A Novel Artificial Fish Integrated Particle Swarm Optimization (AFIPSO) and Random Artificial Neural Network Combined Gradient Descent (RANN-GD) Algorithm for WSN Security

Authors

  • S. Ramani Sreenidhi Institute of Science & Technology, Hyderabad-501301, Telangana
  • S.P.V. Subba Rao Sreenidhi Institute of Science & Technology, Hyderabad-501301, Telangana
  • Sahukar Latha Sreenidhi Institute of Science and Technology, Hyderabad-501301, Telangana
  • L.V.R.Chaitanya Prasad Sreenidhi Institute of Science and Technology, Hyderabad-501301, Telangana

Keywords:

Wireless Sensor Network (WSN), Artificial Fish Integrated Particle Swarm Optimization (AFIPSO), Intrusion Detection System (IDS), Random Artificial Neural Network Integrated Gradient Descent (RANN-GD), Security, Classification

Abstract

Intrusion detection and classification is one of the most essential and challenging process in the Wireless Sensor Network (WSN). Typically, the wireless networks are highly susceptible to different types of network attacks, because which reduces the lifetime of entire network by interrupting the data transmission and communication operations. Hence, the conventional works intends to develop an efficient Intrusion Detection System (IDS) frameworks by using the optimization and classification methodologies. Still, it facing the problems of high complexity in operations, more time for data training, high error rate, and inefficient detection. So, this research work objects to develop an intelligent and advanced IDS framework by implementing the novel optimization based classification methodologies. For this purpose, a hybrid Artificial Fish Integrated Particle Swarm Optimization (AFIPSO) mechanism is deployed to optimally select the features for training the data models of classifier. Consequently, the Random Artificial Neural Network Integrated Gradient Descent (RANN-GD) is implemented for accurately spotting the intrusions from the given IDS datasets based on the optimal number of features. For testing and validation, three different and emergent IDS datasets such as NSL-KDD, UNSW-NB 15 and WSN-DS have been utilized in this work. During evaluation, the performance of both existing and proposed techniques are validated and compared by using various performance measures.

Downloads

Download data is not yet available.

References

Liu, G., Zhao, H., Fan, F., Liu, G., Xu, Q., & Nazir, S. (2022). An enhanced intrusion detection model based on improved kNN in WSNs. Sensors, 22(4), 1407. https://doi.org/10.3390/s22041407

Maheswari, M., & Karthika, R. A. (2021). A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Personal Communications, 118(2), 1535–1557. https://doi.org/10.1007/s11277-021-08101-2

Roy, R., and D. A. . Kalotra. “Vehicle Tracking System Using Technological Support for Effective Management in Public Transportation”. International Journal on Recent and Innovation Trends in Computing and Communication, vol. 10, no. 2, Mar. 2022, pp. 11-20, doi:10.17762/ijritcc.v10i2.5515.

Singh, A., Amutha, J., Nagar, J., Sharma, S., & Lee, C. C. (2022). LT-FS-ID: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(3), 1070. https://doi.org/10.3390/s22031070

Wen, W., Shang, C., Dong, Z., Keh, H. C., & Roy, D. S. (2021). An intrusion detection model using improved convolutional deep belief networks for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 36(1), 20–31. https://doi.org/ 10.1504/IJAHUC.2021.112980

Jin, J. (2021). Intrusion detection algorithm and simulation of wireless sensor network under Internet environment. Journal of Sensors, 2021, 1–10. https://doi.org/10.1155/2021/9089370

Rui-Hong, D., Hou-hua, Y., Qiu-yu, Z., & Xue-yong, L. (2020). Distributed WSN intrusion detection model based on deep forest algorithm. Journal of Lanzhou University of Technology, 46(4), 103.

Chawla, A. (2022). Phishing website analysis and detection using Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 10(1), 10–16. https://doi.org/10.18201/ijisae.2022.262

Singh, V., Poonia, R. C., Raja, L., Sharma, G., Trivedi, N. K., & Mathur, G. N. (2020). Redundancy management and host intrusion detection in WSN. Advances in Wireless Technologies and Telecommunication. IGI Global, 153–167. https://doi.org/10.4018 /978-1-5225-9554-0.ch006

Almomani, I., & Alromi, A. (2020). Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors, 20(5), 1375. https://doi.org/ 10.3390/s20051375

Punithavathi, R., Thanga Selvi, R., Latha, R., Kadiravan, G., Srikanth, V., & Kumar Shukla, N. (2022). Robust node localization with intrusion detection for wireless sensor networks. Intelligent Automation and Soft Computing, 33(1), 143–156. https://doi.org/10.32604/iasc.2022.023344

Lu, X., Han, D., Duan, L., & Tian, Q. (2020). Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network. International Journal of Computational Science and Engineering, 22(2/3), 221–232. https://doi.org/10.1504/IJCSE. 2020. 107344

Yadav, A., & Kumar, A. (2022). Intrusion detection and prevention using RNN in WSN. Lecture Notes in Networks and Systems. Springer, 531–539. https://doi.org/10.1007/978-981-16-6723-7_40

Belavagi, M. C., & Muniyal, B. (2021). Improved intrusion detection system using quantal response equilibrium-based game model and rule-based classification. International Journal of Communication Networks and Information Security, 13(1), 1–8.

