Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      09 May 2023, Volume 38 Issue 3
    Article

    RELATIVE SPECTRAL FEATURE ANALYSIS-BASED CLONE ATTACK DETECTION AND ENHANCE ROUTING IN WIRELESS SENSOR NETWORKS USING ARTIFICIAL NEURAL NETWORKS
    S.Bhuvana, Dr.S.Kevin Andrews, Dr.M.S.Josephine, Dr.V.Jeyabalaraja
    Journal of Data Acquisition and Processing, 2023, 38 (3): 1770-1791 . 

    Abstract

    Wireless sensor network is recent trend development in remote technologies for ubiquitous computing in various applications, like monitoring, sensing, geo location-based applications. By the sense the transmission nodes are most probably affected by close attacks leads devastating communication defects. From the communication, ensuring security is the important aspect for communication nodes to protecting the data transmission without any malicious attacks to resolve this problem, we propose an advanced transfer learning model to identifying the clone attacks based on Neural Fuzzy intensive-Sub spectral scaling feature selection (NFI-SSFS) to secure using Cooperative Secure Optimal Link Stability Routing Allocation (CS-OLSR). The communication logs is collected to consume the variance feature level of packet difference rate under memory and transmission defect fact with sport of False injection impact rate (FIIR) and Time stamp communication behaviour rate (TSCBR). Then the intensive feature factor is obtained using NFI-SSFS to marginalize the clone attack rate. Then CS-OLSR is applied to ensure the secure routing based on the identified clone attack region. The proposed system effectively identifies the data replacement node effetely to find the clone attacks. This system makes effective clone attack route finding approach to ensure the security to transfer another route to make data safely.

    Keyword

    Attack detection, Wireless mobile network, Machine learning, ANN, node behaviour analysis, feature selection and classification


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved