분류
2019년 8월
작성일
2019.04.08
수정일
2019.04.11
작성자
제바이샤끄
조회수
61

A Security Framework for Selfishness and Selfishness Oriented Anomalies Detection in Cluster-based Wireless Sensor Network (CBWSNs)

Wireless sensors networks(WSNs) consists of large number of tiny sensors with the capabilities of sensing, processing and communication, a vital part of today many incredible applications that mostly including monitoring and tracking activities.  In order to carry out these applications successfully, the Wireless sensors networks (WSNs) can be seen in many different forms ranges from small to large scale distributed wireless sensor networks in hostile environments.  Recently, the wireless sensor networks (WSNs) have become a focus of intensive research especially for efficient utilization of limited resources of nodes and careful design of these networks in order to get better results for WSNs oriented applications.

 

One of such attempt from research community can be seen in the form of hierarchical structuring or clustering algorithms for this large scale distributed wireless sensor networks for efficient utilization of limited resources at nodes and overcoming the various challenges that results from it. Thus, the cluster based wireless sensor network (CBWSNs) have the capability to elevate the related problems of resource limitation of nodes while performing their basic activities i.e. routing, aggregating and forwarding. On the other hand, the security is become a great concern, when the nodes inside the cluster compromised and start misbehaving selfish  in order to save their limited resources for their own use. Such attacks are known as internal attacks or passive attacks. At present, the existing security measures for WSNs cannot ensure that these problems will not be launched. Therefore, it is important to protect the CBWSNs from internal attacks, which is the main goal of this thesis.

 

This thesis scrutinizes the security problems of CBWSNs and proposes relevant solutions.

The main contributions of this thesis to mitigate the selfishness oriented anomalies of nodes in the cluster are summarized below.

Initially, this thesis developed a security framework based on novel clustering algorithm and utilizing primary reputation system evaluation for finding selfishness problems at clusters. The novelty of clustering process results in the clusters with three basic nodes i.e. Head (CH) node, Inspector Node (IN) and Member Nodes (MNs).  The selection criteria of these nodes are to utilizing the reputation system evaluations at each node before and after cluster formation. After cluster formation inspector node overhears cluster head node transmission and updates its reputation status and special way of working of all three types of nodes can further strengthen the application of the proposed security framework. In this way, these reputation systems at nodes will keep track of the neighbor nodes behavior and force them to be cooperative.

Secondly, the improved security framework based clustering algorithm utilizing residual energy and reputation data of nodes for finding selfishness free cluster head node for consistent clusters. The novelty of security framework is now due to use of reputation system based on data mining i.e. Bayesian rule at each node and Support Vector Machine scheme at base station for analyzing reputation data for detecting selfishness at nodes. Further, considering remaining energy can improve the consistency of clusters and make them free of attacks. Thus, after clustering the whole network will be divided into groups and having three basic nodes i.e. Custer Head (CH) node, Member Nodes (MNs) and Sink Node (IN). 

This work utilized the fourth generation programming language MATLAB for simulations. The simulation results show that the security framework for the detection of the internal attacks is effective and valuable.

 

 


학위연월
August 2019
지도교수
유영환
키워드
WSNs, CBWSns, Reputation system, Selfishness attack, clustering Algorithm
소개 웹페이지
https://sites.google.com/view/zebathesis
첨부파일
첨부파일이(가) 없습니다.
다음글
스마트시티 IoT 데이터 처리를 위한 포그 컴퓨팅 기반 분산 MQTT 브로커 구조에 관한 연구
안창우 2019-04-09 20:58:48.463
이전글
Novel Approaches for Facial Emotion Recognition Applied to Small-scale and Large-scale Databases
부베나 하제르 2018-10-16 11:13:48.293
RSS 2.0 132
게시물 검색
박사학위논문
번호 제목 작성자 작성일 첨부파일 조회수
132 확산 모델 기반 필기 이미지 생성에 관한 연구 홍동진 2025.04.10 0 84
131 연합학습 기반 그래프 신경망을 활용한 전기차 충전소 최적 선택 기법 류준우 2025.04.09 0 77
130 Exploring Quantum Approach Applied to Cryptanalysi 와다니 리니 위스누 2025.04.08 0 75
129 Towards computation - communication efficient and 응우옌 민 두옹 2025.04.08 0 74
128 Hybrid Quantum Residual Neural Networks for Classi 노대일 2025.04.08 0 80
127 Distributed Resource Management for Massive IoT Ne 응우옌 쑤언 둥 2025.04.08 0 65
126 A Framework for Leveraging Large Language Models i 데리 프라타마 2025.04.07 0 103
125 Discovery and Authentication of Marker Genes Using 프라타마 리안 다니스 아디 2025.04.07 0 90
124 산업 환경의 IEEE 802.15.4 TSCH 기반 네트워크에서 트래픽 처리량 향상을 위한 이희준 2025.04.07 0 100
123 Uncertainty-Based Hybrid Deep Learning Approach fo 멘가라 악셀 기드온 2024.12.10 0 121
122 Effective Deep Learning Primitives Design for Bina 황선진 2024.10.14 0 130
121 Toward Immersive Multiview Video Streaming through 탄중 디온 2024.10.14 0 99
120 A Low-cost Deep Learning Model for Real-time Low L 등 제강 2024.10.10 0 154
119 Enhancing Nested Entity Recognition Using Nested R 양홍진 2024.10.09 0 114
118 다양한 도메인과 데이터 형식에 강건한 사전학습 언어모델 기반의 표 질의응답 방법 조상현 2024.10.09 0 128
117 Trust Guard Extension for Enhanced Security Featur 김해용 2024.05.04 0 165
116 Task-Specific Differential Private Data Publish Me 신진명 2024.04.09 0 168
115 Advanced Defense Framework against Physical Advers 김용수 2024.04.08 0 191
114 한글 메신저 채팅의 크로스 텍스팅 탐지를 위한 저자 검증 모형 이다영 2024.04.05 0 167
113 상태 기반 테스트 시나리오 보강 방법 이선열 2023.10.17 0 246