
    [J]. AD HOC NETWORKS, 2013, 11 (03) : 1062 - 1074
  • [5] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    [J]. IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [6] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    [J]. Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [7] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [8] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 512 - 523
  • [9] Machine fault diagnosis using industrial wireless sensor networks and support vector machine
    Bai Jie
    Hou Liqun
    Ma Yongguang
    [J]. PROCEEDINGS OF 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS (ICEMI), VOL. 1, 2015, : 157 - 162
  • [10] Node cooperation based support vector machine localization algorithm in mobile wireless sensor networks
    Guo, Qing
    Tang, Tao
    [J]. SMART SENSOR PHENOMENA, TECHNOLOGY, NETWORKS, AND SYSTEMS 2011, 2011, 7982