期刊论文详细信息
Journal of Big Data
Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network
Research
Lahcen Oughdir1  Salim Salmi1 
[1] Engineering, Systems and Applications Laboratory, ENSA, Sidi Mohamed Ben Abdellah University, Fez, Morocco;
关键词: Wireless sensor networks (WSNs);    Intrusion detection system (IDS);    Denial of service (DOS);    Deep learning (DL);   
DOI  :  10.1186/s40537-023-00692-w
 received in 2022-03-08, accepted in 2023-01-21,  发布年份 2023
来源: Springer
PDF
【 摘 要 】

Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used remotely to collect data about the activities and conditions of a particular area, for example, temperature, pressure, motion. Each sensor node is usually small, inexpensive, and relatively easy to deploy compared to other sensing methods. For this reason, WSNs are used in a wide range of applications and industries. However, WSNs are vulnerable to different kinds of security threats and attacks. This is primarily because they are very limited in resources like power, storage, bandwidth, and processing power that could have been used in developing their defense. To ensure their security, an effective Intrusion detection system (IDS) need to be in place to detect these attacks even under these constraints. Today, traditional IDS are less effective as these malicious attacks are becoming more intelligent, frequent, and complex. Denial of service (DOS) attack is one of the main types of attacks that threaten WSNs. For this reason, we review related works that focus on detecting DoS attacks in WSN. In addition, we developed and implemented several Deep learning (DL) based IDS. These systems were trained on a specialized dataset for WSNs called WSN-DS in detecting four types of DoS attacks that affects WSNs. They include the Blackhole, Grayhole, Flooding, and Scheduling attacks. Finally, we evaluated and compared the results and we discuss possible future works.

【 授权许可】

CC BY   
© The Author(s) 2023

【 预 览 】
附件列表
Files Size Format View
RO202305158895252ZK.pdf 2074KB PDF download
Fig. 2 43KB Image download
Scheme 1 1823KB Image download
Fig. 3 37KB Image download
MediaObjects/13690_2023_1031_MOESM2_ESM.docx 29KB Other download
Fig. 7 101KB Image download
Fig. 2 1430KB Image download
Fig. 4 89KB Image download
40854_2023_451_Article_IEq4.gif 1KB Image download
Fig. 1 500KB Image download
Fig. 6 1277KB Image download
Fig. 1 315KB Image download
MediaObjects/13068_2023_2275_MOESM14_ESM.xlsx 282KB Other download
MediaObjects/13750_2022_294_MOESM2_ESM.docx 19KB Other download
Fig. 2 169KB Image download
Fig. 1 331KB Image download
Fig. 2 1037KB Image download
Fig. 3 88KB Image download
Fig. 2 2775KB Image download
Fig. 2 2137KB Image download
MediaObjects/13750_2019_171_MOESM2_ESM.xlsx 36KB Other download
40645_2023_538_Article_IEq106.gif 1KB Image download
【 图 表 】

40645_2023_538_Article_IEq106.gif

Fig. 2

Fig. 2

Fig. 3

Fig. 2

Fig. 1

Fig. 2

Fig. 1

Fig. 6

Fig. 1

40854_2023_451_Article_IEq4.gif

Fig. 4

Fig. 2

Fig. 7

Fig. 3

Scheme 1

Fig. 2

【 参考文献 】
  • [1]
  • [2]
  • [3]
  • [4]
  • [5]
  • [6]
  • [7]
  • [8]
  • [9]
  • [10]
  • [11]
  • [12]
  • [13]
  • [14]
  • [15]
  • [16]
  • [17]
  • [18]
  • [19]
  • [20]
  • [21]
  • [22]
  • [23]
  • [24]
  • [25]
  • [26]
  • [27]
  • [28]
  • [29]
  • [30]
  • [31]
  • [32]
  • [33]
  • [34]
  • [35]
  • [36]
  • [37]
  • [38]
  • [39]
  • [40]
  • [41]
  • [42]
  • [43]
  • [44]
  • [45]
  • [46]
  • [47]
  文献评价指标  
  下载次数:7次 浏览次数:2次