Data Detection in Wireless Sensor Network Based on Convex Hull and Naïve Bayes Algorithm

  • Chapter
  • First Online:
Role of Data-Intensive Distributed Computing Systems in Designing Data Solutions

Abstract

Wireless sensor networks (WSNs) have been affected by data due to their placement in random and risky atmospheres. Sensitive data in computer systems are increasing drastically and, thus, there is an utmost need to provide efficient cybersecurity. While detecting security bugs, software engineers discuss these bugs privately and they are not made public until security patches are available. This leads to many failures such as communication failure and hardware or software failure. This work aims to assist software developers in classifying bug reports in a better way by identifying security vulnerabilities as security bugs reports (SBRs) through the tuning of learners and data preprocessors. Practically, machine learning (ML) techniques are used to detect intrusions based on data and to learn by what means secure and nonsecure bugs can be differentiated. This work proposes a rudimentary classification model for bug prediction by involving Adaptive Ensemble Learning with Hyper Optimization (AEL-HO) technique. Classifier performance is analyzed based on the F1-score, detection accuracy (DA), Matthew’s correlation coefficients (MCC), and true positive rate (TPR) parameters. Comparisons are made among different already-existing classifiers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 137.14
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 137.14
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alenezi, M., Magel, K., & Banitaan, S. (2013). Efficient bug triaging using text mining. Journal of Software, 8(9), 2185–2190.

    Article  Google Scholar 

  2. Guo, S., Chen, R., Li, H., Zhang, T., & Liu, Y. (2019). Identify severity bug report with distribution imbalance by CR-SMOTE and ELM. International Journal of Software Engineering and Knowledge Engineering, 29(6), 139–175.

    Article  Google Scholar 

  3. **dal, R., Malhotra, R., & Jain, A. (2017). Prediction of defect severity by mining software project reports. International Journal of Systems Assurance Engineering and Management, 8, 334–351.

    Article  Google Scholar 

  4. Kamei, Y., Shihab, E., Adams, B., et al. (2013). A large-scale empirical study of just-in-time quality assurance. IEEE Transactions on Software Engineering, 39(6), 757–773.

    Article  Google Scholar 

  5. Kanwal, J., & Maqbool, O. (2012). Bug prioritization to facilitate bug report triage. Journal of Computer Science and Technology, 27(2), 397–412.

    Article  Google Scholar 

  6. Lamkanfi, S., Demeyer, E. G., & Goethals, B. (2010). Predicting the severity of a reported bug. In Mining Software Repositories (MSR) (pp. 1–10).

    Google Scholar 

  7. Li, H., Gao, G., Chen, R., Ge, X., & Guo, S. (2019). The influence ranking for testers in bug tracking systems. International Journal of Software Engineering and Knowledge Engineering, 29(1), 1–21.

    Article  Google Scholar 

  8. Sampathkumar, A., & Vivekanandan, P. (2018). Gene selection using multiple queen colonies in large scale machine learning. Journal of Electrical Engineering, 9(6), 97–111.

    Google Scholar 

  9. Singh, V. B., & Chaturvedi, K. K. (2011). Bug tracking and reliability assessment system. International Journal of Software Engineering and Its Applications, 5(4), 17–30.

    Google Scholar 

  10. Yang, X.-L., Lo, D., **a, X., Huang, Q., & Sun, J.-L. (2017). High-impact bug report identification with imbalanced learning strategies. Journal of Computer Science and Technology, 32(1), 181–198.

    Article  Google Scholar 

  11. Yu, H., Zhang, W. Y., & Li, H. (2019). Data-tolerant compensation control based on sliding mode technique of unmanned marine vehicles subject to unknown persistent ocean disturbances. International Journal of Control, Automation, and Systems, 18(9), 739–752.

    Google Scholar 

  12. Zhang, T., Chen, J., Yang, G., Lee, B., & Luo, X. (2016). Towards more accurate severity prediction and fixer recommendation of software bugs. Journal of Systems and Software, 117, 166–184.

