{"id":"https://openalex.org/W6963584903","doi":"https://doi.org/10.21227/ba0m-cy61","title":"SensorNetGuard: A Dataset for Identifying Malicious Sensor Nodes","display_name":"SensorNetGuard: A Dataset for Identifying Malicious Sensor Nodes","publication_year":2023,"publication_date":"2023-09-05","ids":{"openalex":"https://openalex.org/W6963584903","doi":"https://doi.org/10.21227/ba0m-cy61"},"language":"en","primary_location":{"id":"doi:10.21227/ba0m-cy61","is_oa":true,"landing_page_url":"https://doi.org/10.21227/ba0m-cy61","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"type":"dataset","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.21227/ba0m-cy61","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"K M, Dr Karthick Raghunath","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"K M, Dr Karthick Raghunath","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"K S, Dr Arvind","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"K S, Dr Arvind","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7609000205993652},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.598800003528595},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5358999967575073},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.47690001130104065},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4462999999523163},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.41200000047683716},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.38760000467300415},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.3741999864578247}],"concepts":[{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7609000205993652},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7465999722480774},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6863999962806702},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.598800003528595},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5358999967575073},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4796999990940094},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.47690001130104065},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4462999999523163},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.41200000047683716},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.38760000467300415},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.3741999864578247},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.35260000824928284},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.3296999931335449},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.31839999556541443},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2919999957084656},{"id":"https://openalex.org/C2781345722","wikidata":"https://www.wikidata.org/wiki/Q5308388","display_name":"Drop (telecommunication)","level":2,"score":0.28040000796318054},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.2639000117778778},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C2779190172","wikidata":"https://www.wikidata.org/wiki/Q4913888","display_name":"Binary data","level":3,"score":0.25429999828338623},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.21227/ba0m-cy61","is_oa":true,"landing_page_url":"https://doi.org/10.21227/ba0m-cy61","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"dataset"}],"best_oa_location":{"id":"doi:10.21227/ba0m-cy61","is_oa":true,"landing_page_url":"https://doi.org/10.21227/ba0m-cy61","pdf_url":null,"source":{"id":"https://openalex.org/S7407051695","display_name":"IEEE DataPort","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"dataset"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.9190865755081177,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,40,46,68,78,88,96,142,153,163,175,203,213,223,309],"dataset,":[1,370],"titled":[2],"\"SensorNetGuard:":[3],"A":[4,236],"Dataset":[5],"for":[6,43,171,257,287,317,397],"Identifying":[7],"Malicious":[8],"Sensor":[9],"Nodes,\"":[10],"comprises":[11],"10,000":[12],"samples":[13],"with":[14,165,177],"21":[15],"features.":[16],"It":[17],"is":[18,54,169,246],"designed":[19],"to":[20,105,182,234,264,328,336,340,384],"facilitate":[21],"the":[22,63,118,122,127,130,138,146,220,244,258,314,348,390],"identification":[23],"of":[24,62,70,98,121,129,151,155,205,215,225,253,260,268,290,351],"malicious":[25,337,343,388,411],"sensor":[26,36,352,412],"nodes":[27,156,344],"in":[28,107,115,137,355,378],"a":[29,52,108,167,179,190,198,250,366,394],"network":[30,371,407],"environment,":[31],"specifically":[32],"focusing":[33],"on":[34,306,368],"IoT-based":[35],"networks.General":[37],"Metrics\u00a7&nbsp;&nbsp;Node":[38],"ID:":[39],"unique":[41],"identifier":[42],"each":[44],"node.