A Hybrid Supervised and Unsupervised Learning Approach for Node Classification

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-32 Number-4
Year of Publication : 2016
Authors : Alekhyasuma, P.Rajasekhar

Citation 

Alekhyasuma, P.Rajasekhar"A Hybrid Supervised and Unsupervised Learning Approach for Node Classification", International Journal of Engineering Trends and Technology (IJETT), V32(4),171-174 February 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Malicious node identification is always an interesting research issue in the field of network security. Various approaches like statistical, distance and density based techniques (trust measures, SVM Base approaches, classification mechanisms) introduced by the various researchers. In this paper we are proposing a novel cluster based approach for detecting the anomaly or outlier node while communicating to the destination node, by initially computing the clusters and followed by the positive and negative probabilities.

 References

[1] L. Eschenauer and V. Gligor, “A Key-Management Scheme forDistributed Sensor Networks,” Proc. Ninth ACM Conf. Computerand Comm. Security (CCS ’02), pp. 41-47, 2002.
[2] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. Culler, “SPINS:Security Protocols for Sensor Networks,” Wireless Networks, vol. 8,no. 5, pp. 521-534, 2002.
[3] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D.Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, “HIGHT: ANew Block Cipher Suitable for Low-Resource Device,” Proc.Eighth Int’l Workshop Cryptographic Hardware and EmbeddedSystems (CHES ’06), pp. 46-59, 2006.
[4] P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, “EnhancingSource-Location Privacy in Sensor Network Routing,” Proc. IEEE25th Int’l Conf. Distributed Computing Systems (ICDCS ’05), pp. 599-608, 2005.
[5] C. Ozturk, Y. Zhang, and W. Trappe, “Source-Location Privacy inEnergy-Constrained Sensor Network Routing,” Proc.Second ACMWorkshop Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 88-93, 2004.
[6] L. Eschenauer and V. Gligor, “A Key-Management Scheme forDistributed Sensor Networks,” Proc. Ninth ACM Conf. Computerand Comm. Security (CCS ’02), pp. 41-47, 2002.

Keywords
Various approaches like statistical, distance and density based techniques.