Enhanced SVM-Based Novel Detection of Intrusions for Wireless Sensor Networks (WSNS)
Keywords:
Wireless sensor network (WSN), intrusion detection (ID), DoS attacks, enhanced support vector machine (ESVM), chaotic levy grasshopper optimization (CLGO)Abstract
The use of wireless sensor networks (WSNs) is expanding rapidly due to the quick advancement of wireless sensor technology. WSNs have significant military significance as well as a wide range of potential commercial applications. However, it has significant security issues because of factors such as the lack of resources available for terminal equipment and the nature of the wireless communication environment. Wireless sensor networks (WSNs) are susceptible to a variety of assaults because of their dispersed architecture and limited resources, making intrusion detection for WSNs an essential part of network security. The purpose of intrusion detection systems (IDS) in WSNs is to detect and react to intrusion attempts and other harmful activity. It takes a long time to perform a conventional intrusion detection algorithm. As a result, we have developed a novel intrusion detection framework for the wireless sensor network to help prevent this issue. This paper's major contribution is the proposal of an enhanced support vector machine (ESVM)-based intrusion detection algorithm and the construction of an intrusion detection system (IDS) for WSN's DoS attacks. Additionally, the suggested method's performance is enhanced by chaotic levy grasshopper optimization (CLGO). From the perspectives of detection rate, packet delivery rate, transmission delay, and energy consumption analysis, the proposed IDS can significantly improve network performance by identifying and removing malicious nodes in the network. It has the features of a simple structure, a short computation time, and a high detection rate.
Downloads
References
Shakya, S., 2021. Modified gray wolf feature selection and machine learning classification for wireless sensor network intrusion detection. IRO Journal on Sustainable Wireless Systems, 3(2), pp.118-127.
Safaei, M., Ismail, A.S., Chizari, H., Driss, M., Boulila, W., Asadi, S. and Safaei, M., 2020. Standalone noise and anomaly detection in wireless sensor networks: a novel time‐series and adaptive Bayesian‐network‐based approach. Software: Practice and Experience, 50(4), pp.428-446.
Singh, A., Amutha, J., Nagar, J., Sharma, S. and Lee, C.C., 2022. AutoML-ID: Automated machine learning model for intrusion detection using a wireless sensor network. Scientific Reports, 12(1), p.9074.
Safaldin, M., Otair, M. and Abualigah, L., 2021. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of ambient intelligence and humanized computing, 12, pp.1559-1576.
Alqahtani, M., Gumaei, A., Mathkour, H. and Maher Ben Ismail, M., 2019. A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors, 19(20), p.4383.
Singh, N., Virmani, D. and Gao, X.Z., 2020. A fuzzy logic-based method to avert intrusions in wireless sensor networks using WSN-DS dataset. International Journal of Computational Intelligence and Applications, 19(03), p.2050018.
Maheswari, M. and Karthika, R.A., 2021. A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Personal Communications, 118, pp.1535-1557.
Jhade, S. ., Kumar, V. S. ., Kuntavai, T. ., Shekhar Pandey, P. ., Sundaram, A. ., & Parasa, G. . (2023). An Energy Efficient and Cost Reduction based Hybridization Scheme for Mobile Ad-hoc Networks (MANET) over the Internet of Things (IoT). International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 157–166. https://doi.org/10.17762/ijritcc.v11i2s.6038
Mohd, N., Singh, A. and Bhadauria, H.S., 2020. A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks. Wireless Personal Communications, 111(3), pp.1999-2022.
Jeyaselvi, M., Sathya, M., Suchitra, S., Jafar Ali Ibrahim, S. and Kalyan Chakravarthy, N.S., 2022. SVM-Based Cloning and Jamming Attack Detection in IoT Sensor Networks. In Advances in Information Communication Technology and Computing: Proceedings of AICTC 2021 (pp. 461-471). Singapore: Springer Nature Singapore.
Singh, A., Nagar, J., Sharma, S. and Kotiyal, V., 2021. A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems with Applications, 172, p.114603.
Mahamuni, C.V. and Jalauddin, Z.M., 2021, December. Intrusion monitoring in military surveillance applications using wireless sensor networks (WSNs) with deep learning for multiple object detection and tracking. In 2021 International Conference on Control, Automation, Power and Signal Processing (CAPS) (pp. 1-6). IEEE.
Zhang, W., Han, D., Li, K.C. and Massetto, F.I., 2020. Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, pp.12361-12374.
Sharma, M. K. (2021). An Automated Ensemble-Based Classification Model for The Early Diagnosis of The Cancer Using a Machine Learning Approach. Machine Learning Applications in Engineering Education and Management, 1(1), 01–06. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/1
Jiang, S., Zhao, J. and Xu, X., 2020. SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, pp.169548-169558.
O'Mahony, G.D., Curran, J.T., Harris, P.J. and Murphy, C.C., 2020. Interference and intrusion in wireless sensor networks. IEEE Aerospace and Electronic Systems Magazine, 35(2), pp.4-16.
Singh, A., Amutha, J., Nagar, J., Sharma, S. and Lee, C.C., 2022. Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(3), p.1070.
Jianjian, D., Yang, T. and Feiyue, Y., 2018. A novel intrusion detection system based on IABRBFSVM for wireless sensor networks. Procedia computer science, 131, pp.1113-112.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.