Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/519660
Title: | Performance analysis of optimized intelligent intrusion detection system for wireless sensor networks |
Researcher: | Nagalalli, G |
Guide(s): | Ravi, G |
Keywords: | Detection system Engineering Engineering and Technology Engineering Electrical and Electronic Performance analysis Wireless sensor network |
University: | Anna University |
Completed Date: | 2023 |
Abstract: | One of the key elements of contemporary electrical and wireless systems is the Wireless Sensor Network (WSN). For the purpose of discovering sensor networks and using functions like data sensing, data processing, and communication, a WSN is made up of several sensor nodes. These networks are extremely important in the field of medical healthcare for transferring and gathering extremely private data from various geographical locations. However, the worry about various attacks on health care data normally grows daily. These attacks may have adverse impacts on the WSN nodes in a relatively short amount of time. Additionally, the current Intrusion Detection System (IDS) has problems with its resource limitations, poor detection rate, significant processing overhead, and increased false alarm rates when identifying various threats. In the first phase of the research, Machine Learning (ML) classifiers like quotSupport Vector Machines (SVM), Decision Tree (DT), K-Nearest Neighbor (KNN), and Artificial Neural Network (ANN)quot are used to detect various WSN attacks in order to address all of the aforementioned problems. It has been shown that ML modules can enhance detection performance. Numerous performance metrics, including quotaccuracy, sensitivity, specificity, and F1-score,quot are generated for comparative study. According to a thorough assessment of these modules, the detection efficiency may be improved even more in terms of performance metrics. The ML classifiers averaged approximately 86% accuracy, 80.2% sensitivity, and 77.3% specificity when attacks increased. However, this architecture is still improvised to manage massive amounts of data. newline |
Pagination: | xviii,168p. |
URI: | http://hdl.handle.net/10603/519660 |
Appears in Departments: | Faculty of Electrical and Electronics Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 22.71 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 577.21 kB | Adobe PDF | View/Open | |
03_content.pdf | 162.83 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 9.6 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 608.74 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 475.17 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 736.41 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 703.88 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 556.82 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 143.32 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 66.44 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: