Emerging network communication for malicious node detection in wireless multimedia sensor networks

被引:0
|
作者
S. Arockia Jayadhas
S. Emalda Roslin
W. Florin
机构
[1] Sathyabama Institute of Science and Technology,Faculty of Electronics
[2] Sathyabama Institute of Science and Technology,Department of Electronics and Communication Engineering
[3] St. Joseph University in Tanzania,Department of Electrical, Electronics and Communication Engineering
来源
关键词
WMSNs; Convolutional neural network; Intrusion detection; Black hole attack; Wormhole attack; Deep learning technique; Random forest;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WMSNs) are becoming increasingly popular in many fields, from academia to transportation, environmental monitoring, wildlife preservation, and military espionage. Therefore, examining potential threats, power consumption, vulnerability recognition, and systemic vulnerability characteristics is essential to develop a reliable information security approach for WSNs. As a result, it is becoming increasingly crucial for the technical community to conduct intrusion recognition method evaluations. Since this is the case, using deep learning techniques in creating intrusion identification and mitigation systems for wireless multimedia sensor networks is essential. This article examines how well different machine learning and deep learning algorithms perform in attack identification systems. Testing the efficacy of different methods on the WMSN-DS database through experimentation is essential. In this work, we combine the power of a Convolutional Neural Network classifier with a Random Forest. To accomplish this, a Convolutional Neural Network with a Random Forest Classifier is used. The intrusion detection system (IDS) is a crucial technique proposed in this study for WMSN. To address this issue, the current study proposal uses deep Learning with a Random Forest classifier to detect and prevent attacks and to promote efficient forwarding in WMSNs. Multiple WMSN assaults have been investigated, and the results of these investigations have been critically evaluated.
引用
收藏
相关论文
共 50 条
  • [21] An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks
    Alanazi, Adwan
    Elleithy, Khaled
    [J]. SENSORS, 2016, 16 (09)
  • [22] A Multipath Secure Routing Protocol Based on Malicious Node Detection in Wireless Sensor Networks
    Yao Lan
    Gao Fuxiang
    Zhao Zhibin
    [J]. ADVANCED MEASUREMENT AND TEST, PARTS 1 AND 2, 2010, 439-440 : 799 - 804
  • [23] System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks
    Grgic, Kresimir
    Zagar, Drago
    Cik, Visnja Krizanovic
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [24] Node placement of linear wireless multimedia sensor networks for maximum network lifetime
    Cao, Ming
    Yang, Laurence T.
    Chen, Xinmeng
    Xiong, Naixue
    [J]. ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2008, 5036 : 373 - +
  • [25] Malicious Node Detection Scheme Based on Energy Potential Field in Wireless Sensor Networks
    Xu, Xingkun
    Zhao, Ting
    Zheng, Xiaokun
    Wang, Huixin
    Fang, Wenjuan
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 637 - 642
  • [26] A PSO based malicious node detection and energy efficient clustering in wireless sensor network
    Kumar, Sumit
    Mehfuz, Shabana
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 859 - 863
  • [27] Enhanced LEACH Protocol Based Wireless Sensor Network Malicious Node Detection Model
    Yang H.-Y.
    Cheng F.
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2019, 39 (03): : 304 - 310
  • [28] Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
    Nirmala, B. Vijaya
    Selvaraj, K.
    [J]. WIRELESS NETWORKS, 2024,
  • [29] Research and design of a Node of wireless Multimedia Sensor Network
    Fan, Tanghuai
    Xu, Lizhong
    Zhang, Xuewu
    Wang, Huibin
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4762 - +
  • [30] Distributed Malicious Nodes Detection in Wireless Sensor Networks
    Zhang Zhaohui
    Hu Mingming
    Li Dong
    Qi Xiaogang
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 1243 - 1246