Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recog...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2017/7623742 |
id |
doaj-e0bd8724ca844f23b9dbdcd0a05dbb25 |
---|---|
record_format |
Article |
spelling |
doaj-e0bd8724ca844f23b9dbdcd0a05dbb252020-11-25T01:16:30ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772017-01-01201710.1155/2017/76237427623742Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor NetworksSabrina Sicari0Alessandra Rizzardi1Luigi Alfredo Grieco2Alberto Coen-Porisini3Dipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyDipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyDepartment of Electrical and Information Engineering, Politecnico di Bari, Via Orabona 4, 70125 Bari, ItalyDipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyMany solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network’s resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes’ classification, attacks’ identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.http://dx.doi.org/10.1155/2017/7623742 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Sabrina Sicari Alessandra Rizzardi Luigi Alfredo Grieco Alberto Coen-Porisini |
spellingShingle |
Sabrina Sicari Alessandra Rizzardi Luigi Alfredo Grieco Alberto Coen-Porisini Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks Wireless Communications and Mobile Computing |
author_facet |
Sabrina Sicari Alessandra Rizzardi Luigi Alfredo Grieco Alberto Coen-Porisini |
author_sort |
Sabrina Sicari |
title |
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks |
title_short |
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks |
title_full |
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks |
title_fullStr |
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks |
title_full_unstemmed |
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks |
title_sort |
performance comparison of reputation assessment techniques based on self-organizing maps in wireless sensor networks |
publisher |
Hindawi-Wiley |
series |
Wireless Communications and Mobile Computing |
issn |
1530-8669 1530-8677 |
publishDate |
2017-01-01 |
description |
Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network’s resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes’ classification, attacks’ identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field. |
url |
http://dx.doi.org/10.1155/2017/7623742 |
work_keys_str_mv |
AT sabrinasicari performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks AT alessandrarizzardi performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks AT luigialfredogrieco performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks AT albertocoenporisini performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks |
_version_ |
1725149712903831552 |