분류
2020년 8월
작성일
2020.05.05
수정일
2020.06.30
작성자
제바이샤끄
조회수
82

A Security Framework using Data Mining Techniques for Selfishness and Anomaly Detection in Cluster-based Wireless Sensor Network

 

Wireless sensors networks(WSNs) consists of large number of tiny sensors having the capabilities of sensing, processing and communication, being a vital part of many incredible applications that mostly including monitoring and tracking activities,, have been attracted attention of many researchers.  In order to carry out these applications successfully, the Wireless sensors networks (WSNs) can be seen in many different forms ranges from small to large scale distributed wireless sensor networks in hostile environments. Therefore, researchers especially focused for efficient  and careful design of these networks in order to get better results for WSNs oriented applications. 

 

One of such attempt from research community can be seen in the form of hierarchical structuring or clustering algorithms for this large scale distributed wireless sensor networks for efficient utilization of limited resources at nodes and overcoming the various challenges that results from it. Thus, cluster based wireless sensor network (CBWSNs) have the capability to elevate the related problems of resource limitation of nodes while performing their basic activities i.e. routing, aggregating and forwarding their sensed data to the destination. On the other hand, the security is become a great concern, when the nodes inside the cluster compromised and start misbehaving in order to save their limited resources for their own use. Such attacks are known as internal attacks or passive attacks. At present, the existing security measures for WSNs cannot ensure that these problems will not be launched. Therefore, it is important to protect the CBWSNs from internal attacks, which is the main goal of this thesis.

However, the security becomes a big problem for CBWSNs, especially when nodes in the cluster selfishly behave, e.g., not forwarding other nodes data, to save their limited resources. This may make the cluster obsolete, even destroying the network. Thus, a way to guarantee the secure and consistent clusters is needed for proper working of CBWSNs. We showed that the selfishness attack, i. e. passive attack or insider attack, in CBWSNs can cause severe performance disaster, when particularly a cluster head node becomes selfish. In order to prevent this situation, we proposed a security framework that involves a novel clustering technique as well as a reputation system at nodes for controlling selfishness, making them cooperative and honest. The novelty of the clustering comes from the existence of inspector node (IN) to monitor the cluster head (CH) and its special working style. Later on, modified version of this security framework changed the clustering criteria and as well as using the reputation system based on data mining for more efficient controlling of the selfishness problem. The experimental results showed that the proposed security framework can control the selfishness and thus improve the security of the clusters.

 

학위연월
2020년 8월
지도교수
유 영 환
키워드
selfishness attack, clustering, reputation system, data mining techniquese
소개 웹페이지
https://sites.google.com/view/ zebathesis
첨부파일
첨부파일이(가) 없습니다.
다음글
운전자 행동 분석을 위한 차량 정보 자동 해석 및 운전 의도 추정 기법
김범준 2020-10-13 13:42:36.86
이전글
전술 표적객체들의 실시간 처리를 위한 시공간 색인의 동적 승강 기법
김점수 2020-04-01 22:41:22.03
RSS 2.0 138
게시물 검색
박사학위논문
번호 제목 작성자 작성일 첨부파일 조회수
138 최적성 이론을 활용한 강건한 한국어 통합 G2P 프레임워크 설계 및 분석 새글 최성기 2025.10.17 0 7
137 고속 컨베이어 환경에서의 생산 공정물 결함 검출을 위한 AI 비전 시스템 새글 김형건 2025.10.17 0 14
136 Toward Reliable and Scalable Multi-Cell LoRaWAN Ne 새글 호앙 꾸옥 홍 낫 2025.10.16 0 11
135 Differentially Private Data-Centric Mechanism for 우타리예바 아쎔 2025.10.10 0 38
134 Adaptive Penalty Optimization and Scalable Quantum 정선근 2025.10.02 0 48
133 Comparative Complexity of Neuropeptide and Recepto 류승희 2025.10.01 0 54
132 확산 모델 기반 필기 이미지 생성에 관한 연구 홍동진 2025.04.10 0 141
131 연합학습 기반 그래프 신경망을 활용한 전기차 충전소 최적 선택 기법 류준우 2025.04.09 0 122
130 Exploring Quantum Approach Applied to Cryptanalysi 와다니 리니 위스누 2025.04.08 0 155
129 Towards computation - communication efficient and 응우옌 민 두옹 2025.04.08 0 109
128 Hybrid Quantum Residual Neural Networks for Classi 노대일 2025.04.08 0 134
127 Distributed Resource Management for Massive IoT Ne 응우옌 쑤언 둥 2025.04.08 0 97
126 A Framework for Leveraging Large Language Models i 데리 프라타마 2025.04.07 0 141
125 Discovery and Authentication of Marker Genes Using 프라타마 리안 다니스 아디 2025.04.07 0 155
124 산업 환경의 IEEE 802.15.4 TSCH 기반 네트워크에서 트래픽 처리량 향상을 위한 이희준 2025.04.07 0 130
123 Uncertainty-Based Hybrid Deep Learning Approach fo 멘가라 악셀 기드온 2024.12.10 0 163
122 Effective Deep Learning Primitives Design for Bina 황선진 2024.10.14 0 164
121 Toward Immersive Multiview Video Streaming through 탄중 디온 2024.10.14 0 128
120 A Low-cost Deep Learning Model for Real-time Low L 등 제강 2024.10.10 0 184
119 Enhancing Nested Entity Recognition Using Nested R 양홍진 2024.10.09 0 147