0% Complete
صفحه اصلی
/
سی امین کنفرانس بین المللی مهندسی برق
Stable Target Tracking in Wireless Sensor Networks Under Malicious Cyber Attacks
نویسندگان :
Jafar Akhondali
1
Mohammad Taheri
2
1- دانشکده مهندسی برق و کامپیوتر/ دانشگاه شیراز
2- دانشکده مهندسی برق و کامپیوتر/ دانشگاه شیراز
کلمات کلیدی :
Wireless Sensor Networks, Security, Location Prediction, Trajectory Clustering
چکیده :
Due to the advance of hardware in recent years, Wireless Sensor Networks has attracted many research interests. Target tracking is an important application in Wireless Sensor Networks that like any other application, suffers from security issues. Previous studies relied on mathematical methods like Kalman Filter to detect attacks. In this paper, it has been tried to detect and adjust attacked target locations by a novel methodology. At first targets are tracked over time and then the similar trajectories are clustered into the same groups. Then for each group, a separate LSTM model is trained for prediction that tries to predict the next target location by learning previous target locations. Then for new targets, the attack is detected when the prediction location by the LSTM model has an abnormal distance from the new location of the target. In order to find a corresponding LSTM model for a new target in real-time, several methods have been proposed. As the known available datasets were not complex enough for our experiments, a tool has been developed to generate customized complex trajectory groups. The results are evaluated on twenty different trajectory clusters that prove the effectiveness of the proposed methods compared to similar research by four different types of attacks that are applicable in target tracking applications.
لیست مقالات
لیست مقالات بایگانی شده
طراحی و تحلیل یک حسگر پلاسمونیک ضریب شکست بر پایه فیبر بلور فتونی با هدف بهبود مشخصات فنی
علی یاوری - حسن کاتوزیان - سارا قلی نژاد شفق
Inexpensive fabrication of stretchable dry EEG electrodes using well known dry film photoresists
Mohammad Sadegh Rasekh - Amir Jahanshahi - Hassan Ghafoorifard
رمز نگاری داده های EEGبا کلید ترکیبی RSA-AESبرای بالا بردن امنیت و بهینه سازی مدت زمان رمزگذاری و رمز گشایی
حجت قیمت گر - پریسا قربانی
بررسی اثر پیرشدگی بر میدان الکتریکی و جریان نشتی در مقرههای پلیمری آلوده با شبیهسازی به روش اجزای محدود
محمد گودرزی - سید محمد شهرتاش - احمد غلامی
Three Improved Boost Topologies with Continuous Input/Output Currents Suitable for High-Voltage Applications
Hossein Gholizadeh - Hesam Ehsan - Alireza Poursalan - Mohammad Hamed Samimi
Fractional-Order Model Prediction Attitude Control For Unmanned Aerial Vehicles
Hossein Hassanzadeh Yaghini
Small Target Detection Using an Enhanced Optimization Based Filter and Trajectory Tracking Via Pattern Matching Algorithm
Seyedeh Mahsa Zakipour Bahambari - Saeed Khankalantary
BLSTM-Convolutional Neural Networks for Respiratory Disease Diagnosis
Mohammad Hassan Khamechian - Mohammad Reza Akbarzadeh Tootoonchi
Design of a plasmonic MIM filter based on ring resonator incorporating circular air holes
Sara Gholinezhad Shafagh - Hassan Kaatuzian - Mohammad Danaie
High-Precision Simple-Expandable Loser Take All (LTA) Circuit
Hossein Yaghoobzade Shadmehri - Ehsan Rahiminejad - Mohaddeseh Ghaeni
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.3