{"title":"基于信任的移动无线传感器网络可定制模糊神经推理系统攻击检测","authors":"A. Ramathilagam, K. Vijayalakshmi","doi":"10.1007/s11277-024-11263-4","DOIUrl":null,"url":null,"abstract":"<p>Wireless Sensor Networks (WSN) when simulated for implementations use Mobile Sinks (MS) which are vulnerable to unauthorized attacks. Existing works do not ensure attacker node identifications making prevention of attacks during initial iterations would a difficult task. Neighbour node selections based on their node information alone can increase the possibility of intrusions. The detection of an attacker node in the initial stages reduces information loss and increases authentication. In continuation to this statement a TNF (Trust based Node Filtering) technique which assigns trust values to nodes is introduced in this work. This proposal is an authentication scheme against replication attacks. Neighbour nodes which cannot be trusted are not considered for authentication processes thus ensuring guaranteed data transmissions. Malicious nodes are detected using a FIS (Fuzzy Inference Systems) with the proposed CFNIS (Customizable Fuzzy- Neuro Inference System). Nodes are also classified as being in normal or attacking node. Secure Key generations are performed using RSA and Elgamal algorithm and a honey pot server controls authentications. CFNIS simulation showed higher security against replication attacks.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"82 1","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks\",\"authors\":\"A. Ramathilagam, K. Vijayalakshmi\",\"doi\":\"10.1007/s11277-024-11263-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Wireless Sensor Networks (WSN) when simulated for implementations use Mobile Sinks (MS) which are vulnerable to unauthorized attacks. Existing works do not ensure attacker node identifications making prevention of attacks during initial iterations would a difficult task. Neighbour node selections based on their node information alone can increase the possibility of intrusions. The detection of an attacker node in the initial stages reduces information loss and increases authentication. In continuation to this statement a TNF (Trust based Node Filtering) technique which assigns trust values to nodes is introduced in this work. This proposal is an authentication scheme against replication attacks. Neighbour nodes which cannot be trusted are not considered for authentication processes thus ensuring guaranteed data transmissions. Malicious nodes are detected using a FIS (Fuzzy Inference Systems) with the proposed CFNIS (Customizable Fuzzy- Neuro Inference System). Nodes are also classified as being in normal or attacking node. Secure Key generations are performed using RSA and Elgamal algorithm and a honey pot server controls authentications. CFNIS simulation showed higher security against replication attacks.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":\"82 1\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2024-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11263-4\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11263-4","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks
Wireless Sensor Networks (WSN) when simulated for implementations use Mobile Sinks (MS) which are vulnerable to unauthorized attacks. Existing works do not ensure attacker node identifications making prevention of attacks during initial iterations would a difficult task. Neighbour node selections based on their node information alone can increase the possibility of intrusions. The detection of an attacker node in the initial stages reduces information loss and increases authentication. In continuation to this statement a TNF (Trust based Node Filtering) technique which assigns trust values to nodes is introduced in this work. This proposal is an authentication scheme against replication attacks. Neighbour nodes which cannot be trusted are not considered for authentication processes thus ensuring guaranteed data transmissions. Malicious nodes are detected using a FIS (Fuzzy Inference Systems) with the proposed CFNIS (Customizable Fuzzy- Neuro Inference System). Nodes are also classified as being in normal or attacking node. Secure Key generations are performed using RSA and Elgamal algorithm and a honey pot server controls authentications. CFNIS simulation showed higher security against replication attacks.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.