无线传感器网络入侵预防与检测的FZMAI和MBSCIH模型

Neha Singh, Deepali Virmani
{"title":"无线传感器网络入侵预防与检测的FZMAI和MBSCIH模型","authors":"Neha Singh, Deepali Virmani","doi":"10.1109/ICTAI53825.2021.9673232","DOIUrl":null,"url":null,"abstract":"Remote Sensor Network (WSN) have gotten continuously one of the sultriest investigation regions in the field of software engineering. This is a result of their wide extent of employments, including location applications, transportation. To keep the security and dependability of WSN, a framework forestalling and distinguishing interruptions is the need of 60 minutes. Research zeroing in on these sorts of frameworks ought to follow the characteristics of WSNs and should fit for perceiving greatest security dangers. This paper proposes an original framework for forestalling and identifying interruptions in remote sensor organizations. The proposed model is a blend of two interruption forestalling and identifying strategy. For avoidance of assaults, the paper utilizes Fuzzified philosophy to deflect Intrusions in Wireless Sensor Network (FzMAI). For recognition of assaults, MBSCIH (Multi to twofold class size-based lopsidedness dealing with procedure) method is utilized. The defined framework acts in two stages: In avoidance stage, we keep an interruption from entering a remote sensor organization. As counteraction isn't penny percent, hardly any malevolent hubs enter the framework, prompting identification stage. In identification stage, the entered malignant hubs are distinguished utilizing MBSCIH. The confirmation of defined system is done on WSN-DS. Our framework yields a precision of 99.97%.","PeriodicalId":278263,"journal":{"name":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FZMAI and MBSCIH Model for Preventing and Detecting Intrusions in Wireless Sensor Network\",\"authors\":\"Neha Singh, Deepali Virmani\",\"doi\":\"10.1109/ICTAI53825.2021.9673232\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Remote Sensor Network (WSN) have gotten continuously one of the sultriest investigation regions in the field of software engineering. This is a result of their wide extent of employments, including location applications, transportation. To keep the security and dependability of WSN, a framework forestalling and distinguishing interruptions is the need of 60 minutes. Research zeroing in on these sorts of frameworks ought to follow the characteristics of WSNs and should fit for perceiving greatest security dangers. This paper proposes an original framework for forestalling and identifying interruptions in remote sensor organizations. The proposed model is a blend of two interruption forestalling and identifying strategy. For avoidance of assaults, the paper utilizes Fuzzified philosophy to deflect Intrusions in Wireless Sensor Network (FzMAI). For recognition of assaults, MBSCIH (Multi to twofold class size-based lopsidedness dealing with procedure) method is utilized. The defined framework acts in two stages: In avoidance stage, we keep an interruption from entering a remote sensor organization. As counteraction isn't penny percent, hardly any malevolent hubs enter the framework, prompting identification stage. In identification stage, the entered malignant hubs are distinguished utilizing MBSCIH. The confirmation of defined system is done on WSN-DS. Our framework yields a precision of 99.97%.\",\"PeriodicalId\":278263,\"journal\":{\"name\":\"2021 International Conference on Technological Advancements and Innovations (ICTAI)\",\"volume\":\"112 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Technological Advancements and Innovations (ICTAI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAI53825.2021.9673232\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Technological Advancements and Innovations (ICTAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAI53825.2021.9673232","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

遥感网络(WSN)一直是软件工程领域研究的热点之一。这是他们广泛就业的结果,包括位置应用,运输。为了保证无线传感器网络的安全性和可靠性,需要在60分钟内建立一个能够防止和识别中断的框架。针对这类框架的研究应遵循无线传感器网络的特点,并应适合感知最大的安全危险。本文提出了一个原始框架,用于预防和识别远程传感器组织中的中断。所提出的模型是两种中断预防和识别策略的混合。为了避免攻击,本文利用模糊化思想对无线传感器网络(FzMAI)中的入侵进行偏转。在攻击识别方面,采用了基于多到双类规模的不对称性处理程序(MBSCIH)方法。所定义的框架分为两个阶段:在回避阶段,我们阻止中断进入遥感器组织。由于反作用力不是百分之一,几乎没有恶意枢纽进入框架,促使识别阶段。在识别阶段,利用MBSCIH对进入的恶性枢纽进行区分。在WSN-DS上对已定义的系统进行确认。我们的框架产生99.97%的精度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
FZMAI and MBSCIH Model for Preventing and Detecting Intrusions in Wireless Sensor Network
Remote Sensor Network (WSN) have gotten continuously one of the sultriest investigation regions in the field of software engineering. This is a result of their wide extent of employments, including location applications, transportation. To keep the security and dependability of WSN, a framework forestalling and distinguishing interruptions is the need of 60 minutes. Research zeroing in on these sorts of frameworks ought to follow the characteristics of WSNs and should fit for perceiving greatest security dangers. This paper proposes an original framework for forestalling and identifying interruptions in remote sensor organizations. The proposed model is a blend of two interruption forestalling and identifying strategy. For avoidance of assaults, the paper utilizes Fuzzified philosophy to deflect Intrusions in Wireless Sensor Network (FzMAI). For recognition of assaults, MBSCIH (Multi to twofold class size-based lopsidedness dealing with procedure) method is utilized. The defined framework acts in two stages: In avoidance stage, we keep an interruption from entering a remote sensor organization. As counteraction isn't penny percent, hardly any malevolent hubs enter the framework, prompting identification stage. In identification stage, the entered malignant hubs are distinguished utilizing MBSCIH. The confirmation of defined system is done on WSN-DS. Our framework yields a precision of 99.97%.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信