Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network's resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes' classification, attacks' identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.
CITATION STYLE
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2017). Performance comparison of reputation assessment techniques based on self-organizing maps in wireless sensor networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/7623742
Mendeley helps you to discover research relevant for your work.