Security Enhancement in Wireless Sensor Networks using Machine Learning

被引:13
作者
Raj, Aswathy B.
Ramesh, Maneesha V.
Kulkarni, Raghavendra V.
Hemalatha, T.
机构
来源
2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS) | 2012年
关键词
Wireless Sensor Networks; Security; Denial of Service; Neural Network; Support Vector Machine; SERVICE;
D O I
10.1109/HPCC.2012.186
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Ensuring the security of wireless sensor networks (WSNs) is vital for monitoring real-time systems. One of the major security flaws experienced by WSNs is denial of service (DoS) which can even lead to the breakdown of the complete system or to wrong decisions being made by the system that can cause adverse results. This research work focuses on two techniques for detecting a DoS attack at a medium access control (MAC) layer. Our research compares and evaluates the performance of two major machine learning techniques: neural network (NN) and support vector machine (SVM). Vanderbilt Prowler is used for simulating the scenarios. In the simulations, normalized critical parameters and their corresponding probabilities of DoS attack are computed in 50 trial runs. These normalized critical parameters and their corresponding probabilities of DoS attack are used as training inputs in NN and SVM approaches. The simulation results clearly show that SVM provides better accuracy compared to NN, 97% accuracy by SVM and 91% accuracy by NN. The simulation also shows that SVM takes much less time to detect and determine the probability of a DoS attack, 0.25 seconds by SVM and 0.75 seconds by NN. All these results clearly show that SVM performs better than NN when used for detecting the probability of DoS attack in WSNs.
引用
收藏
页码:1264 / 1269
页数:6
相关论文
共 14 条
[1]  
Dargie W., 2010, FUNDAMENTALS WIRELES, DOI DOI 10.1002/9780470666388
[2]  
Fausett L., FUNDAMENTALS NEURAL
[3]  
Hemalatha T., 2009, International Journal of Recent Trends in Engineering, V1, P23
[4]  
Hu F., 2003, AD HOC NETW, P69
[5]  
Kalita H. K., 2009, INT J NEXT GENERATIO, V1, P01
[6]  
Kulkarni Raghavendra V., 2009, Proceedings 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), P1680, DOI 10.1109/IJCNN.2009.5179075
[7]   Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks [J].
Rajasegarar, Sutharshan ;
Leckie, Christopher ;
Bezdek, James C. ;
Palaniswami, Marimuthu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (03) :518-533
[8]   Denial-of-service in wireless sencsor networks: Attacks and defenses [J].
Raymond, David R. ;
Midkiff, Scott F. .
IEEE PERVASIVE COMPUTING, 2008, 7 (01) :74-81
[9]   Secure media access control (MAC) in Wireless Sensor Networks: Intrusion detections and countermeasures [J].
Ren, QC ;
Liang, QL .
2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, :3025-3029
[10]  
Ren QC, 2005, 2005 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE FOR HOMELAND SECURITY AND PERSONAL SAFETY, P37