Performance comparison of reputation assessment techniques based on self-organizing maps in wireless sensor networks

1Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Many solutions based on machine learning techniques have been proposed in literature aimed at detecting and promptly counteracting various kinds of malicious attack (data violation, clone, sybil, neglect, greed, and DoS attacks), which frequently affect Wireless Sensor Networks (WSNs). Besides recognizing the corrupted or violated information, also the attackers should be identified, in order to activate the proper countermeasures for preserving network's resources and to mitigate their malicious effects. To this end, techniques adopting Self-Organizing Maps (SOM) for intrusion detection in WSN were revealed to represent a valuable and effective solution to the problem. In this paper, the mechanism, namely, Good Network (GoNe), which is based on SOM and is able to assess the reliability of the sensor nodes, is compared with another relevant and similar work existing in literature. Extensive performance simulations, in terms of nodes' classification, attacks' identification, data accuracy, energy consumption, and signalling overhead, have been carried out in order to demonstrate the better feasibility and efficiency of the proposed solution in WSN field.

Cite

CITATION STYLE

APA

Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2017). Performance comparison of reputation assessment techniques based on self-organizing maps in wireless sensor networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/7623742

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free