Augmenting cyber security in WSN: AI-based clone attacks recognition framework
编号:143
访问权限:仅限参会人
更新:2024-10-08 21:17:54 浏览:401次
张贴报告
摘要
Applications such as industrial automation, healthcare, and environmental monitoring need the use of wireless sensor networks (WSNs). However, due to their dispersed organizational makeup, they have become vulnerable to security risks, particularly clone assaults. To protect confidentiality, availability, and confidentiality, several attacks must be recognized and prevented. This project aims to offer an effective method for identifying and averting clone assaults. To identify cloned both nationally and internationally use a low-cost verification process. In this study, we offer a new adaptive sea-horse optimized light gradient boosting machine (ASHO-LGBM) technique for protecting the network against node identity duplicates. The ASHO approach is used in the ASHO-LGBM framework to improve the recognition accuracy of the LGBM characteristics. The replications with the nodes intrusion detection (ID) are used to choose a most trustworthy communication mode. The procedure is intended to be implemented and used for gathering data through an internet component. Using a Python tool, the suggested technique is simulated and its Delay, Packet Delivery Ratio, Packet Drop and Energy are evaluated. When compared to other approaches, the study's results show that the ASHO-LGBM strategy's performance analysis achieves the highest accuracy rate.
关键词
Wireless sensor networks (WSN), Cyber Security, Attacks, Recognition, Adaptive Sea-Horse Optimized Light Gradient Boosting Machine (ASHO-LGBM)
稿件作者
Seelam Ch Vijaya
MVSR Engineering College
Fatima Alsalamy
Al-Mustaqbal University
发表评论