The Intersection of Machine Learning and Wireless Sensor Network Security for Cyber-Attack Detection: A Detailed Analysis

被引:2
|
作者
Delwar, Tahesin Samira [1 ]
Aras, Unal [1 ]
Mukhopadhyay, Sayak [2 ]
Kumar, Akshay [2 ]
Kshirsagar, Ujwala [2 ]
Lee, Yangwon [3 ]
Singh, Mangal [2 ]
Ryu, Jee-Youl [1 ]
机构
[1] Pukyong Natl Univ, Dept Smart Robot Convergence & Applicat Engn, Busan 48513, South Korea
[2] Symbiosis Int Deemed Univ, Symbiosis Inst Technol, Pune 412115, India
[3] Pukyong Natl Univ, Dept Spatial Informat Engn, Busan 48513, South Korea
基金
新加坡国家研究基金会;
关键词
Wireless Sensor Networks (WSNs); machine learning (ML); Quality of Service (QoS); Path Planning (PP); Sensor Node Deployment (SND); ANOMALY DETECTION; LOCALIZATION; OPTIMIZATION; TRACKING; ALGORITHM; FRAMEWORK; SCHEME;
D O I
10.3390/s24196377
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This study provides a thorough examination of the important intersection of Wireless Sensor Networks (WSNs) with machine learning (ML) for improving security. WSNs play critical roles in a wide range of applications, but their inherent constraints create unique security challenges. To address these problems, numerous ML algorithms have been used to improve WSN security, with a special emphasis on their advantages and disadvantages. Notable difficulties include localisation, coverage, anomaly detection, congestion control, and Quality of Service (QoS), emphasising the need for innovation. This study provides insights into the beneficial potential of ML in bolstering WSN security through a comprehensive review of existing experiments. This study emphasises the need to use ML's potential while expertly resolving subtle nuances to preserve the integrity and dependability of WSNs in the increasingly interconnected environment.
引用
收藏
页数:44
相关论文
共 50 条
  • [41] Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models
    Akhtar, Muhammad Shoaib
    Feng, Tao
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2022, 9 (05)
  • [42] ASSESSING SECURITY RISK FOR WIRELESS SENSOR NETWORKS UNDER CYBER ATTACK
    Yarbrough, Brian
    Wagner, Neal
    PROCEEDINGS OF THE ANNUAL SIMULATION SYMPOSIUM (ANSS 2018), 2018, 50 (02):
  • [43] Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems
    Wilson, David
    Tang, Yufei
    Yan, Jun
    Lu, Zhuo
    2018 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2018,
  • [44] Learning and Applying Ontology for Machine Learning in Cyber Attack Detection
    Zheng, Huangjie
    Wang, Yuchen
    Han, Chen
    Le, Fangjie
    He, Ruan
    Lu, Jialiang
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1309 - 1315
  • [45] Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
    Dutt, Varun
    Ahn, Young-Suk
    Gonzalez, Cleotilde
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 280 - 292
  • [46] Simultaneous Cyber-Attack Detection and Radar Sensor Health Monitoring in Connected ACC Vehicles
    Jeon, Woongsun
    Xie, Zhenming
    Zemouche, Ali
    Rajamani, Rajesh
    IEEE SENSORS JOURNAL, 2021, 21 (14) : 15741 - 15752
  • [47] Fault Detection and Isolation of Cyber-Physical System under Cyber-Attack Using Bayesian Network
    Tanwar, Monika
    Raghavan, Nagarajan
    Dammala, Pradeep K.
    2024 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT, ICPHM 2024, 2024, : 84 - 92
  • [48] Application of Artificial Neural Network for Cyber-Attack Detection in Water Distribution Systems as Cyber Physical Systems
    Min, Kyoung Won
    Choi, Young Hwan
    Al-Shamiri, Abobakr Khalil
    Kim, Joong Hoon
    ADVANCES IN HARMONY SEARCH, SOFT COMPUTING AND APPLICATIONS, 2020, 1063 : 82 - 88
  • [49] Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
    M. Indrasena Reddy
    A. P. Siva Kumar
    K. Subba Reddy
    Soft Computing, 2025, 29 (4) : 2015 - 2030
  • [50] Detection of Sinkhole Attack in Wireless Sensor Network
    Raju, Imandi
    Parwekar, Pritee
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 629 - 636