Skip to main content
Log in

RETRACTED ARTICLE: Network traffic detection for peer-to-peer traffic matrices on bayesian network in WSN

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 06 June 2022

This article has been updated

Abstract

With the wide application of wireless sensor networks, network security has been a terrible problem when it provides many more services and applications. Rapid usage of internet and connectivity demands a network anomaly system combating cynical network attacks. Meanwhile, it is a common approach for acquiring, which can be used by network operators to carry out network management and configuration. Moreover, a great number of evaluations have been proposed to simulate and analyse the Wireless Sensor Network traffic, it is still a remarkable challenge since, and network traffic characterization has been tremendously changed, in particular, for a sensor computing network. Bayesian Based Network Traffic Prediction (BNTP) is proposed to solve the deep learning of statistical features of network traffic flow so that all the packets were sent to the receiver properly without any traffic density. Bayesian network-based peer-to-peer network traffic design is proposed to determine the spatial structure of traffic flow. PVM fault localization feature is proposed to remove the accuracy measure issues and performance problems. The co-existence mechanism is used to minimize the inference and overlap problem in wireless network devices. This paper avoids the conflicts in traffic analysis and statistical features of the network. The performance of the network is increased to 80% when compared to the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Change history

References

  • Arafah M, Alhindi H, Mathkour H, Faisal M, Lytras MD (2018) Smart systems approach for development of explicit congestion marking and traffic engineering model for Diffserv/MPLS networks. J Ambient Intell Hum Comput pp 1–11

  • Bai Y, Du Z, Zhang C, Zhao X (2019) Sentinel surveillance of traffic conditions with multilayer network. J Ambient Intell Hum Comput 10(8):3123–3131

    Article  Google Scholar 

  • Bao F, Chen C, Cho M (2011) Trust-based intrusion detection in wireless sensor networks. In: Proceedings of the 2011 IEEE international conference on communications (ICC), pp 1–6

  • Biswas S, Morris R (2004) Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput Commun Rev 34(1):69–74

    Article  Google Scholar 

  • Bouchaala L, Masmoudi A, Gargouri F (2010) Improving algorithms for structure learning in Bayesian networks using a new implicit score. Expert Syst Appl 37(7):5470–5475

    Article  Google Scholar 

  • Cao XM, Han ZJ, Chen GH (2007) Dos attack detection scheme for sensor networks based on traffic prediction. Chin J Comput 30:1798–1805 (In Chinese)

    MathSciNet  Google Scholar 

  • Chen, Wu H, Hu H, Gao J (2008) Event-based trust framework model in wireless sensor networks. In: Proceedings of the international conference on networking, architecture, and storage (NAS), pp 359–364

  • Fan Y, Shelton CR (2008) Sampling for approximate inference in continuous time Bayesian networks. In: Tenth international symposium on artificial intelligence and mathematics, pp 1–8

  • Fonseca C, Ferreira H (2012) Stability and contagion measures for spatial extreme value analyses. arXiv:1206.1228

  • Guo J, Marshall A, Zhou B (2011) A new trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks. In: Proceedings of the 10th IEEE international conference on trust, security and privacy in computing and communications (Trust Com), pp 142–149

  • Heckerman GD, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20:197–243

    MATH  Google Scholar 

  • Hooper E (2006) Experimental validation and analysis of an intelligent detection and response strategy to false positives and network attacks. In: Mehrotra S, Zeng DD, Chen H, Thuraisingham B, Wang FY (eds) Intelligence and security informatics. ISI 2006. Lecture notes in computer science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_101

  • Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: ICMLA, pp 168–174

  • Hu M, Chun Y, Perr A (2005) Ariadne: a secure on-dem for ad hoc networks I. Journal, 11

  • Jiang D, Yuan Z, Zhang P (2015) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tools Appl

  • Jongsawat N, Decharoenchitpong J (2015) Creating behavior-based rules for snort based on Bayesian network learning algorithms. In: The international conference on science and technology (TICST), pp 267–70

