Machine learning approach for secure communication in wireless video sensor networks against denial-of-service attacks

被引:13
作者
Ramesh, Swaminathan [1 ]
Yaashuwanth, Calpakkam [1 ]
Muthukrishnan, Bala Anand [2 ]
机构
[1] Sri Venkateswara Coll Engn, Dept Informat Technol, Sriperumbudur, India
[2] VRS Coll Engn & Technol, Dept Comp Sci & Engn, Villupuram, India
关键词
denial-of-service; LEACH protocol; machine learning; QoS; support vector classification;
D O I
10.1002/dac.4073
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile ad hoc networks (MANETs) own a flexible framework with the absence of a server, where conventional security components fail to compensate the level of MANET security conditions since it is confined to a particular environment, its data transfer potential, and battery and memory constrains. MANET provides a well-grounded path and an efficiency in communication, but the confidentiality of the trust parameters remains a great challenge since it may be overheard by the impostor. This demands the need of exchanging the encrypted mathematical values. The proposed machine learning security paradigm provides firm and trustworthy network in spite of establishment over additional network platform. The QoS is improved through support vector machine for denial-of-service attack. The node has to be clustered to accomplish its respective task. The clustering is done with the help of LEACH protocol, where cluster head and Cluster member are fixed to transfer the data in the network. Low Energy adaptive clustering heirarchy (LEACH) propagates energy to abstain from draining of battery and malignant network. A secure framework is built along with encryption and decoding to protect from denial-of-service attack. Acknowledgement-based flooding attack has been focused with the help of support vector machine algorithm. The messages are encoded in from the source node and coded again during transmission phase to obtain the original message. Defending the traditional methodologies, the proposed work provides excellent QoS when compared and tested with other protocols. The results obtained ensure its efficiency when support vector machine technique is combined with encryption scheme.
引用
收藏
页数:12
相关论文
共 16 条
  • [1] [Anonymous], 2018, 2018 INT C SOFT COMP
  • [2] RETRACTED: Designing a Framework for Communal Software: Based on the Assessment Using Relation Modelling (Retracted article. See JAN, 2023)
    BalaAnand, M.
    Karthikeyan, N.
    Karthik, S.
    [J]. INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (02) : 329 - 343
  • [3] Bhosle Amol, 2013, INT J EMERGING TECHN, V3
  • [4] Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks
    Kim, HyoJin
    Chitti, Ramachandra Bhargav
    Song, JooSeok
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (01): : 137 - 150
  • [5] Kumar A, 2012, 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), P854, DOI 10.1109/PDGC.2012.6449935
  • [7] Pair-wise key agreement and hop-by-hop authentication protocol for MANET
    Shanthi, K.
    Murugan, D.
    [J]. WIRELESS NETWORKS, 2017, 23 (04) : 1025 - 1033
  • [8] Shen Xuemin Sherman, 2014, LIGHTWEIGHT ENCRYPTI
  • [9] Adaptive PID controller based on Q-learning algorithm
    Shi, Qian
    Lam, Hak-Keung
    Xiao, Bo
    Tsai, Shun-Hung
    [J]. CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2018, 3 (04) : 235 - 244
  • [10] Shushan Zhao, 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), P96, DOI 10.1109/PST.2012.6297925