    Article  Google Scholar 

  13. Alrosan, A., Alomoush, W., Norwawi, N., Alswaitti, M., & Makhadmeh, S. N. (2020). An improved artificial bee colony algorithm based on mean best-guided approach for continuous optimization problems and real brain MRI images segmentation. Neural Computing and Applications, 33(3), 1671–1697.

    Google Scholar 

  14. Elgamal, Z. M., Yasin, N. B. M., Tubishat, M., Alswaitti, M., & Mirjalili, S. (2020). An improved Harris hawks optimization algorithm with simulated annealing for feature selection in the medical field. IEEE Access, 8, 186638–186652.

    Article  Google Scholar 

  15. Tubishat, M., Alswaitti, M., Mirjalili, S., Al-Garadi, M. A., Alrashdan, M. T., et al. (2020). Dynamic butterfly optimization algorithm for feature selection. IEEE Access, 8, 194303–194314.

    Article  Google Scholar 

  16. Rohit, R., Kumar, S., & Mahmood, M. R. (2020). Color object detection based image retrieval using ROI segmentation with multi-feature method. Wireless Personal Communications, 112(1), 169–192.

    Article  Google Scholar 

  17. Sandeep, K., Jain, A., Shukla, A. P., Singh, S., Raja, R., Rani, S., Harshitha, G., AlZain, M. A., & Masud, M. (2021). A comparative analysis of machine learning algorithms for detection of organic and nonorganic cotton diseases. Mathematical Problems in Engineering, 2021. https://doi.org/10.1155/2021/1790171

  18. Naseem, U., Razzak, I., Khan, S. K., & Prasad, M. (2020). A comprehensive survey on word representation models: From classical to state-of-the-art word representation language models. ar**v preprint ar**v, 15036.

    Google Scholar 

  19. Vikram, K. K., & Narayana, V. L. (2016). Cross-layer Multi Channel MAC protocol for wireless sensor networks in 2.4-GHz ISM band. In IEEE conference on, computing, analytics and security trends (CAST-2016) on DEC 19–21, 2016 at Department of Computer Engineering & information technology. College of Engineering, Pune, Maharashtra. https://doi.org/10.1109/CAST.2016.7914986

    Chapter  Google Scholar 

  20. Tiwari, L., Raja, R., Awasthi, V., Rohit Miri, G. R., Sinha, M. H., & Alkinani, K. P. (2021). Detection of lung nodule and cancer using novel Mask-3 FCM and TWEDLNN algorithms, 108882. Measurement, 172. https://doi.org/10.1016/j.measurement.2020.108882, ISSN 0263-2241.

  21. Raja, R., Raja, H., Patra, R. K., Mehta, K., & Gupta, A. (2020). Assessment methods of cognitive ability of human brains for inborn intelligence potential using pattern recognition. In Biometric systems. IntechOpen. ISBN 978-1-78984-188-6.

    Google Scholar 

  22. Vikram, K., & Sahoo, S. K. (2017, December). Load Aware Channel estimation and channel scheduling for 2.4GHz frequency band wireless networks for smart grid applications. International Journal on Smart Sensing and Intelligent Systems, 10(4), 879–902. https://doi.org/10.21307/ijssis-2018-023

    Article  Google Scholar 

  23. Naseem, U., Khan, S. K., Farasat, M., & Ali, F. (2019). Abusive language detection: A comprehensive review. Indian Journal of Science Technology, 12(45), 1–13.

    Article  Google Scholar 

  24. Sharma, D. K., Singh, B., Regin, R., Steffi, R., & Chakravarthi, M. K. (2021). Efficient classification for neural machines interpretations based on mathematical models. In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 2015–2020). https://doi.org/10.1109/ICACCS51430.2021.9441718

    Chapter  Google Scholar 

  25. Arslan, F., Singh, B., Sharma, D. K., Regin, R., Steffi, R., & Suman Rajest, S. (2021). Optimization technique approach to resolve food sustainability problems. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 25–30). https://doi.org/10.1109/ICCIKE51210.2021.9410735

