Enhancing Wireless Sensor Network Security with Machine Learning

被引:0
作者
Van Nguyen Nhu Tam [1 ]
Cao Tien Thanh [1 ]
机构
[1] Univ Foreign Languages & Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
来源
CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024 | 2024年 / 1119卷
关键词
Wireless Sensor Networks; Machine Learning; Security; IoT; INTRUSION DETECTION; INTERNET; AUTHENTICATION; MECHANISM; SCHEME; SVM;
D O I
10.1007/978-3-031-70300-3_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Energy consumption and security pose significant challenges in wireless sensor networks (WSNs), often operating in opposition. As security measures become more intricate, they tend to amplify battery drainage. Traditional security protocols, reliant on encryption and key management, prove ineffective in WSNs due to the dynamic nature of sensor communication and network topology shifts. Consequently, machine learning (ML) algorithms emerge as potential solutions to bolster security by incorporating monitoring and decision intelligence. However, ML algorithms introduce additional hurdles, including training complexities and data requirements. This study serves as a comprehensive resource on WSN infrastructure and its security challenges, exploring the potential of ML algorithms to mitigate security costs across various domains. It also delves into challenges and proposed solutions for enhancing sensor capabilities to detect threats, attacks, risks, and malicious nodes through continuous learning and self-development using ML algorithms. Additionally, the study addresses open issues regarding the adaptation of ML algorithms to suit sensor capabilities in WSNs.
引用
收藏
页码:604 / 626
页数:23
相关论文
共 84 条
[1]   AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors [J].
Abuhamad, Mohammed ;
Abuhmed, Tamer ;
Mohaisen, David ;
Nyang, DaeHun .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) :5008-5020
[2]   Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection [J].
Ahmad, Iftikhar ;
Basheri, Mohammad ;
Iqbal, Muhammad Javed ;
Rahim, Aneel .
IEEE ACCESS, 2018, 6 :33789-33795
[3]  
Ahmad R., 2021, Analysis the effect of clustering and lightweight encryption approaches on wsns lifetime
[4]  
Ahmad R.H., 2016, A study on m2m (machine to machine) system and commu- nication: Its security, threats, and intrusion detection system
[5]  
Akhtar F., 2015, Energy replenishment using renewable and traditional energy resources for sustainable wireless sensor networks: a review
[6]   Deep Learning Approach Combining Sparse Autoencoder With SVM for Network Intrusion Detection [J].
Al-Qatf, Majjed ;
Yu Lasheng ;
Al-Habib, Mohammed ;
Al-Sabahi, Kamal .
IEEE ACCESS, 2018, 6 :52843-52856
[7]   Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm [J].
Ali, Munwar ;
Jung, Low Tang ;
Abdel-Aty, Abdel-Haleem ;
Abubakar, Mustapha Y. ;
Elhoseny, Mohamed ;
Ali, Irfan .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 151
[8]  
Alshrif F.F., 2021, New framework for authentication and key establishment to secure 6lowpan networks
[9]  
Ashibani Y., 2020, A machine learning-based user authentication model using mobile app data, V1029
[10]  
Bikmukhamedov R.F., 2019, Lightweight machine learning classifiers of iot traffic flows