Emerging network communication for malicious node detection in wireless multimedia sensor networks

被引:0
|
作者
S. Arockia Jayadhas
S. Emalda Roslin
W. Florin
机构
[1] Sathyabama Institute of Science and Technology,Faculty of Electronics
[2] Sathyabama Institute of Science and Technology,Department of Electronics and Communication Engineering
[3] St. Joseph University in Tanzania,Department of Electrical, Electronics and Communication Engineering
来源
关键词
WMSNs; Convolutional neural network; Intrusion detection; Black hole attack; Wormhole attack; Deep learning technique; Random forest;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless sensor networks (WMSNs) are becoming increasingly popular in many fields, from academia to transportation, environmental monitoring, wildlife preservation, and military espionage. Therefore, examining potential threats, power consumption, vulnerability recognition, and systemic vulnerability characteristics is essential to develop a reliable information security approach for WSNs. As a result, it is becoming increasingly crucial for the technical community to conduct intrusion recognition method evaluations. Since this is the case, using deep learning techniques in creating intrusion identification and mitigation systems for wireless multimedia sensor networks is essential. This article examines how well different machine learning and deep learning algorithms perform in attack identification systems. Testing the efficacy of different methods on the WMSN-DS database through experimentation is essential. In this work, we combine the power of a Convolutional Neural Network classifier with a Random Forest. To accomplish this, a Convolutional Neural Network with a Random Forest Classifier is used. The intrusion detection system (IDS) is a crucial technique proposed in this study for WMSN. To address this issue, the current study proposal uses deep Learning with a Random Forest classifier to detect and prevent attacks and to promote efficient forwarding in WMSNs. Multiple WMSN assaults have been investigated, and the results of these investigations have been critically evaluated.
引用
收藏
相关论文
共 50 条
  • [41] A Cooperative approach for Malicious Node Detection in impromptu Wireless Networks
    Gupta, Devendra
    Dhawale, Chitra
    Misra, Sanjay
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [42] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [43] Exploiting Malicious Node Detection for Lifetime Extension of Sensor Networks
    Behnke, R.
    Salzmann, J.
    Lieckfeldt, D.
    Thurow, K.
    Golatowski, F.
    Timmermann, D.
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 284 - +
  • [44] Design and Implementation of An Intelligence Wireless Multimedia Sensor Networks Node
    He, Xuan
    Hao, Qun
    Zhao, Longhai
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4701 - 4704
  • [45] A Strategy of Node Membership Verification for Wireless Multimedia Sensor Networks
    Jia, Yufu
    Sun, Baolin
    Zhu, Qing
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 3353 - 3356
  • [46] Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks
    Dai, Hongjun
    Liu, Huabo
    Jia, Zhiping
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2910 - 2923
  • [47] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    L. Gandhimathi
    G. Murugaboopathi
    [J]. Wireless Personal Communications, 2021, 117 : 1209 - 1222
  • [48] Mobile Malicious Node Detection Using Mobile Agent in Cluster-Based Wireless Sensor Networks
    Gandhimathi, L.
    Murugaboopathi, G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 117 (02) : 1209 - 1222
  • [49] Malicious Cluster Head Detection Mechanism in Wireless Sensor Networks
    Asima Ismail
    Rashid Amin
    [J]. Wireless Personal Communications, 2019, 108 : 2117 - 2135
  • [50] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617