2019
DOI: 10.2298/fuee1902315o
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection for intrusion detection system in a cluster-based heterogeneous wireless sensor network

Abstract: Wireless sensor network (WSN) has become one of the most promising networking solutions with exciting new applications for the near future. Notwithstanding the resource constrain of WSNs, it has continued to enjoy widespread deployment. Security in WSN, however, remains an ongoing research trend as the deployed sensor nodes (SNs) are susceptible to various security challenges due to its architecture, hostile deployment environment and insecure routing protocols. In this work, we propose a feature selection met… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Feature selection is considered one of the main parts of IDS because these systems have to deal with a large amount of data so a strong feature reduction technique is always encouraged to be applied with the network classification problem. Researchers [34,[36][37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52] have used different feature selection techniques. The gain ratio, Pearson correlation, and ANOVA are few of the techniques that are widely used.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Feature selection is considered one of the main parts of IDS because these systems have to deal with a large amount of data so a strong feature reduction technique is always encouraged to be applied with the network classification problem. Researchers [34,[36][37][38][39][40][41][42][43][44][45][46][47][48][49][50][51][52] have used different feature selection techniques. The gain ratio, Pearson correlation, and ANOVA are few of the techniques that are widely used.…”
Section: Related Workmentioning
confidence: 99%
“…A feature which is repeating in any of the two subsets was used for the final subset. We combined the results of the multiple feature selection technique as it helps to find the most relevant and strong features and improves classification accuracy [38]. Figure 2 describes the complete feature selection model proposed and used in the paper.…”
Section: Input Layermentioning
confidence: 99%
“…Feature selection has direct influence on the efficiency of the results and offers a way to reduce computation time, improve accuracy, and enable a better understanding of the classification models or the data. In the case of an anomaly detection, the labels assigned to the data instances are usually in the form of binary values [16]. Machine learning models can be very effective in learning normal or abnormal patterns from training data and in detection of the anomalies in the computer networks [17].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A RFID tracking attack attempts to disable tags, modify their contents, or imitate them. Various security solutions are proposed to overcome this attack, such as using a localized fault-detection algorithm to identify the faulty nodes in the WSN [23], using a decentralized intrusion-detection system model for the WSN [21], and introducing a derived intrusion-detection probability in both homogeneous and heterogeneous WSNs [24]. Physical threats to the RFID system are disabling tags, modifying their content, and imitating them [19].…”
Section: Security Threats and Solutionsmentioning
confidence: 99%