Detection of Network Layer Attacks in Wireless Sensor Network

نویسندگان

چکیده

The Wireless Sensor Network (WSN) technology is being used in a huge number of monitoring applications. It consists large sensor nodes with limited battery life. These devices are deployed randomly zone to collect the data. But these threatened and attacked by several malicious behaviors caused some nodes, which result security attacks. Several attacks occur different layers wireless network. Due attacks, confidential information can be stolen attackers or unauthorized users, cause problems for authorized users. Cyber-attacks sending data packets that deplete computer network service resources using multiple computers when attacking called wormhole Sybil important identify prevent further damage. To overcome problems, we use prediction module various machine learning algorithms find best-performing algorithm. XGBoost, Adaboost, Random Forest, KNN algorithms. train algorithms, have WHASA dataset contains 10 VANET environment benign (normal) class. By classification done on " normal access under attack Wormhole as an output.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless sensor network design through genetic algorithm

In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

Cross Layer Intrusion Detection System for Wireless Sensor Network

The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and woul...

متن کامل

Topology Control in Wireless Sensor Network using Fuzzy Logic

Network sensors consist of sensor nodes in which every node covers a limited area. The most common use ofthese networks is in unreachable fields.Sink is a node that collects data from other nodes.One of the main challenges in these networks is the limitation of nodes battery (power supply). Therefore, the use oftopology control is required to decrease power consumption and increase network acce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asian journal of convergence in technology

سال: 2023

ISSN: ['2350-1146']

DOI: https://doi.org/10.33130/ajct.2023v09i01.009