  • Kottas WZ, Rodrguez A (2012) Spatial modeling for risk assessment of extreme values from environmental time series: a Bayesian nonparametric approach. Environmetrics 23(8):649–662

    Article  MathSciNet  Google Scholar 

  • Lakhina A, Crovella M, Diot C (2005) Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput Commun Rev 35(4):217–228

    Article  Google Scholar 

  • Li D, Hu YH (2003) Energy-based collaborative source localization using acoustic microsensor array. EURASIP J Appl Signal Process 4:321–337

    MATH  Google Scholar 

  • Meng Y, Kwok LF, Li W (2012) Towards designing packet filter with a trust-based approach using bayesian inference in network intrusion detection. In: Proceedings of the 8th international conference on security and privacy in communication networks (SECURECOMM), Lecture Notes in ICST, Springer, New York, pp 203–221

  • Niu R, Varshney PK (2006) Target location estimation in sensor networks with quantized data. IEEE Trans Signal Process 54(12):4519–4528

    Article  Google Scholar 

  • Nor AK, Quan B, Adnan A-A (2019) Adaptive trust-based routing protocol for large scale WSNs. IEEE Access 7:143539–143549

    Article  Google Scholar 

  • Onat A, Miri A (2005) An intrusion detection system for wireless sensor networks. In: Proceeding of the IEEE international conference on wireless and mobile computing, networking and communications, vol. 3, Montreal, Canada, pp 253–259

  • Pearl JF (1986) Propagation and structuring in belief networks. Artif Intell 29:241–288

    Article  MathSciNet  Google Scholar 

  • Polverini M, Iacovazzi A, Cianfrani A, (2015) Traffic Matrix Estimation Enhanced by SDNs Nodes in Real Network Topology. Proceedings of 2015 I.E. Conference on Computer Communications Workshops

  • Rajasegarar S, Zhang P, Zhou Y, Karunasekera S, Leckie C, Palaniswami M (2014) High-resolution Spatio-temporal monitoring of air pollutants using wireless sensor networks. In: Proceedings of IEEE 9th International conference on intelligent sensors, sensor network information process (ISSNIP), pp 1–6

  • Sanzgiri K, Dahill BR (2002) A secure ro hoc networks. In: Proceedings of on network protocols, pp 78–87

  • Soule A, Lakhina A, Taft N (2005) Traffic matrices: balancing measurements, inference, and modeling. Proceed Sigmetrics 2005:362–373

    Article  Google Scholar 

  • Stoleru R, Stankovic JA (2015) Probability grid: a location estimation scheme for wireless sensor network. In: Conference of IEEE sensor and ad hoc communications and networks, pp 430–438

  • Sun B, Osborne L, Xiao Y, Guizani S (2007) Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wirel Commun 10:56–63

    Article  Google Scholar 

  • Thesiya K, Viraj D (2015) Novel clustering approach to reduce energy consumption in wireless sensor network based on LEACH. Int J Comput Sci Mob Comput (IJCSMC) 4(6)

  • Waltenegus D (2019) A quantitative measure of reliability for wireless sensor networks. IEEE Sens Lett 3:8

  • Xu K, Zhang ZL, Bhattacharyya S (2005) Profiling internet backbone traffic: behavior models and applications. ACM SIGCOMM Comput Commun Rev 35(4):169–180

    Article  Google Scholar 

  • Zaineb TA-A, Ahmed LQ, Taisir E-G, Jaafar MHE (2019) Energy efficient IoT virtualization framework with peer to peer networking and processing. IEEE Access

  • Zhihua C, Fei X, Shiqiang Z, Xingjuan C, Yang C, Wensheng Z, Jinjun C (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Geepthi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04079-2

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Geepthi, D., Columbus, C.C. RETRACTED ARTICLE: Network traffic detection for peer-to-peer traffic matrices on bayesian network in WSN. J Ambient Intell Human Comput 12, 6975–6986 (2021). https://doi.org/10.1007/s12652-020-02355-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02355-7

Keywords

Navigation