Detection of Black Hole in Wireless Sensor Network based on Data Mining

被引:0
作者
Kaur, Gursheen [1 ]
Singh, Mandeep [2 ]
机构
[1] Punjab Inst Technol, Dept Comp Sci, Kapurthala, Punjab, India
[2] Lovely Profess Univ, Dept Comp Sci, Phagwara, Punjab, India
来源
2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE) | 2014年
关键词
Wireless Sensor Network; Clustering; Classification; Black Hole; Data Mining;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Network is fabricated by the deployment of many miniature devices (sensors) which are capable of sensing, communicating and computing. These networks are susceptible to security threats due to unattended deployment of sensors. There are many attacks on information in transit, out of all Black hole attack or packet dropper is a denial of service attack in which an intruder persuades other nodes that it has the best route to the destination, instead it drops or absorbs all the packets preventing them to reach the destination. In this paper an effective Mutable Black hole Unearthing Mechanism is proposed by observing the behavioural changes of the nodes using Data Mining.
引用
收藏
页码:457 / 461
页数:5
相关论文
共 7 条
[1]  
Bhargava N., 2013, INT J ADV RES COMPUT, V3, P1114
[2]  
Kouser K., 2013, Int. J. Innov. Res. Comput. Commun. Eng, V1, P2443
[3]  
Quinlan JR, 2007, Induction of Decision Trees
[4]  
Singh M., 2012, 2012 International Conference on Computing Sciences (ICCS), P291, DOI 10.1109/ICCS.2012.24
[5]  
Singh R. V., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P717, DOI 10.1109/ICRTIT.2011.5972376
[6]  
Singla A., 2012, INT J-TORONTO, V2, P298
[7]  
Wazid Mohammad, 2013, 2013 International Conference on Communications and Signal Processing (ICCSP), P576, DOI 10.1109/iccsp.2013.6577120