scispace - formally typeset
Open AccessJournal ArticleDOI

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network

Reads0
Chats0
TLDR
This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and it has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV).
Abstract
The Internet of Things has broad application in military field, commerce, environmental monitoring, and many other fields. However, the open nature of the information media and the poor deployment environment have brought great risks to the security of wireless sensor networks, seriously restricting the application of wireless sensor network. Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. In this paper, we proposed a new intrusion detection system based on -nearest neighbor (-nearest neighbor, referred to as KNN below) classification algorithm in wireless sensor network. This system can separate abnormal nodes from normal nodes by observing their abnormal behaviors, and we analyse parameter selection and error rate of the intrusion detection system. The paper elaborates on the design and implementation of the detection system. This system has achieved efficient, rapid intrusion detection by improving the wireless ad hoc on-demand distance vector routing protocol (Ad hoc On-Demand Distance the Vector Routing, AODV). Finally, the test results show that: the system has high detection accuracy and speed, in accordance with the requirement of wireless sensor network intrusion detection.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks

TL;DR: The experimental results show that RNN-IDS is very suitable for modeling a classification model with high accuracy and that its performance is superior to that of traditional machine learning classification methods in both binary and multiclass classification.
Journal ArticleDOI

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Journal ArticleDOI

Machine learning algorithms for wireless sensor networks: A survey

TL;DR: This survey presents various ML-based algorithms for WSNs with their advantages, drawbacks, and parameters effecting the network lifetime, covering the period from 2014–March 2018.
Journal ArticleDOI

A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks

TL;DR: This paper proposes a novel network intrusion detection model utilizing convolutional neural networks (CNNs), which uses CNN to select traffic features from raw data set automatically, and sets the cost function weight coefficient of each class based on its numbers to solve the imbalanced data set problem.
Journal ArticleDOI

TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection

TL;DR: A novel two-stage deep learning model based on a stacked auto-encoder with a soft-max classifier for efficient network intrusion detection that has the potential to serve as a future benchmark for deep learning and network security research communities.
References
More filters
Proceedings ArticleDOI

Ad-hoc on-demand distance vector routing

TL;DR: An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure and the proposed routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad- hoc networks.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.

The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4

TL;DR: The Dynamic Source Routing protocol is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes, designed to work well even with very high rates of mobility.
Related Papers (5)