2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies 2014
DOI: 10.1109/icaccct.2014.7019418
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection in wireless sensor network using genetic K-means algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The proposed IDM does not require dedicated hardware resources and presented negligible performance overhead with 10.45% increase in the power consumption and the feasibility of the proposed solution is verified for a WSN system, with the detection accuracy of 97.23%. Sandhya G et al (2014) present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm. The algorithm classifies instances to a pre-defined number of clusters.…”
Section: Wireless Sensor Network Intrusion Detection Systemsmentioning
confidence: 99%
“…The proposed IDM does not require dedicated hardware resources and presented negligible performance overhead with 10.45% increase in the power consumption and the feasibility of the proposed solution is verified for a WSN system, with the detection accuracy of 97.23%. Sandhya G et al (2014) present a conceptual framework for identifying attacks for intrusion detection by applying genetic K-means algorithm. The algorithm classifies instances to a pre-defined number of clusters.…”
Section: Wireless Sensor Network Intrusion Detection Systemsmentioning
confidence: 99%
“…Some proposed solutions deal with mobility of network nodes [47]. Some authors introduce different possible detection methods (based on data mining, machine learning, game theory, or genetic algorithms) which require adaptation for implementation into the IPv6-based WSN [48,49]. Most of the proposed solutions still focus on certain attack type and reside at particular network layer (usually the application layer) [50][51][52].…”
Section: Intrusion Detection In Wireless Sensor Networkmentioning
confidence: 99%
“…These works were published in several papers. The exemplary research results were presented in [12], where authors described modifications of the anomaly based IDS exploiting genetic k-means algorithm. Authors have improved algorithm efficiency and increased attack detection rate compared to basic algorithm.…”
Section: Ids For Internet Of Thingsmentioning
confidence: 99%