2020
DOI: 10.1504/ijcse.2020.107344
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 0 publications
0
13
0
Order By: Relevance
“…All possible solutions are evaluated according to the fitness selection procedure along with classifier algorithms, namely KNN [ 63 ], DT [ 64 ], SVM [ 65 ], DL [ 21 ], and NB [ 59 ], to obtain the highest performance accuracy among the classification algorithms and features selected for each solution. For the purpose of maintaining an adequate balance between all the selected features in each of the minimum solutions and providing maximum accuracy for feature selection, the fitness function, i.e., objective function in (11) is used in the WC technique to evaluate solutions in M pop : where γ R (D) is the rating of classification error for a given classifier; |R| is the total items in the selected subset, |M| is the total number of features in the dataset, ∂ and Φ are two parameters that represent the importance of the classification quality and subset length, ∂ ∈ [0, 1] and Φ = ( 1 − α ) [ 50 , 66 ].…”
Section: Proposed Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…All possible solutions are evaluated according to the fitness selection procedure along with classifier algorithms, namely KNN [ 63 ], DT [ 64 ], SVM [ 65 ], DL [ 21 ], and NB [ 59 ], to obtain the highest performance accuracy among the classification algorithms and features selected for each solution. For the purpose of maintaining an adequate balance between all the selected features in each of the minimum solutions and providing maximum accuracy for feature selection, the fitness function, i.e., objective function in (11) is used in the WC technique to evaluate solutions in M pop : where γ R (D) is the rating of classification error for a given classifier; |R| is the total items in the selected subset, |M| is the total number of features in the dataset, ∂ and Φ are two parameters that represent the importance of the classification quality and subset length, ∂ ∈ [0, 1] and Φ = ( 1 − α ) [ 50 , 66 ].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In order to illustrate the effect of feature selection techniques on the accuracy of detection using the WSN-DS dataset, we integrated machine learning classifier algorithms along with feature selection techniques as mentioned previously to detect the most important features of the WSN-DS dataset. The WC technique was benchmarked with various feature selection techniques such as PSO [ 21 ], SA [ 22 ], HS [ 19 ], and GA [ 23 ] using the same classifier algorithms and dataset. The output of these operations is shown in Table 7 .…”
Section: Implementation and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…2 depicts various categories of detection approaches and machine learning techniques that are used in detection attacks in WSN networks. [23,44] In a simple review of the functioning of supervised algorithms, which we will deal with in this study, the KNN works based on the manifold hypothesis. If the majority of the neighbors of the sample are from the same class, then the sample is likely to be from that class as well.…”
Section: Machine Learning In Intrusion Detection Approachmentioning
confidence: 99%
“…The error is propagated back from the output layer to the input layer in the back-propagation step, and weights between output neurons and hidden neurons are changed. Weights are updated using the gradient descent approach [44]. Moreover, another different type of deep learning that also uses backpropagation is LSTM.…”
Section: Machine Learning In Intrusion Detection Approachmentioning
confidence: 99%