A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks

Wirelesssensornetworkshavegainedattentionoverthelastfewyearsandhavesignificantapplications forexampleremotesupervisingandtargetwatching.Theycancommunicatewitheachotherthough wireless interface and configure a network. Wireless sensor networks are often deployed in an unfriendlylocationandmostoftimeitworkswithouthumanmanagement; individualnodemay possiblybecompromisedbytheadversaryduetosomeconstraints.Inthismanner,thesecurityofa wirelesssensornetworkiscritical.Thisworkwillfocusonevaluationofminingtechniquesthatcan beusedtofindmaliciousnodes.Thedetectionmechanismsprovidetheaccuracyoftheclassification usingdifferentalgorithmtodetectthemaliciousnode.PragmaticallythedetectionaccuracyofJ48 is99.17%,RandomForestis80.83%,NFTreeis81.67%andBFTreeis72.33%.J48haveveryhigh detectionaccuracyascomparedwithBFTree,NFTreeRandomForest. KEyWoRDS Data Mining, Detection, Malicious Node, Protocols, Sensor Network Deployment, Sensor Network services, Simulation, Wireless Sensor Network

[1]  G. P. Obi Reddy,et al.  Evaluation of Best First Decision Tree on Categorical Soil Survey Data for Land Capability Classification , 2013 .

[2]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[3]  P. Truchly,et al.  Intuitive graphical interface for network simulator 2 supporting trainings in computer networks , 2014, 2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA).

[4]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[5]  Chi-Tsun Cheng,et al.  A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks , 2011, IEEE Sensors Journal.

[6]  D. Puccinelli,et al.  Wireless sensor networks: applications and challenges of ubiquitous sensing , 2005, IEEE Circuits and Systems Magazine.

[7]  Ahmed Toumanari,et al.  Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection , 2015 .

[8]  Murat Dener,et al.  Smart Technologies with Wireless Sensor Networks , 2015 .

[9]  Mandeep Singh,et al.  Detection of black hole in Wireless Sensor Network based on Data Mining , 2014, 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence).

[10]  Lawrence Jenkins Title: Challenges in deployment of wireless sensor networks , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[11]  Amy L. Murphy,et al.  What does model-driven data acquisition really achieve in wireless sensor networks? , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[12]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[13]  W. N. H. W. Mohamed,et al.  A comparative study of Reduced Error Pruning method in decision tree algorithms , 2012, 2012 IEEE International Conference on Control System, Computing and Engineering.

[14]  Sang-Hyun Park,et al.  A study on sensor nodes attestation protocol in a Wireless Sensor Network , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[15]  Xue Wang,et al.  Distributed Visual-Target-Surveillance System in Wireless Sensor Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[16]  Luigi Coppolino,et al.  Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[17]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[18]  Ossama Younis,et al.  Node clustering in wireless sensor networks: recent developments and deployment challenges , 2006, IEEE Network.

[19]  M. Singh,et al.  Detection of Malicious Node in Wireless Sensor Network Based on Data Mining , 2012, 2012 International Conference on Computing Sciences.

[20]  A. Praveena,et al.  Achieving energy efficient and secure communication in wireless sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[21]  Ren Yueqing,et al.  A study on topological characteristics of wireless sensor network based on complex network , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[22]  Hesham El-Rewini,et al.  Adaptive Constraint-Based Multi-Objective Routing for Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.

[23]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.