Open Access
Subscription Access
Open Access
Subscription Access
Elimination of Data Modification in Sensor Nodes of WSN Using Deep Learning Model
Subscribe/Renew Journal
This study focuses on removing the possibility of malicious data manipulation in wireless sensor networks (WSN) by utilising a deep learning method. When training deep neural networks, datasets that have been the subject of an attack that alters the data are used as the building blocks. This is done in preparation for putting the networks to the test in the real world. We find out through simulation with a 70:30 cross-validation across a 10-fold sample size that the proposed technique is superior to the current state of the art in terms of the packet delivery rate, latency and throughput.
Keywords
Deep Learning Model, Data Modification, WSN, Throughput
Subscription
Login to verify subscription
User
Font Size
Information
- S. Sundaram, M. Pajic and G.J. Pappas, “The Wireless Control Network: Monitoring for Malicious Behavior”, Proceedings of IEEE Conference on Decision and Control, pp. 5979-5984, 2010.
- L.M. Abdulrahman and K.H. Sharif, “A State of Art for Smart Gateways Issues and Modification”, Asian Journal of Research in Computer Science, Vol. 63, pp. 1-13, 2021.
- Z.H. Pang and G.P. Liu, “Detection of Stealthy False Data Injection Attacks against Networked Control Systems via Active Data modification”, Information Sciences, Vol. 546, pp. 192-205, 2021.
- M. Soni and D.K. Singh, “LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things based Wireless Body Area Network”, Wireless Personal Communications, Vol. 122, 1-18, 2021.
- T. Karthikeyan and K. Praghash, “Improved Authentication in Secured Multicast Wireless Sensor Network (MWSN) using Opposition Frog Leaping Algorithm to Resist Man-in-Middle Attack”, Wireless Personal Communications, Vol. 123, No. 2, pp. 1715-1731, 2022.
- T.H. Hadi, “Types of Attacks in Wireless Communication Networks”, Webology, Vol. 19, No. 1, pp. 1-13, 2022.
- R. Rajendran, “An Optimal Strategy to Countermeasure the Impersonation Attack in Wireless Mesh Network”, International Journal of Information Technology, Vol. 13, No. 3, pp. 1033-1038, 2021.
- X.S. Shen and B. Ying, “Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation”, IEEE Network, Vol. 35, No. 1, pp. 8-15, 2021.
- M. Ponnusamy, P. Bedi and T. Suresh, “Design and Analysis of Text Document Clustering using Salp Swarm Algorithm”, The Journal of Supercomputing, Vol. 87, pp. 1-17, 2022.
- Z. Bin and H. Jian Feng, “Design and Implementation of Incremental Data Capturing in Wireless Network Planning based on Log Mining”, Proceedings of International Conference on Advanced Information Technology, Electronic and Automation Control, pp. 2757-2761, 2021.
- D. Dilmurod, S. Norkobilov and I. Jamshid, “Features of Using the Energy-Saving LEACH Protocol to Control the Temperature of Stored Cotton Piles via a Wireless Network of Sensors”, International Journal of Discoveries and Innovations in Applied Sciences, Vol. 1, No. 5, pp. 278-283, 2021.
- W. Sun and Y. Gao, “The Design of University Physical Education Management Framework based on Edge Computing and Data Analysis”, Wireless Communications and Mobile Computing, Vol. 122, pp. 1-16, 2021.
- H. Khalid, S.J. Hashim and M.A. Chaudhary, “Cross-SN: A Lightweight Authentication Scheme for a Multi-Server Platform using IoT-Based Wireless Medical Sensor Network”, Electronics, Vol. 10, No. 7, pp. 790-810, 2021.
- A.N. Kadhim and S.B. Sadkhan, “Security Threats in Wireless Network Communication-Status, Challenges, and Future Trends”, Proceedings of International Conference on Advanced Computer Applications, pp. 176-181, 2021.
- S. Jain, S. Pruthi and K. Sharma, “Penetration Testing of Wireless Encryption Protocols”, Proceedings of International Conference on Computing Methodologies and Communication, pp. 258-266, 2022.
Abstract Views: 176
PDF Views: 1