• No results found

Malicious Node Detection in Wireless Sensor Network based in Data Mining

N/A
N/A
Protected

Academic year: 2022

Share "Malicious Node Detection in Wireless Sensor Network based in Data Mining"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Rubika Walia

, IJRIT 171

IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, August, 2013, Pg. 171-176

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Malicious Node Detection in Wireless Sensor Network based in Data Mining

1Rubika Walia, 2Meenakshi Pawar

1M.tech Research Scholar Department. Of C.S.E M.M.U.P.T.U

2M.tech Research Scholar Department. Of C.S.E M.M.U.P.T.U

1ahluwalia.rubika@gmail.com, 2 meenakshipawar1@gmail.com

Abstract

The most attractive feature of sensor nodes is systematic collection of data and further transmitting the gathered data to a distant base station. The security parameter can be incurred if the data is transferred in sensitive areas like Defense, Health, and Banking etc. However, the sensitivity of Wireless Sensor Networks makes them prone to attacks which lead to extraction or damage of data or information that flows between distinct nodes. The main objective of this paper is to construct an effective sensor security detection system which is adaptive to the behavioural changes of the nodes and the data flowing between various sensor nodes and hence detect the malicious node in our environment based on its sceptical behaviour.

Keywords- Malicious node, Classification, Clustering, Sensor Network.

I. Introduction

Communication between devices is optimum way to share and gather knowledge that is accomplished via air as the best feasible media for communication in remote areas and overseas. Therefore, the security over the channel is an upmost requirement. Security here implies the protection of data packet as well as sensor nodes from intrusion of the third party and can guarantee the reliable communication between nodes without the loss of data.

The intruder systems can use the same network to steal information, misuse it or to destroy it inherently. Wireless Sensor Networks (WSNs) are known for their flexibility, cost effectiveness, and ease in deployment,

[1] As a result they are being widely used for various monitoring systems, data collection, and process control applications, etc. In spite of these advantages, WSNs are highly prone to software and hardware failures, security threats and intrusions attacks. These attacks are effortlessly implemented and can significantly disrupt the functioning of sensor networks. Once launched, attacks are hard to detect. The ubiquity and improved power of sensor node technology has increased data collection storage and manipulation.

[2] As the data set captured by sensor nodes have grown in size due to which the direct hands on data to analyse and extract any information is now a difficult task but the helping technology for same is data mining. Data

(2)

Rubika Walia

, IJRIT 172

pattern and get relevant information out of it.

[3] The intention of this paper is to widen the technique to detect the malicious node in sensor network based on their suspicious behaviour using classification and clustering techniques.

2. Overview of Techniques Used

The proposed method makes use of K-mean clustering algorithm and J48 algorithm. The malicious node detection system has two stages. In first stage, the environment of malicious node is created in NS2 and dataset is created from trace file. In second stage, the dataset is used to perform classification and clustering to analyse the scenario and compare the effectiveness of different decision tree algorithms.

2.1 Definition and Notations

Let DS be the dataset which contains 120 nodes and rate of recurrence to receive, sent, forward and drop the packet which is differentiated in high, medium and low range.

A. K-mean clustering algorithm

This approach uses K-means clustering algorithm to determine the transaction amount clusters. The number of clusters k is fixed a priori. The grouping is performed by minimizing the sum of squares of between each data point and the centroid of the cluster to which it belongs. First it randomly selects k of the objects, each of which initially represents a cluster mean. For each of the residual objects, an object is assigned to the cluster to which it is most similar, based on the distance between the object and the cluster mean. It then computes the new mean for each cluster. This process iterates until the criterion function converges.

B. Decision tree

Decision trees are powerful and popular tools for classification and prediction. There are a variety of algorithms for building decision trees. Using any of the traditional algorithms such as J48, BF-tree, NB tree and Random Forest etc. construct a decision tree T from asset of training dataset (DS). In this work J48 is used, J48 is based on the concept learning system algorithm. J48 extracts the best attribute from the training set which separates the given samples. It recursively operates on the attribute of node (Low or High or Medium) to get their "best"

result.

