Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. TK-OID: TRUST KNOWLEDGE BASED OUTLIER AND INTRUSION DETECTION FOR IOT ENABLED WSN
    D. Princy1, Dr.D.Kalaivani2
    Journal of Data Acquisition and Processing, 2023, 38 (1): 2110-2122 . 

    Abstract

    To build efficient Internet of Things (IoT) communications between various applications, the Wireless Sensor Network (WSN) is incorporated with smart technologies. The IoT-enabled WSN is susceptible to a range of attacks because of its environment and intrinsic untrustworthy transmission. Intrusion detection systems (IDSs) are commonly used in WSN to protect against attacks to safeguard their protection. Outliers impair sensor information excellence and consistency due to the impact of environments and the restriction of sensors computing and transmission capacities. An efficient outlier and intrusion detection method are therefore necessary to provide efficient communication. Previous approaches are not practical in terms of the undue burden of computing and energy consumption on sensors. This paper proposes an efficient trust knowledge-based outlier and intrusion detection (TK-OID) for IoT enabled WSN. In this work, two trust knowledge base is used to detect outliers and intrusion. The first trust knowledge base is located at the small gateway node, collecting the sensed information from the sensor and detecting the local outliers. The next is situated at the base station, used to collect and analyze the small gateway's data and detect the intruder sensors. The experimental results indicate that this work performance improved detection accuracy compared to other existing methods.

    Keyword

    Trust, Outlier Detection, Intrusion Detection, Trust, Knowledge Base.


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved