基于机器学习分类方法的WSN路由形成与入侵分类的最优聚类可信路径

Putty Srividya, Lavadya Nirmala Devi
{"title":"基于机器学习分类方法的WSN路由形成与入侵分类的最优聚类可信路径","authors":"Putty Srividya,&nbsp;Lavadya Nirmala Devi","doi":"10.1016/j.gltp.2022.03.018","DOIUrl":null,"url":null,"abstract":"<div><p>Generally, wireless sensor networks (WSN) are being utilized in a wide range of fields like queue tracking, military applications, environmental applications, and so on. This approach is an attempt to focus on the detection of attack with the utilization of machine learning and optimization strategies. Primarily, the system model is initiated and the nodes are deployed randomly based on the size of the network. The cluster formation will be carried out with the use of energy competent Particle swarm optimization depending on the passive clustering mechanism (ECPSO-PCM) strategy. Using spatial correlation, groups correlation group will be formed. The probability of transmission is then estimated by taking into account the spatial correlation, quality of link among CH and cluster member nodes, and the node's residual energy of the network. The management of the trust is employed by the selection of cluster heads. If node consists of the criteria for trust coverage, then this node is chosen as the cluster head. If this condition is not satisfied, then it is chosen as a cluster member. The optimal range of cluster paths for effective transmission of data is carried using the Computation of optimal cluster path using Bio-inspired Hierarchical order chicken swarm optimization (BIHO-CSO) at which the distance and residual energy are major constraints. Once the optimum and trusted path is chosen, the classification and detection of attack are carried out using a Recursive Binary partitioning decision tree classifier (RBP-DT). The performance analysis is made and the attained outcomes are compared with traditional approaches to validate the supremacy of the presented scheme</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 317-325"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000243/pdfft?md5=a83eec440d2f0ba644692c18e7d6a82f&pid=1-s2.0-S2666285X22000243-main.pdf","citationCount":"5","resultStr":"{\"title\":\"An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN\",\"authors\":\"Putty Srividya,&nbsp;Lavadya Nirmala Devi\",\"doi\":\"10.1016/j.gltp.2022.03.018\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Generally, wireless sensor networks (WSN) are being utilized in a wide range of fields like queue tracking, military applications, environmental applications, and so on. This approach is an attempt to focus on the detection of attack with the utilization of machine learning and optimization strategies. Primarily, the system model is initiated and the nodes are deployed randomly based on the size of the network. The cluster formation will be carried out with the use of energy competent Particle swarm optimization depending on the passive clustering mechanism (ECPSO-PCM) strategy. Using spatial correlation, groups correlation group will be formed. The probability of transmission is then estimated by taking into account the spatial correlation, quality of link among CH and cluster member nodes, and the node's residual energy of the network. The management of the trust is employed by the selection of cluster heads. If node consists of the criteria for trust coverage, then this node is chosen as the cluster head. If this condition is not satisfied, then it is chosen as a cluster member. The optimal range of cluster paths for effective transmission of data is carried using the Computation of optimal cluster path using Bio-inspired Hierarchical order chicken swarm optimization (BIHO-CSO) at which the distance and residual energy are major constraints. Once the optimum and trusted path is chosen, the classification and detection of attack are carried out using a Recursive Binary partitioning decision tree classifier (RBP-DT). The performance analysis is made and the attained outcomes are compared with traditional approaches to validate the supremacy of the presented scheme</p></div>\",\"PeriodicalId\":100588,\"journal\":{\"name\":\"Global Transitions Proceedings\",\"volume\":\"3 1\",\"pages\":\"Pages 317-325\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666285X22000243/pdfft?md5=a83eec440d2f0ba644692c18e7d6a82f&pid=1-s2.0-S2666285X22000243-main.pdf\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Global Transitions Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666285X22000243\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Transitions Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666285X22000243","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

一般来说,无线传感器网络(WSN)在队列跟踪、军事应用、环境应用等领域得到了广泛的应用。这种方法是利用机器学习和优化策略来关注攻击检测的一种尝试。首先,初始化系统模型,根据网络的大小随机部署节点。利用基于被动聚类机制(ECPSO-PCM)策略的能态粒子群优化算法进行聚类。利用空间关联,形成群体关联群。然后通过考虑空间相关性、CH和集群成员节点之间的链路质量以及节点的网络剩余能量来估计传输概率。信任的管理是通过簇头的选择来实现的。如果节点包含信任覆盖的标准,则选择该节点作为簇头。如果不满足此条件,则选择它作为集群成员。以距离和剩余能量为主要约束条件,采用仿生层次次序鸡群优化算法(BIHO-CSO)进行最优簇路径的计算,得到有效传输数据的最优簇路径范围。一旦选择了最优可信路径,使用递归二叉划分决策树分类器(RBP-DT)对攻击进行分类和检测。进行了性能分析,并将所得结果与传统方法进行了比较,以验证所提方案的优越性
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An optimal cluster & trusted path for routing formation and classification of intrusion using the machine learning classification approach in WSN

Generally, wireless sensor networks (WSN) are being utilized in a wide range of fields like queue tracking, military applications, environmental applications, and so on. This approach is an attempt to focus on the detection of attack with the utilization of machine learning and optimization strategies. Primarily, the system model is initiated and the nodes are deployed randomly based on the size of the network. The cluster formation will be carried out with the use of energy competent Particle swarm optimization depending on the passive clustering mechanism (ECPSO-PCM) strategy. Using spatial correlation, groups correlation group will be formed. The probability of transmission is then estimated by taking into account the spatial correlation, quality of link among CH and cluster member nodes, and the node's residual energy of the network. The management of the trust is employed by the selection of cluster heads. If node consists of the criteria for trust coverage, then this node is chosen as the cluster head. If this condition is not satisfied, then it is chosen as a cluster member. The optimal range of cluster paths for effective transmission of data is carried using the Computation of optimal cluster path using Bio-inspired Hierarchical order chicken swarm optimization (BIHO-CSO) at which the distance and residual energy are major constraints. Once the optimum and trusted path is chosen, the classification and detection of attack are carried out using a Recursive Binary partitioning decision tree classifier (RBP-DT). The performance analysis is made and the attained outcomes are compared with traditional approaches to validate the supremacy of the presented scheme

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network Grid interconnected H-bridge multilevel inverter for renewable power applications using repeating units and level boosting network Power Generation Using Ocean Waves: A Review Development of an Arabic HQAS-based ASAG to consider an ignored knowledge in misspelled multiple words short answers Smartphone assist deep neural network to detect the citrus diseases in Agri-informatics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1