2020
DOI: 10.1007/s11277-020-07288-0
|View full text |Cite
|
Sign up to set email alerts
|

ELPC-Trust Framework for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…In terms of time taken to build model from table 5 the time taken to build random tree was the lowest when compared to all the algorithms. In our evaluation of Mirai botnet performance across 9 IoT devices, we compared the effectiveness of utilizing 35 and 5 features, as presented in figures (8-13) and figures (14)(15)(16)(17)(18)(19). Random tree, random forest, and random committee consistently demonstrated strong performance across all 9 devices, with random committee achieving the highest accuracy of 99.99% and Hoeffding tree registering the lowest accuracy of 74.56%.…”
Section: Perforomance Metrics For 9 Iot Devices For Both Bashlite And...mentioning
confidence: 99%
See 1 more Smart Citation
“…In terms of time taken to build model from table 5 the time taken to build random tree was the lowest when compared to all the algorithms. In our evaluation of Mirai botnet performance across 9 IoT devices, we compared the effectiveness of utilizing 35 and 5 features, as presented in figures (8-13) and figures (14)(15)(16)(17)(18)(19). Random tree, random forest, and random committee consistently demonstrated strong performance across all 9 devices, with random committee achieving the highest accuracy of 99.99% and Hoeffding tree registering the lowest accuracy of 74.56%.…”
Section: Perforomance Metrics For 9 Iot Devices For Both Bashlite And...mentioning
confidence: 99%
“…Versatility: Ensemble methods can be applied to a wide range of machine learning tasks, including classification, regression, and clustering. Our previous works [13][14][15] exemplifies the usage of significant network parameters such as energy, packet count etc as the most distinguishing factors to detect attacks in wireless network [16,17]. Thus in this proposed work, we utilize ensemble classifiers to enhance efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…[32] proposed a trustable and secure routing scheme using a twostage security mechanism based on active trust and a Cuckoo search algorithm to protect routes from black hole attacks and selective forwarding attacks. [33] proposed Energy-Lifetime-Packet Count Trust framework for attack categorization based on Energy, Packet Count, and Z scores and for calculation of the nodes' trust values. Trust scores are computed based on the intensity of the attack in terms of their network performance degradation.…”
Section: B Reputation-based Schemesmentioning
confidence: 99%
“…But, in fact, the abnormal information may come from the harsh environment even without channel contending collision. The reputationbased detection schemes [23][24][25][26][27][28][29][30][31][32][33] differentiate the malicious nodes from normal nodes according to the nodes' reputation based on the nodes' forwarding behaviors. In these schemes, the threshold values depend on the estimation of their channel quality.…”
Section: Introductionmentioning
confidence: 99%
“…An approach of intrusion detection-based available network routing for a mobile ad-hoc network, which can decrease both the packet loss rate and the end-to-end delay, was introduced in Sivakumar et al [17]. An intrusion detection cum trust-based framework for attack detection and network reliability maintenance was proposed [18]. The WSNs have been widely applied in many fields, including environmental monitoring and water quality monitoring.…”
Section: Related Workmentioning
confidence: 99%