Elsaid, S. A., & Albatati, N. S. (2020). An optimized collaborative intrusion detection system for wireless sensor networks. Soft Computing, 24(16), 12553–12567. https://doi.org/10.1007/s00500-020-04695-0

Narasimhan, H., R, V., & Mohammad, N. (2021). Unsupervised deep learning approach for in-vehicle intrusion detection system. IEEE Consumer Electronics Magazine, 1–1. https://doi.org/10.1109/MCE. 2021.3116923

Agarwal, D. A. . (2022). Advancing Privacy and Security of Internet of Things to Find Integrated Solutions. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 05–08. https://doi.org/10.17762/ijfrcsce.v8i2.2067

Kagade, R. B., & Jayagopalan, S. (2022). Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation. International Journal of Network Management, e2196. https://doi.org/10.1002/nem.2196

Kavousi-Fard, A., Su, W., & Jin, T. (2020). A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Transactions on Industrial Informatics, 17(1), 650–658. https://doi.org/10.1109/TII.2020.2964704

Ahmad, B., Jian, W., Ali, Z. A., Tanvir, S., & Khan, M. S. A. (2019). Hybrid anomaly detection by using clustering for wireless sensor network. Wireless Personal Communications, 106(4), 1841–1853. https://doi.org/10.1007/s11277-018-5721-6

Baig, Z. A., Sanguanpong, S., Firdous, S. N., Vo, V. N., Nguyen, T. G., & So-In, C. (2020). Averaged dependence estimators for DoS attack detection in IoT networks. Future Generation Computer Systems, 102, 198–209. https://doi.org/10.1016/j.future.2019.08.007

Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895. https://doi.org/10.1049/iet-com.2019.0172

Ahmed Cherif Megri, Sameer Hamoush, Ismail Zayd Megri, Yao Yu. (2021). Advanced Manufacturing Online STEM Education Pipeline for Early-College and High School Students. Journal of Online Engineering Education, 12(2), 01–06. Retrieved from http://onlineengineeringeducation.com/index.php/joee/article/view/47

Premkumar, M., & Sundararajan, T. V. P. (2020). DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocessors and Microsystems, 79, 103278. https://doi.org/10.1016/j.micpro.2020.103278

Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., & Li, L. (2019). Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sensors, 19(1), 203. https://doi.org/10.3390/s19010203

Lima Filho, F. S. d., Silveira, F. A. F., de Medeiros Brito Junior, A., Vargas-Solar, G., & Silveira, L. F. (2019). Smart detection: An online approach for DoS/DDoS attack detection using machine learning. Security and Communication Networks, 2019, 1–15. https://doi.org/10.1155/2019/1574749

Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68–71. https://doi.org/10.1109/LNET.2019. 2901792

Wazid, M., Reshma Dsouza, P., Das, A. K., Bhat K, V., Kumar, N., & Rodrigues, J. J. P. C. (2019) RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. International Journal of Communication Systems, 32(15), e4024. https://doi.org/10.1002/dac.4024

Hongsong, C., Caixia, M., Zhongchuan, F., & Lee, C.-H. (2020). Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network. IET Information Security, 14(4), 452–458. https://doi.org/10.1049/iet-ifs.2018.5512

Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114(1), 329–345. https://doi.org/10.1007/ s11277-020-07365-4

Jiang, S., Zhao, J., & Xu, X. (2020). SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, 169548–169558. https://doi.org/10.1109/ACCESS. 2020.3024219

Liu, J., Kantarci, B., & Adams, C. Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset pp. 25–30.

Kumar, V., Sinha, D., Das, A. K., Pandey, S. C., & Goswami, R. T. (2020). An integrated rule based intrusion detection system: Analysis on UNSW-NB15 data set and the real time online dataset. Cluster Computing, 23(2), 1397–1418. https://doi.org/10.1007/s10586-019-03008-x

Rezvi, M. A., Moontaha, S., Trisha, K. A., Cynthia, S. T., & Ripon, S. (2021). ‘Data mining approach to analyzing intrusion detection of wireless sensor network,’ Indonesian J. Electric. Eng. Computer Science, 21(1), 516–523.

Gopalakrishnan, S., & Kumar, P. M. (2016). Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits and Systems, 07(6), 748–758. https://doi.org/ 10.4236/cs.2016.76064

Subburayalu, G., Duraivelu, H., Raveendran, A. P., Arunachalam, R., Kongara, D., & Thangavel, C. (2021). Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. Journal of Applied Security Research, 1–19. https://doi.org/10.1080/19361610.2021. 2002118

General structure of WSN

Downloads

Published

16.12.2022

How to Cite

Ramani, S., Rao, S. S. ., Latha, S. ., & Prasad, L. . (2022). A Novel Artificial Fish Integrated Particle Swarm Optimization (AFIPSO) and Random Artificial Neural Network Combined Gradient Descent (RANN-GD) Algorithm for WSN Security. International Journal of Intelligent Systems and Applications in Engineering, 10(4), 07–15. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2190

Issue

Section

Research Article

Most read articles by the same author(s)