Reference Hub2
Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks

Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks

Sihem Aissaoui, Sofiane Boukli Hacene
Copyright: © 2021 |Volume: 10 |Issue: 2 |Pages: 16
ISSN: 2155-6261|EISSN: 2155-627X|EISBN13: 9781799862338|DOI: 10.4018/IJWNBT.2021070102
Cite Article Cite Article

MLA

Aissaoui, Sihem, and Sofiane Boukli Hacene. "Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks." IJWNBT vol.10, no.2 2021: pp.16-31. http://doi.org/10.4018/IJWNBT.2021070102

APA

Aissaoui, S. & Hacene, S. B. (2021). Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks. International Journal of Wireless Networks and Broadband Technologies (IJWNBT), 10(2), 16-31. http://doi.org/10.4018/IJWNBT.2021070102

Chicago

Aissaoui, Sihem, and Sofiane Boukli Hacene. "Sinkhole Attack Detection-Based SVM In Wireless Sensor Networks," International Journal of Wireless Networks and Broadband Technologies (IJWNBT) 10, no.2: 16-31. http://doi.org/10.4018/IJWNBT.2021070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Wireless sensor network is a special kind of ad hoc network characterized by high density, low mobility, and the use of a shared wireless medium. This last feature makes the network deployment easy; however, it is prone to various types of attacks such as sinkhole attack, sybil attack. Many researchers studied the effect of such attacks on the network performance and their detection. Classification techniques are some of the most used end effective methods to detect attacks in WSN. In this paper, the authors focus on sinkhole attack, which is one of the most destructive attacks in WSNs. The authors propose an intrusion detection system for sinkhole attack using support vector machines (SVM) on AODV routing protocol. In the different experiments, a special sinkhole dataset is used, and a comparison with previous techniques is done on the basis of detection accuracy. The results show the efficiency of the proposed approach.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.