2014
DOI: 10.1016/j.measurement.2014.04.034
|View full text |Cite
|
Sign up to set email alerts
|

D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 99 publications
(41 citation statements)
references
References 41 publications
0
40
0
Order By: Relevance
“…These relationships are similar to the relationship between membership degree and relative energy. If the node has high relatively energy, high relatively density and high relatively centrality, then the node priority must be very high [2]. As shown in Table 2 below, the HCRAFM contains 3x3x3=27 fuzzy rules.…”
Section: Cluster Head Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…These relationships are similar to the relationship between membership degree and relative energy. If the node has high relatively energy, high relatively density and high relatively centrality, then the node priority must be very high [2]. As shown in Table 2 below, the HCRAFM contains 3x3x3=27 fuzzy rules.…”
Section: Cluster Head Selectionmentioning
confidence: 99%
“…Therefore, the algorithm must be able to improve the energy efficiency of WSN nodes, and provide high quality services [2]. The traditional routing algorithms cannot satisfy the demand of WSN, which carries numerous different features from those of traditional networks.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed model gives accuracy of 15% higher than other machine learning methods and static models. Using the fuzzy rules, a density based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks is proposed by [21]. It consists of the imperialist competitive algorithm (ICA) integrated with a density based algorithm and fuzzy logic for optimum clustering in WSNs.…”
Section: Literature Surveymentioning
confidence: 99%
“…A new attack cluster is also created using Eq. (9). Members of such cluster are mixed by the new normal data and gradually streams to the anomaly detection system.…”
Section: Simulated Datasetmentioning
confidence: 99%
“…Accordingly, machine learning approaches have been widely used in network anomaly detection. [5][6][7][8][9] Depending on which machine learning approach is used, anomaly detection can be performed supervised or unsupervised. Supervised anomaly detection 10 makes a model of normal data using labeled data and detects deviation from the normal model in observed data.…”
Section: Introductionmentioning
confidence: 99%