Enhancing Wireless Sensor Network Security with Machine Learning

被引:0
作者
Van Nguyen Nhu Tam [1 ]
Cao Tien Thanh [1 ]
机构
[1] Univ Foreign Languages & Informat Technol, Dept Informat Technol, Ho Chi Minh City, Vietnam
来源
CYBERNETICS AND CONTROL THEORY IN SYSTEMS, VOL 2, CSOC 2024 | 2024年 / 1119卷
关键词
Wireless Sensor Networks; Machine Learning; Security; IoT; INTRUSION DETECTION; INTERNET; AUTHENTICATION; MECHANISM; SCHEME; SVM;
D O I
10.1007/978-3-031-70300-3_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Energy consumption and security pose significant challenges in wireless sensor networks (WSNs), often operating in opposition. As security measures become more intricate, they tend to amplify battery drainage. Traditional security protocols, reliant on encryption and key management, prove ineffective in WSNs due to the dynamic nature of sensor communication and network topology shifts. Consequently, machine learning (ML) algorithms emerge as potential solutions to bolster security by incorporating monitoring and decision intelligence. However, ML algorithms introduce additional hurdles, including training complexities and data requirements. This study serves as a comprehensive resource on WSN infrastructure and its security challenges, exploring the potential of ML algorithms to mitigate security costs across various domains. It also delves into challenges and proposed solutions for enhancing sensor capabilities to detect threats, attacks, risks, and malicious nodes through continuous learning and self-development using ML algorithms. Additionally, the study addresses open issues regarding the adaptation of ML algorithms to suit sensor capabilities in WSNs.
引用
收藏
页码:604 / 626
页数:23
相关论文
共 84 条
[41]  
Mamdouh M., 2018, Securing the internet of things and wireless sensor networks via machine learning: A survey
[42]   Toward an Integration of Deep Learning and Neuroscience [J].
Marblestone, Adam H. ;
Wayne, Greg ;
Kording, Konrad P. .
FRONTIERS IN COMPUTATIONAL NEUROSCIENCE, 2016, 10
[43]  
Meddeb A., 2017, 6lowpan multi-layered security protocol based on ieee 802.15.4 security features
[44]   A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks [J].
Mo, Jiaqing ;
Chen, Hang .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[45]  
Modak S., 2019, Applications of artificial intelligence and machine learning in viral biology
[46]  
Moridi M.A., 2018, Tunnelling Underground Space Technol., V71
[47]   Business process outsourcing to the cloud: Balancing costs with security risks [J].
Nacer, Amina Ahmed ;
Godart, Claude ;
Rosinosky, Guillaume ;
Tari, Abdelkamel ;
Youcef, Samir .
COMPUTERS IN INDUSTRY, 2019, 104 (59-74) :59-74
[48]  
Nelli A., 2017, Inter. J. Adv. Eng. Manag. Sci., V3
[49]  
Olsson J., 2014, 6LoWPAN demystified
[50]  
Pan F., 2017, Physical layer authentication based on channel information and machine learn- ing