Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/4370
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Singh, Mandeep | - |
dc.contributor.author | Kaur, Navjyot | - |
dc.contributor.author | Kaur, Amandeep | - |
dc.contributor.author | Pushkarna, Gaurav | - |
dc.date.accessioned | 2019-12-26T04:47:39Z | - |
dc.date.available | 2019-12-26T04:47:39Z | - |
dc.date.issued | 2017-04-30 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/4370 | - |
dc.description.abstract | Wireless sensor networks have gained attention over the last few years and have significant applications for example remote supervising and target watching. They can communicate with each other though wireless interface and configure a network. Wireless sensor networks are often deployed in an unfriendly location and most of time it works without human management; individual node may possibly be compromised by the adversary due to some constraints. In this manner, the security of a wireless sensor network is critical. This work will focus on evaluation of mining techniques that can be used to find malicious nodes. The detection mechanisms provide the accuracy of the classification using different algorithm to detect the malicious node. Pragmatically the detection accuracy of J48 is 99.17%, Random Forest is 80.83%, NF Tree is 81.67% and BF Tree is 72.33%. J48 have very high detection accuracy as compared with BF Tree, NF Tree Random Forest. | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal of Cyber Warfare and Terrorism (IJCWT) | en_US |
dc.subject | Wireless Sensor Networks | en_US |
dc.title | A comparative evaluation of mining techniques to detect malicious node in Wireless Sensor Networks (Only Abstract) | en_US |
dc.type | Article | en_US |
Appears in Collections: | E-Publication |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A comparative evaluation of mining techniques to detect malicious node in Wireless Sensor Networks.docx | 10.36 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.