\u00a7&nbsp;&nbsp;Timestamp:":[45],"time":[47,110],"at":[48,80,90,144,405],"which":[49,81,91,145,166,178],"data":[50,99,230],"or":[51,56,240,331,386],"packet":[53],"sent":[55],"received.\u00a7&nbsp;&nbsp;IP":[57],"Address:":[58],"Internet":[59],"Protocol":[60],"address":[61],"node.Network":[64],"Traffic":[65],"Metrics\u00a7&nbsp;&nbsp;Packet":[66],"Rate:":[67,77,87,141,202],"number":[69,204],"packets":[71,82,92,207],"sent/received":[72],"per":[73,208],"unit":[74,209],"time.\u00a7&nbsp;&nbsp;Packet":[75],"Drop":[76],"rate":[79,89,143],"are":[83,93,297],"being":[84,217,227],"dropped.\u00a7&nbsp;&nbsp;Packet":[85],"Duplication":[86],"duplicated.\u00a7&nbsp;&nbsp;Data":[94],"Throughput:":[95],"amount":[97,224],"successfully":[100],"transferred":[101],"from":[102],"one":[103],"point":[104],"another":[106],"given":[109],"frame.Signal":[111],"Metrics\u00a7&nbsp;&nbsp;Signal":[112],"Strength:":[113],"Measured":[114],"dBm,":[116],"indicates":[117],"power":[119,136],"level":[120],"signal.\u00a7&nbsp;&nbsp;Signal-to-Noise":[123],"Ratio":[124],"(SNR):":[125],"Measures":[126],"clarity":[128],"signal.Power":[131],"Usage":[132],"Metrics\u00a7&nbsp;&nbsp;Battery":[133],"Level:":[134],"Remaining":[135],"node.\u00a7&nbsp;&nbsp;Energy":[139],"Consumption":[140],"node":[147,168,180,191,199,245],"consumes":[148],"energy.Routing":[149],"Metrics\u00a7&nbsp;&nbsp;Number":[150],"Neighbors:":[152],"count":[154],"within":[157],"direct":[158],"communication":[159],"range.\u00a7&nbsp;&nbsp;Route":[160],"Request":[161],"Frequency:":[162,174,187,195],"frequency":[164,176],"asking":[170],"routes.\u00a7&nbsp;&nbsp;Route":[172],"Reply":[173],"responds":[181],"route":[183],"requests.Behavioral":[184],"Metrics\u00a7&nbsp;&nbsp;Data":[185],"Transmission":[186],"How":[188,196],"often":[189,197],"sends":[192],"data.\u00a7&nbsp;&nbsp;Data":[193],"Reception":[194],"receives":[200],"data.\u00a7&nbsp;&nbsp;Error":[201],"erroneous":[206],"time.Miscellaneous":[210],"Metrics\u00a7&nbsp;&nbsp;CPU":[211],"Usage:":[212,222],"percentage":[214],"CPU":[216],"used":[218,327],"by":[219,409],"node.\u00a7&nbsp;&nbsp;Memory":[221],"RAM":[226],"used.\u00a7&nbsp;&nbsp;Bandwidth:":[228],"Available":[229],"transmission":[231],"rate.Metrics":[232],"Specific":[233],"Attacks\u00a7&nbsp;&nbsp;Is_Malicious:":[235],"binary":[237],"flag":[238],"(0":[239],"1)":[241],"indicating":[242],"whether":[243],"malicious.The":[247],"dataset":[248,391],"includes":[249],"diverse":[251],"range":[252],"features":[254,282],"that":[255,333],"allow":[256],"application":[259],"machine":[261,300,401],"learning":[262,301,318,402],"models":[263,403],"identify":[265,329,342,374],"various":[266],"types":[267,289],"attacks,":[269,277,291],"such":[270,359],"as":[271,313,393],"black":[272],"hole,":[273,275],"gray":[274],"flooding":[276],"and":[278,295,399],"Sybil":[279],"attacks.":[280],"Some":[281],"may":[283,334],"be":[284,304,326],"more":[285],"relevant":[286],"specific":[288],"so":[292],"feature":[293],"engineering":[294],"selection":[296],"crucial":[298],"steps.&nbsp;Various":[299],"algorithms":[302,324],"can":[303,325,345,361,373],"trained":[305],"this":[307,369],"dataset.":[308],"\"Is_Malicious\"":[310],"column":[311],"serves":[312,392],"ground":[315],"truth":[316],"algorithm.&nbsp;For":[319],"unsupervised":[320],"learning,":[321],"anomaly":[322],"detection":[323],"outliers":[330],"anomalies":[332],"correspond":[335],"activities.Being":[338],"able":[339],"accurately":[341],"significantly":[346],"improve":[347],"security":[349,376,408],"posture":[350],"networks,":[353],"particularly":[354],"IoT":[356],"environments":[357],"where":[358],"attacks":[360],"have":[362],"severe":[363],"consequences.By":[364],"training":[365],"model":[367],"administrators":[372],"potential":[375],"threats":[377],"real-time,":[379],"thus":[380],"enabling":[381],"proactive":[382],"measures":[383],"isolate":[385],"remove":[387],"nodes.Ultimately,":[389],"comprehensive":[395],"resource":[396],"developing":[398],"validating":[400],"aimed":[404],"enhancing":[406],"identifying":[410],"nodes.":[413]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
