2022
DOI: 10.3390/s22041407
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

Abstract: Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge computing. An intrusion detection system (IDS), as a proactive network security protection technology, provides an effective defense system for the WSN. In this paper, we propose a WSN intelligent intrusion detection model, through the introduction of the k-Nearest … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(43 citation statements)
references
References 51 publications
(48 reference statements)
0
43
0
Order By: Relevance
“…The mechanism of the KNN algorithm is finding the distance between the classes of normal values and attacks by selecting object values close to the class k-values. The algorithm starts by loading network data with the length of input data [ 60 ]. KNN is utilized to determine the k-values that are near a set of specific values in the training dataset.…”
Section: Methodsmentioning
confidence: 99%
“…The mechanism of the KNN algorithm is finding the distance between the classes of normal values and attacks by selecting object values close to the class k-values. The algorithm starts by loading network data with the length of input data [ 60 ]. KNN is utilized to determine the k-values that are near a set of specific values in the training dataset.…”
Section: Methodsmentioning
confidence: 99%
“…However, the study did not explain the improvements and modifications it made to the SDN protocols to enable their proposal. Additionally, in [123], the authors used KNN with the arithmetic optimization algorithm (AOA) in evolutionary computation to produce an advanced intelligence framework. Moreover, in the same context of using SDN, the authors in [124] used it to improve the detection of phishing attacks.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…In RF, a model's overall prediction may not be affected by various factors from the dataset. RF algorithms outperform decision trees in terms of accuracy [64][65][66][67]. The RF method has been shown to provide greater prediction accuracy because it draws on the outcomes of numerous decision trees to construct forecasts.…”
Section: Random Forest Treementioning
confidence: 99%