Enhancing Wireless Sensor Network Security with Machine Learning

被引:0
作者
Van Nguyen Nhu Tam [1 ]
Cao Tien Thanh [1 ]
机构
[1] Univ Foreign Languages & Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
来源
CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024 | 2024年 / 1119卷
关键词
Wireless Sensor Networks; Machine Learning; Security; IoT; INTRUSION DETECTION; INTERNET; AUTHENTICATION; MECHANISM; SCHEME; SVM;
D O I
10.1007/978-3-031-70300-3_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Energy consumption and security pose significant challenges in wireless sensor networks (WSNs), often operating in opposition. As security measures become more intricate, they tend to amplify battery drainage. Traditional security protocols, reliant on encryption and key management, prove ineffective in WSNs due to the dynamic nature of sensor communication and network topology shifts. Consequently, machine learning (ML) algorithms emerge as potential solutions to bolster security by incorporating monitoring and decision intelligence. However, ML algorithms introduce additional hurdles, including training complexities and data requirements. This study serves as a comprehensive resource on WSN infrastructure and its security challenges, exploring the potential of ML algorithms to mitigate security costs across various domains. It also delves into challenges and proposed solutions for enhancing sensor capabilities to detect threats, attacks, risks, and malicious nodes through continuous learning and self-development using ML algorithms. Additionally, the study addresses open issues regarding the adaptation of ML algorithms to suit sensor capabilities in WSNs.
引用
收藏
页码:604 / 626
页数:23
相关论文
共 84 条
[11]   A Survey on Congestion Control Protocols in Wireless Sensor Networks [J].
Bohloulzadeh, Atousa ;
Rajaei, Mehri .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2020, 27 (03) :365-384
[12]   A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept [J].
Borkar, Gautam M. ;
Patil, Leena H. ;
Dalgade, Dilip ;
Hutke, Ankush .
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2019, 23 (120-135) :120-135
[13]   A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology [J].
Bouaziz, Maha ;
Rachedi, Abderrezak .
COMPUTER COMMUNICATIONS, 2016, 74 :3-15
[14]  
Cao Tien Thanh, 2020, Artificial Intelligence and Bioinspired Computational Methods. Proceedings of the 9th Computer Science On-line Conference 2020. Advances in Intelligent Systems and Computing (AISC 1225), P297, DOI 10.1007/978-3-030-51971-1_24
[15]   Modeling and Testing Power Consumption Rate of Low-Power Wi-Fi Sensor Motes for Smart Building Applications [J].
Cao Tien Thanh .
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018, 2018, 11251 :449-459
[16]   Design, Analysis and Testing of a Component Head Injury Criterion Tester for Pilot [J].
Cheng, Nannan ;
Wang, Liang ;
Liu, Yongguang ;
Zhang, Chunyou .
IEEE ACCESS, 2019, 7 :114888-114896
[17]   A survey on application of machine learning for Internet of Things [J].
Cui, Laizhong ;
Yang, Shu ;
Chen, Fei ;
Ming, Zhong ;
Lu, Nan ;
Qin, Jing .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (08) :1399-1417
[18]   BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks [J].
Darabkh, Khalid A. ;
El-Yabroudi, Mohammad Z. ;
El-Mousa, Ali H. .
AD HOC NETWORKS, 2019, 82 :155-171
[19]  
Das R., 2018, A deep learning approach to iot authentication
[20]   A Survey on LoRaWAN Architecture, Protocol and Technologies [J].
Erturk, Mehmet Ali ;
Aydin, Muhammed Ali ;
Buyukakkaslar, Muhammet Talha ;
Evirgen, Hayrettin .
FUTURE INTERNET, 2019, 11 (10)