Simulation of Malicious Nodes Detection Based on Machine Learing for WSN

A Machine Learing based malicious nodes detection scheme was designed and simulated in this paper, which has modelded the characteristic behavior of Selective Forwarding, Hello Flooding and abstracted four properties of these two types of malicious nodes closely related. The nodes can be classified by using Machine Learning algorithms. The experimental results show that this method can correctly classify a certain number of sensor nodes with a lower error rate.

[1]  Suho Park Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .

[2]  Chen Zhi-gang,et al.  Simulation Study of Anomaly Detection Based on Distributed Machine Learning for WSN , 2011 .

[3]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[4]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[5]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[6]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[7]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[8]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[9]  Saswati Sarkar,et al.  On optimal placement of intrusion detection modules in sensor networks , 2004, First International Conference on Broadband Networks.

[10]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[11]  Debao Xiao,et al.  Intrusion detection based security architecture for wireless sensor networks , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..