2020
DOI: 10.1007/s00500-020-04678-1
|View full text |Cite
|
Sign up to set email alerts
|

Wireless sensor network intrusion detection system based on MK-ELM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(26 citation statements)
references
References 16 publications
0
26
0
Order By: Relevance
“…The idea of SVM is to find the optimal level of separation between two categories by maximizing the margin between the closest points to the categories. However, the SVM has many drawbacks such as high computations for train data, sensitive to noisy data, and unbalanced data sets [18]. Therefore, due to the size of D1 and D2, the SVM was not working and we did not get any results.…”
Section: Resultsmentioning
confidence: 92%
See 1 more Smart Citation
“…The idea of SVM is to find the optimal level of separation between two categories by maximizing the margin between the closest points to the categories. However, the SVM has many drawbacks such as high computations for train data, sensitive to noisy data, and unbalanced data sets [18]. Therefore, due to the size of D1 and D2, the SVM was not working and we did not get any results.…”
Section: Resultsmentioning
confidence: 92%
“…The authors in [1,2,[13][14][15][16][17] used different techniques related to deep learning mechanism, and their results regarding to detection accuracy, mean squared error, and sensitivity showed good performance, but none of them discussed the effect of their proposal on WSN networks such as nodes power consumption and network lifetime. Moreover, other publications were using regular networks traffic datasets instead of WSN nodes datasets [18]. Other algorithms for detecting DDoS have been proposed in [19], the work used authentication policy to remove DoS attacks by splitting the WSN nodes into clusters and linking all cluster WSN nodes in a single authentication message.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, many methods have been proposed to detect intrusions or anomalies in wireless sensor networks [16]- [18]. The data clustering method is usually used to detect irregular nodes, and game theory is often used to design the most profitable scheme for common nodes based on the behavior features of suspicious nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The second type is the cluster-based network and the third type is the hierarchical network. The routing of packets is the most challenging task in wireless sensor networks (WSN) [2]. The data packets are transmitted from the individual sensor node to the cluster head node and are then transmitted to the base station.…”
Section: Introductionmentioning
confidence: 99%