Augmenting cyber security in WSN: AI-based clone attacks recognition framework
ID:143
Submission ID:325 View Protection:ATTENDEE
Updated Time:2024-10-08 21:17:54 Hits:121
Poster Presentation
Abstract
Applications such as industrial automation, healthcare, and environmental monitoring need the use of wireless sensor networks (WSNs). However, due to their dispersed organizational makeup, they have become vulnerable to security risks, particularly clone assaults. To protect confidentiality, availability, and confidentiality, several attacks must be recognized and prevented. This project aims to offer an effective method for identifying and averting clone assaults. To identify cloned both nationally and internationally use a low-cost verification process. In this study, we offer a new adaptive sea-horse optimized light gradient boosting machine (ASHO-LGBM) technique for protecting the network against node identity duplicates. The ASHO approach is used in the ASHO-LGBM framework to improve the recognition accuracy of the LGBM characteristics. The replications with the nodes intrusion detection (ID) are used to choose a most trustworthy communication mode. The procedure is intended to be implemented and used for gathering data through an internet component. Using a Python tool, the suggested technique is simulated and its Delay, Packet Delivery Ratio, Packet Drop and Energy are evaluated. When compared to other approaches, the study's results show that the ASHO-LGBM strategy's performance analysis achieves the highest accuracy rate.
Keywords
Wireless sensor networks (WSN), Cyber Security, Attacks, Recognition, Adaptive Sea-Horse Optimized Light Gradient Boosting Machine (ASHO-LGBM)
Submission Author
Seelam Ch Vijaya
MVSR Engineering College
Fatima Alsalamy
Al-Mustaqbal University
Comment submit