Open Access   Article Go Back

Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering

Rajeev Bedi1 , Baljinder Singh2 , Meenakshi Devi3

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-2 , Page no. 266-272, Feb-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i2.266272

Online published on Feb 28, 2019

Copyright © Rajeev Bedi, Baljinder Singh, Meenakshi Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rajeev Bedi, Baljinder Singh, Meenakshi Devi, “Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.266-272, 2019.

MLA Style Citation: Rajeev Bedi, Baljinder Singh, Meenakshi Devi "Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering." International Journal of Computer Sciences and Engineering 7.2 (2019): 266-272.

APA Style Citation: Rajeev Bedi, Baljinder Singh, Meenakshi Devi, (2019). Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering. International Journal of Computer Sciences and Engineering, 7(2), 266-272.

BibTex Style Citation:
@article{Bedi_2019,
author = {Rajeev Bedi, Baljinder Singh, Meenakshi Devi},
title = {Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {7},
Issue = {2},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {266-272},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3653},
doi = {https://doi.org/10.26438/ijcse/v7i2.266272}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i2.266272}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3653
TI - Position Depended Sybil Attack Detection using Efficient KNN technique with Clustering
T2 - International Journal of Computer Sciences and Engineering
AU - Rajeev Bedi, Baljinder Singh, Meenakshi Devi
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 266-272
IS - 2
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
408 305 downloads 191 downloads
  
  
           

Abstract

In today`s world the wireless sensor network has great significant in application like defense surveillance, patient health monitoring, traffic control etc. As WSN utilize radio frequencies so there is threat of interference in network. These threats also include distributed denial of service in which the messages that are sent over the network may be attacked by unauthorized user. It would harm the confidentiality of the network user and the services of network. There are various algorithm that are utilized to detect Sybil attack in WSN but these schemes only stress on prevention of attack after it is occurred. This would leads to the loss of data and more consumption of limited network resources. So in this work we introduce a new algorithm that is based on clustering based KNN along with Euclidean distance. It would detect earlier the Sybil attack in WSN and prevent the data loss. The parameters like throughput, energy consumption etc are utilized to analyze the performance of this technique.

Key-Words / Index Term

KNN, WSN, Sybil detection

References

[1] C. Science and K. Mangalore, “A Two-tier Network based Intrusion Detection System Architecture using Machine Learning Approach,” pp. 42–47, 2016.
[2] P. Singh and A. Tiwari, “An Efficient Approach for Intrusion Detection in Reduced Features of KDD99 Using ID3 and Classification with KNNGA,” Proc. - 2015 2nd IEEE Int. Conf. Adv. Comput. Commun. Eng. ICACCE 2015, pp. 445–452, 2015.
[3] K. J. Chabathula, C. D. Jaidhar, and M. A. Ajay Kumara, “Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms,” pp. 1–6, 2015.
[4] H. Haddad Pajouh, R. Javidan, R. Khayami, D. Ali, and K.-K. R. Choo, “A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks,” IEEE Trans. Emerg. Top. Comput., vol. 6750, no. c, pp. 1–1, 2016.
[5] A. R. Onik, N. F. Haq, and W. Mustahin, “Cross-breed type Bayesian network based intrusion detection system (CBNIDS),” 2015 18th Int. Conf. Comput. Inf. Technol., pp. 407–412, 2015.
[6] Y. Canbay and S. Sagiroglu, “A Hybrid Method for Intrusion Detection,” 2015 IEEE 14th Int. Conf. Mach. Learn. Appl., pp. 156–161, 2015.
[7] M. Xie and J. Hu, “Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD,” Proc. 2013 6th Int. Congr. Image Signal Process. CISP 2013, vol. 3, no. Cisp, pp. 1711–1716, 2013.
[8] C. Huijun, S. Hong, and Z. Hong, “Early recognition of Internet service flow,” Proc. - 2013 Wirel. Opt. Commun. Conf. WOCC 2013, pp. 464–468, 2013.
[9] S. Behrozinia, R. Azmi, M. R. Keyvanpour, and B. Pishgoo, “Biological inspired anomaly detection based on danger theory,” IKT 2013 - 2013 5th Conf. Inf. Knowl. Technol., pp. 102–106, 2013.
[10] A. Daneshpazhouh and A. Sami, “Semi-supervised outlier detection with only positive and unlabeled data based on fuzzy clustering,” 5th Conf. Inf. Knowl. Technol., pp. 344–348, 2013.
[11] T. Weiming and C. Hongzhi, “An Improved Feature Selection Algorithm Based on MAHALANOBIS Distance for Networl < Intrusion Detection,” pp. 69–73, 2013.
[12] S. Gopal, Y. Yang, K. Salomatin, and J. Carbonell, “Sctatistical learning for file-type identification,” Proc. - 10th Int. Conf. Mach. Learn. Appl. ICMLA 2011, vol. 1, no. DiiD, pp. 68–73, 2011.
[13] P. M. Mafra, V. Moll, J. Da Silva Fraga, and A. O. Santin, “Octopus-IIDS: An anomaly based intelligent intrusion detection system,” Proc. - IEEE Symp. Comput. Commun., pp. 405–410, 2010.
[14] H. Yu, P. P. K. Chan, W. W. Y. Ng, and D. S. Yeung, “Apply randomization in KNN to make the adversary harder to attack the classifier,” 2010 Int. Conf. Mach. Learn. Cybern. ICMLC 2010, vol. 1, no. July, pp. 179–183, 2010.
[15] Z. Wang et al., “Detecting Malicious Server Based on Server-to-Server Realation Graph,” 2016 IEEE First Int. Conf. Data Sci. Cybersp., pp. 698–702, 2016.