분류
2020년 8월
작성일
2020.05.05
수정일
2020.06.30
작성자
제바이샤끄
조회수
74

A Security Framework using Data Mining Techniques for Selfishness and Anomaly Detection in Cluster-based Wireless Sensor Network

 

Wireless sensors networks(WSNs) consists of large number of tiny sensors having the capabilities of sensing, processing and communication, being a vital part of many incredible applications that mostly including monitoring and tracking activities,, have been attracted attention of many researchers.  In order to carry out these applications successfully, the Wireless sensors networks (WSNs) can be seen in many different forms ranges from small to large scale distributed wireless sensor networks in hostile environments. Therefore, researchers especially focused for efficient  and careful design of these networks in order to get better results for WSNs oriented applications. 

 

One of such attempt from research community can be seen in the form of hierarchical structuring or clustering algorithms for this large scale distributed wireless sensor networks for efficient utilization of limited resources at nodes and overcoming the various challenges that results from it. Thus, cluster based wireless sensor network (CBWSNs) have the capability to elevate the related problems of resource limitation of nodes while performing their basic activities i.e. routing, aggregating and forwarding their sensed data to the destination. On the other hand, the security is become a great concern, when the nodes inside the cluster compromised and start misbehaving in order to save their limited resources for their own use. Such attacks are known as internal attacks or passive attacks. At present, the existing security measures for WSNs cannot ensure that these problems will not be launched. Therefore, it is important to protect the CBWSNs from internal attacks, which is the main goal of this thesis.

However, the security becomes a big problem for CBWSNs, especially when nodes in the cluster selfishly behave, e.g., not forwarding other nodes data, to save their limited resources. This may make the cluster obsolete, even destroying the network. Thus, a way to guarantee the secure and consistent clusters is needed for proper working of CBWSNs. We showed that the selfishness attack, i. e. passive attack or insider attack, in CBWSNs can cause severe performance disaster, when particularly a cluster head node becomes selfish. In order to prevent this situation, we proposed a security framework that involves a novel clustering technique as well as a reputation system at nodes for controlling selfishness, making them cooperative and honest. The novelty of the clustering comes from the existence of inspector node (IN) to monitor the cluster head (CH) and its special working style. Later on, modified version of this security framework changed the clustering criteria and as well as using the reputation system based on data mining for more efficient controlling of the selfishness problem. The experimental results showed that the proposed security framework can control the selfishness and thus improve the security of the clusters.

 

학위연월
2020년 8월
지도교수
유 영 환
키워드
selfishness attack, clustering, reputation system, data mining techniquese
소개 웹페이지
https://sites.google.com/view/ zebathesis
첨부파일
첨부파일이(가) 없습니다.
다음글
운전자 행동 분석을 위한 차량 정보 자동 해석 및 운전 의도 추정 기법
김범준 2020-10-13 13:42:36.86
이전글
전술 표적객체들의 실시간 처리를 위한 시공간 색인의 동적 승강 기법
김점수 2020-04-01 22:41:22.03
RSS 2.0 116
게시물 검색
박사학위논문
번호 제목 작성자 작성일 첨부파일 조회수
116 Task-Specific Differential Private Data Publish Me 신진명 2024.04.09 0 16
115 Advanced Defense Framework against Physical Advers 김용수 2024.04.08 0 26
114 한글 채팅 텍스트 기반의 저자 검증 모형과 그 응용 이다영 2024.04.05 0 25
113 상태 기반 테스트 시나리오 보강 방법 이선열 2023.10.17 0 128
112 Manufacturing Testing Automation FrameworkBased on 강효은 2023.10.17 0 144
111 Synthesizing Robust Physical Camouflage for Univer 수랸토 나우팔 2023.10.16 0 147
110 복잡도 다양성을 고려한 C 프로그램의 시험 용이성 예측 모형 구축 방법 최현재 2023.10.16 0 116
109 Design and Optimization of Quantum Arithmetic Circ 라라사티 하라스타 타티마 2023.10.13 0 147
108 Improving 6TiSCH Network Formation and Transmissio 파와즈 자키 자키얄 2023.10.10 0 138
107 저지연 고신뢰 운전자 프로파일링을 위한 딥러닝 모델 및 조기 종료 기법 임재봉 2023.10.08 0 182
106 802.11ax 대규모 Wi-Fi 환경의 심층 생성 모델을 활용한 트래픽 모델링 및 AP 이재민 2023.04.07 0 111
105 뉴런 클러스터를 활용한 합성곱 신경망 이미지 분류 신뢰성 향상 방법 이영우 2023.04.06 0 103
104 Trust Guard Extension Framework for Enhanced Secur 김해용 2023.04.06 0 83
103 노이즈 오염 하에서의 효율적 최적화를 위한 확률적 평가 샘플 누적 전략 김정민 2023.04.06 1 112
102 LPWAN의 규모 확장성과 서비스 커버리지 향상을 위한 충돌 제어 및 신호 합성 기법 허준환 2022.10.13 0 109
101 DQN 기반 자동화 컨테이너 터미널 장치장 크레인 작업 할당 전략 최적화 김세영 2022.10.13 0 120
100 Robust Defense Techniques against Adversarial Exam 최석환 2022.04.05 0 117
99 High-Performance Hardware Architectures for Ellipt 아와루딘 에셉 무하마드 2022.04.01 0 87
98 한국어 자연어처리를 위한 뉴로-심볼릭 모델 김민호 2021.10.14 0 122
97 Automatic Assessment and Collaborative Mentoring S 류샤오 2021.10.13 0 123