    Chapter  Google Scholar 

  26. Ogunmola, G. A., Singh, B., Sharma, D. K., Regin, R., Rajest, S. S., & Singh, N. (2021). Involvement of distance measure in assessing and resolving efficiency environmental obstacles. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 13–18). https://doi.org/10.1109/ICCIKE51210.2021.9410765

    Chapter  Google Scholar 

  27. Sharma, D. K., Singh, B., Raja, M., Regin, R., & Rajest, S. S. (2021). An efficient python approach for simulation of Poisson distribution. In 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 2011–2014). https://doi.org/10.1109/ICACCS51430.2021.9441895

    Chapter  Google Scholar 

  28. Sharma, D. K., Singh, B., Herman, E., Regine, R., Rajest, S. S., & Mishra, V. P. (2021). Maximum information measure policies in reinforcement learning with deep energy-based model. In 2021 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) (pp. 19–24). https://doi.org/10.1109/ICCIKE51210.2021.9410756

    Chapter  Google Scholar 

  29. Metwaly, A. F., Rashad, M. Z., Omara, F. A., & Megahed, A. A. (2014). Architecture of multicast centralized key management scheme using quantum key distribution and classical symmetric encryption. The European Physical Journal Special Topics, 223(8), 1711–1728.

    Article  Google Scholar 

  30. Farouk, A., Zakaria, M., Megahed, A., & Omara, F. A. (2015). A generalized architecture of quantum secure direct communication for N disjointed users with authentication. Scientific Reports, 5(1), 1–17.

    Article  Google Scholar 

  31. Naseri, M., Raji, M. A., Hantehzadeh, M. R., Farouk, A., Boochani, A., & Solaymani, S. (2015). A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation. Quantum Information Processing, 14(11), 4279–4295.

    Article  MATH  Google Scholar 

  32. Wang, M. M., Wang, W., Chen, J. G., & Farouk, A. (2015). Secret sharing of a known arbitrary quantum state with noisy environment. Quantum Information Processing, 14(11), 4211–4224.

    Article  MATH  Google Scholar 

  33. Zhou, N. R., Liang, X. R., Zhou, Z. H., & Farouk, A. (2016). Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. Security and Communication Networks, 9(11), 1398–1404.

    Article  Google Scholar 

  34. Supritha, R., Chakravarthi, M. K., & Ali, S. R. (2016). An embedded visually impaired reconfigurable author assistance system using LabVIEW. In Microelectronics, electromagnetics and telecommunications (pp. 429–435). Springer.

    Chapter  Google Scholar 

  35. Ganesh, D., Naveed, S. M. S., & Chakravarthi, M. K. (2016). Design and implementation of robust controllers for an intelligent incubation Pisciculture system. Indonesian Journal of Electrical Engineering and Computer Science, 1(1), 101–108.

    Article  Google Scholar 

  36. Chakravarthi, M. K., Gupta, K., Malik, J., & Venkatesan, N. (2015, December). Linearized PI controller for real-time delay dominant second order nonlinear systems. In 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) (pp. 236–240). IEEE.

    Chapter  Google Scholar 

  37. Yousaf, A., Umer, M., Sadiq, S., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021b). Emotion recognition by textual tweets classification using voting classifier (LR-SGD). IEEE Access, 9, 6286–6295. https://doi.org/10.1109/access.2020.3047831

    Article  Google Scholar 

  38. Sadiq, S., Umer, M., Ullah, S., Mirjalili, S., Rupapara, V., & Nappi, M. (2021). Discrepancy detection between actual user reviews and numeric ratings of Google App store using deep learning. Expert Systems with Applications, 181, 115111. https://doi.org/10.1016/j.eswa.2021.115111

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ramirez-Asis, E.H., Zapata, M.A.S., Sivakumaran, A.R., Phasinam, K., Chaturvedi, A., Regin, R. (2023). Data Detection in Wireless Sensor Network Based on Convex Hull and Naïve Bayes Algorithm. In: Pandey, S., Shanker, U., Saravanan, V., Ramalingam, R. (eds) Role of Data-Intensive Distributed Computing Systems in Designing Data Solutions. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-15542-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-15542-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-15541-3

  • Online ISBN: 978-3-031-15542-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation