Affiliation:
1. American University of Science and Technology, Beirut, Lebanon
Abstract
Routing over low power and lossy networks (RPL) is a standardized routing protocol for constrained Wireless Sensor Network (WSN) environments. The main node's constraints include processing capability, power, memory, and energy. RPL protocol describes how WSN nodes create a mesh topology, enabling them to route sensor data. Unfortunately, various attacks exist on the RPL protocol that can disrupt the topology and consume nodes' energy. In this article, the authors propose an intrusion detection system (IDS) based on self-organizing map (SOM) neural network to cluster the WSN routing attacks, and hence notify the system administrator at an early stage, reducing the risk of interrupting the network and consuming nodes' power. Results showed that the proposed SOM architecture is able to cluster routing packets into three different types of attacks, as well as clean data.
Subject
Computer Networks and Communications
Reference23 articles.
1. Voice Identity Finder Using the Back Propagation Algorithm of an Artificial Neural Network
2. Are your company’s IoT devices secure. (2017). Altman Vilandrie & Company.
3. A Survey on Selective Forwarding Attack in Wireless Sensor Networks
4. Dunkels, A., Eriksson, J., Finne, N., & Tsiftes, N. (2011). Powertrace: Network-level power profiling for low-power wireless networks.
5. Harkouss, Y., Mcheik, S., & Achkar, R. (2010). Accurate wavelet neural network for efficient controlling of an active magnetic bearing system.
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献