0% Complete
صفحه اصلی
/
سی امین کنفرانس بین المللی مهندسی برق
Stable Target Tracking in Wireless Sensor Networks Under Malicious Cyber Attacks
نویسندگان :
Jafar Akhondali
1
Mohammad Taheri
2
1- دانشکده مهندسی برق و کامپیوتر/ دانشگاه شیراز
2- دانشکده مهندسی برق و کامپیوتر/ دانشگاه شیراز
کلمات کلیدی :
Wireless Sensor Networks, Security, Location Prediction, Trajectory Clustering
چکیده :
Due to the advance of hardware in recent years, Wireless Sensor Networks has attracted many research interests. Target tracking is an important application in Wireless Sensor Networks that like any other application, suffers from security issues. Previous studies relied on mathematical methods like Kalman Filter to detect attacks. In this paper, it has been tried to detect and adjust attacked target locations by a novel methodology. At first targets are tracked over time and then the similar trajectories are clustered into the same groups. Then for each group, a separate LSTM model is trained for prediction that tries to predict the next target location by learning previous target locations. Then for new targets, the attack is detected when the prediction location by the LSTM model has an abnormal distance from the new location of the target. In order to find a corresponding LSTM model for a new target in real-time, several methods have been proposed. As the known available datasets were not complex enough for our experiments, a tool has been developed to generate customized complex trajectory groups. The results are evaluated on twenty different trajectory clusters that prove the effectiveness of the proposed methods compared to similar research by four different types of attacks that are applicable in target tracking applications.
لیست مقالات
لیست مقالات بایگانی شده
A Technical-Managerial Framework for Determining Periodic Performance Indices and Operating Ranges of Power Grid Frequency
Hamed Delkhosh - Hossein Seifi - Sajjad Gholamnejad - Morteza Yousefian
GAN-Driven Image Generation for Metamaterial Absorbers Using Mean and Variance Encoding
Atefe Shahsavaripour - Mohammad Hossein Badiei - Leila Yousefi - Ahmad Kalhor
The Use of NSGA-2 for Optimal Placement and Management of Renewable Energy Sources When Considering Network Uncertainty and Fault Current Limiters
Ali Akbar Farahani - Seyed Hossein Hesamedin Sadeghi
Joint Fairness, Fragmentation, and Physical Layer Impairments Aware Routing, Spectrum and Modulation Level Allocation in Elastic Optical Networks
Hassan Khanahmadzadeh - Arash Rezaee - Lotfollah Beygi
Design and Implementation of a TEM Double-ridge Horn Antenna for Ultra-Wideband Applications
Seyed Navid Seyfossadat - Hassan Zakeri - Ahad Tavakoli - Gholamreza Moradi
تشخیص انتها به انتها حملات جعل بازپخش صدا به کمک شبکه CNN-ViT جهت بهبود تعمیم پذیری
حسین حجازی - محمد عسگری
Ultra-wideband RCS Reduction Using Checkerboard Configuration of Bed of Nails
Sadegh Sarjoughian - Mohsen Maddahali - Ahmad Bakhtafrouz
Real-Time Object Detection and Depth Estimation in Quadcopters through Intelligent Image Processing with YOLOv8
Amir Mahdavi - Mojtaba Mohsen Haghighi - Saeed Khankalantary
Vibration Analysis of a High-Speed Switched Reluctance Motor Considering Fast Demagnetization Voltage
Nasrin Majlesi - Amir Rashidi - Morteza Saghaian Nejad
Modeling of a low-noise amplifier with a recurrent neural network
Mostafa Noohi - Fatemeh Charoosaei - Ali Mirvakili - Sayed Alireza Sadrossadat
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.0.4