Malicious Node Detection in Wireless Sensor Networks Using Support Vector Machine

被引:0
作者
Jaint, Bhavnesh [1 ]
Indu, S. [2 ]
Pandey, Neeta [2 ]
Pahwa, Khushbu [3 ]
机构
[1] Delhi Technol Univ, Dept Elect Engn, Delhi, India
[2] Delhi Technol Univ, Dept Elect & Commun Engn, Delhi, India
[3] Delhi Technol Univ, Dept Elect & Elect Engn, Delhi, India
来源
2019 3RD INTERNATIONAL CONFERENCE ON RECENT DEVELOPMENTS IN CONTROL, AUTOMATION & POWER ENGINEERING (RDCAPE) | 2019年
关键词
Malicious Nodes; Sensor Nodes; SVM; WSN;
D O I
10.1109/rdcape47089.2019.8979125
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Networks are basically a collection of sensor nodes scattered in a large area such that the desired information can be collected. But sensor nodes are also vulnerable to the attacks such as malware, hackers, faulty hardware or from the physical phenomenon etc. Hence, it is mandatory to protect a sensor node from an attack because if it gets attacked then the information sent by the sensor could be wrong and lead to incorrect data analysis and hence can lead to unnecessary outcomes. In this paper, a technique based on machine learning to discover malicious nodes within a randomly deployed sensor network has been proposed. Here, Support Vector Machine for time series prediction has been employed to find the malicious nodes based on the past values acquired by those individual nodes.
引用
收藏
页码:247 / 252
页数:6
相关论文
共 21 条
[1]   An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment [J].
Abusitta, Adel ;
Bellaiche, Martine ;
Dagenais, Michel .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2018, 7
[2]  
[Anonymous], 2008, P IEEE GLOBECOM 2008
[3]  
Arampatzis T, 2005, 2005 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL & 13TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1 AND 2, P719
[4]  
Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836
[5]  
Ayday E., 2007, INFOCOM
[6]  
Curiac D. I., 2007, WSEAS Transactions on Computers Research, V2, P38
[7]  
Curiac D.-I., 2007, THE 3RD INTERNATIONA
[8]   Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks [J].
Curiac, Daniel-Ioan ;
Plastoi, Madalin ;
Banias, Ovidiu ;
Volosencu, Constantin ;
Tudoroiu, Roxana ;
Doboli, Alexa .
2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, :436-+
[9]  
Gunn S. R., 1998, Technical report, DOI DOI 10.1039/B918972F
[10]  
Hu H., 2009, INT J INFORM COMPUTE, V3, P148