Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks

Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recog...

Full description

Bibliographic Details
Main Authors: Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, Alberto Coen-Porisini
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2017/7623742
id doaj-e0bd8724ca844f23b9dbdcd0a05dbb25
record_format Article
spelling doaj-e0bd8724ca844f23b9dbdcd0a05dbb252020-11-25T01:16:30ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772017-01-01201710.1155/2017/76237427623742Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor NetworksSabrina Sicari0Alessandra Rizzardi1Luigi Alfredo Grieco2Alberto Coen-Porisini3Dipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyDipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyDepartment of Electrical and Information Engineering, Politecnico di Bari, Via Orabona 4, 70125 Bari, ItalyDipartimento di Scienze Teoriche e Applicate, Università degli Studi dell’Insubria, Via Mazzini 5, 21100 Varese, ItalyMany solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network’s resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes’ classification, attacks’ identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.http://dx.doi.org/10.1155/2017/7623742
collection DOAJ
language English
format Article
sources DOAJ
author Sabrina Sicari
Alessandra Rizzardi
Luigi Alfredo Grieco
Alberto Coen-Porisini
spellingShingle Sabrina Sicari
Alessandra Rizzardi
Luigi Alfredo Grieco
Alberto Coen-Porisini
Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
Wireless Communications and Mobile Computing
author_facet Sabrina Sicari
Alessandra Rizzardi
Luigi Alfredo Grieco
Alberto Coen-Porisini
author_sort Sabrina Sicari
title Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
title_short Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
title_full Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
title_fullStr Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
title_full_unstemmed Performance Comparison of Reputation Assessment Techniques Based on Self-Organizing Maps in Wireless Sensor Networks
title_sort performance comparison of reputation assessment techniques based on self-organizing maps in wireless sensor networks
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2017-01-01
description Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network’s resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes’ classification, attacks’ identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.
url http://dx.doi.org/10.1155/2017/7623742
work_keys_str_mv AT sabrinasicari performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks
AT alessandrarizzardi performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks
AT luigialfredogrieco performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks
AT albertocoenporisini performancecomparisonofreputationassessmenttechniquesbasedonselforganizingmapsinwirelesssensornetworks
_version_ 1725149712903831552