Back to Search
Start Over
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks
- Source :
- International Journal of Cyber Warfare and Terrorism. 7:42-53
- Publication Year :
- 2017
- Publisher :
- IGI Global, 2017.
-
Abstract
- Wireless sensor networks have gained attention over the last few years and have significant applications for example remote supervising and target watching. They can communicate with each other though wireless interface and configure a network. Wireless sensor networks are often deployed in an unfriendly location and most of time it works without human management; individual node may possibly be compromised by the adversary due to some constraints. In this manner, the security of a wireless sensor network is critical. This work will focus on evaluation of mining techniques that can be used to find malicious nodes. The detection mechanisms provide the accuracy of the classification using different algorithm to detect the malicious node. Pragmatically the detection accuracy of J48 is 99.17%, Random Forest is 80.83%, NF Tree is 81.67% and BF Tree is 72.33%. J48 have very high detection accuracy as compared with BF Tree, NF Tree Random Forest.
- Subjects :
- Information Systems and Management
Computer Networks and Communications
Computer science
business.industry
Node (networking)
Comparative evaluation
Key distribution in wireless sensor networks
Hardware and Architecture
Sensor network deployment
Safety, Risk, Reliability and Quality
business
Safety Research
Wireless sensor network
Software
Computer network
Subjects
Details
- ISSN :
- 19473443 and 19473435
- Volume :
- 7
- Database :
- OpenAIRE
- Journal :
- International Journal of Cyber Warfare and Terrorism
- Accession number :
- edsair.doi...........4f4213406c10d362bebf44b45cebebcc