3. Proposed System Architecture

The basic motivation to the proposed approach is to detect the malicious node in sensor node environment.

The detection system combines the K-mean clustering and different decision tree classification techniques.

4. Implementation Details

Implementation of the proposed malicious node detection system has different stages:

Stage 1: We had created a sensor networks environment of120 nodes on NS2 simulator [7] as show in Figure 1 and make a few nodes as malicious node.

(3)

Rubika Walia

, IJRIT 173

Figure 1. Wireless sensor network having 120 Nodes.

Then the TCL script is run to collect the data in a trace file where malicious nodes are present. Trace file includes: From this trace file, get the data of four events like send, receive, drop and forward extracted. Then data is converted in the following form as shown in Table I

Table I. Sample Data (H (High ), L (Low ), M (Medium ))

Stage 2: Training WEKA tool according to dataset.

WEKA contains tools for data pre-processing, classification, regression, clustering, association rules, and visualization. The data is transformed according to the needs and rules to obtain the hidden patterns and to discover the hidden relationship among the data. The first step towards the data transformation is grouping the data into three clusters using K-means clustering algorithm. The figure 2 shows the selection of the clustering algorithm.

(4)

Rubika Walia

, IJRIT 174

Figure 2. Properties of the K-means Clustering algorithm

The clustering is performed on clicking the start button. The clusters formed can be seen in Figure 3. There are basically 3 clusters are formed as cluster 0, cluster 1and cluster 2.

Figure 3. Formation of cluster

After clustering are next aim is to find out the malicious node by using classification. As a number of classification algorithm are there but the best one is taken care of this purpose.

(5)

Rubika Walia

, IJRIT 175

Figure 4. Cluster pattern

Stage 3: Detection of malicious node

The complete data is clustered into three clusters as cluster0, cluster1 and cluster2. Now for the detection of the malicious node, attention will be paid on the datasets belonging to cluster2. The classification is done by J48 algorithm for the formulation of the decision tree. The figure 5 shows result of the classification where malicious node is detected as node 3 and 15 and alerts are generated and broadcast to all nodes except nodes 3and 15.

Figure 5 Result of the classification.

(6)

Rubika Walia

, IJRIT 176 5. Conclusion

In this paper, the detection of malicious node in wireless sensor networks have been done though clustering and classification. The basic idea is that analyse the behaviour of each of the nodes in the network, if a node dropped all the information, which implies that a node has been compromised or malicious. This detection malicious node approach should be capable to discover both existing and new attack that are related to packet drop.

6. References

[1] Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham,“A simple learning automata-based solution for intrusion detection in wireless sensor networks” Wireless Communications and Mobile Computing ,Volume 11, Issue 3, March 2011, Pages: 426–441,

[2] N Wong, P Ray, G Stephens, “Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results”. Information Systems Journal, Vol22, Issue 1, pages 53–76, January 2012 [3] E. Aleskerov, B. Freisleben, B. Rao, “CARDWATCH: A Neural Network based database mining system for credit card fraud detection”,

References

Related documents

Auch RAJALAH- SCHULTZ und GRÖHN (1998) fanden bei Tieren mit früher Erkrankung der Gebärmutter eine geringere Milchleistung als bei Gesunden. Tiere, bei denen

CHAPTER 2: Use of Immuno-directed Laser Capture Microdissection in a Model of Chronic Proteinuria to Investigate Peritubular Capillary Rarefaction and Tubulointerstitial Injury

For the alternate immersion test, the number of cycles that need to be performed to achieve the corrosion losses equivalent to the different corrosion categories

In earlywood (upper panel, Fig. 3), the cell lumen area decreased with increasing cell wall area at an early stage of [C2mim][Cl] treatment.. After these initial changes in cell

For the MCS scale, caregivers ’ age and comorbidity, care recipients ’ marital status and ADL scores, the affordability of the elderly person ’ s healthcare expenses, and the

This qualitative study was designed to collect detailed information about the different approaches of secondary-level visual-arts teachers in Northern California who have

consciousness, and does not properly concern other people at all [ Frege Reader , 336]. Frege concluded that:.. Thoughts are neither things in the external world nor ideas... Frege