2017
DOI: 10.1155/2017/3548607
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

Abstract: In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 24 publications
0
19
0
Order By: Relevance
“…Here h i is the hop count field in the request reply of node i. for the calculation of per hope packet delay probability the difference between times and the mathematically it is defined as [4] TDP HTOTAL =TDP HRREQ + TDP HRREP…”
Section: Securing Communication In Wireless Sensor Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Here h i is the hop count field in the request reply of node i. for the calculation of per hope packet delay probability the difference between times and the mathematically it is defined as [4] TDP HTOTAL =TDP HRREQ + TDP HRREP…”
Section: Securing Communication In Wireless Sensor Networkmentioning
confidence: 99%
“…In this mechanism, one node is selected from the insecure path in the direction of destination node. After selecting the particular node, the hash function is applied to the data packets at the source for obtaining MAC (Message Authentication Code) at the source node [4]. This MAC and data packet are transferred through an intermediate node which is part of the nodes in the insecure channel.…”
Section: Securing Communication In Manetmentioning
confidence: 99%
“…Profiles. Using the previous works as inspiration and [13], we have designed a system capable of locating those profiles hidden at first sight but prone to modify their behaviour based on the influence received. In order to do so, we have considered a set of tweets as the source of information to measure the impact of an influence user in others.…”
Section: Fuzzy Architecture To Isolate Suspiciousmentioning
confidence: 99%
“…For the purpose of assigning profiles to the users, the proposed methodology utilizes fuzzy clustering techniques that provide probability of classification for each possible profile. Fuzzy clustering has been successfully applied in semisupervised environments [11], in combination with the classic k-means clustering method [12], and more specifically to detect malicious components [13]. In this paper the fuzzy clustering method takes as an input the results obtained from the graph analysis, along with some characteristics directly extracted from the social network.…”
Section: Introductionmentioning
confidence: 99%
“…Rupinder Singh Jatinder Singh [17] proposed Advanced Hybrid Intrusion Detection System (AHIDS) is an algorithm which is very advantageous for WSNs. In this method the sensor nodes generally don't consumes much energy.…”
Section: Advanced Hybrid Intrusion Detection System (Ahids)mentioning
confidence: 99%