WSN Attack Detection Using Attentive Dual Residual Generative Adversarial Networks

Authors

  • Sivanesan N. Research Scholar, Department of Computer Science and Engineering, Vels Institute of Science, Technology & Advance Studies (VISTAS), Chennai, India
  • Rajesh A. Professor, Department of Computer Science and Engineering, Vels Institute of Science, Technology & Advance Studies (VISTAS), Chennai, India
  • K. S. Archana Assistant Professor, Department of Data Science and Business Systems, SRM Institute of Science and Technology, Kattakulathur, Chengalpattu, District- 603203, India.

Keywords:

Adaptive distorted Gaussian matched filter, Attentive Dual Residual Generative Adversarial Networks, Ladybug Beetle Optimization, Wireless Sensor Network

Abstract

Wireless sensor networks (WSN) play an important role in different industries because of lack infrastructure but remain vulnerable to numerous attacks. Denial-of-Service (Dos) attacks are the main attack that scares WSN. If a DoS attacks targets a company, it could lower that company's perceived value in the market. To minimize these issues this research article presents an approach of a WSN Attack detection using Attentive Dual Residual Generative Adversarial Networks (WSN-AD-ADRGAN) technique. Initially, input data is collected from WSN-DS. Afterward the data are fed to preprocessing. The pre processing segment removes noise and  redundant data by utilizing Adaptive distorted Gaussian matched filter (ADGMF)and the preprocessed output fed to Attentive Dual Residual Generative Adversarial Networks (ADRGAN) method that classifies the WSN attacks into Black hole attack, Grey hole attack, Flooding attack, Timing attack ,normal. Attentive Dual Residual Generative Adversarial Network classifier, in general, does not describe modifying optimization techniques to identify optimum parameters to enable accurate WSN attack classification. Therefore, it is proposed to use Ladybug Beetle Optimization Algorithm (LBOA) to optimize Attentive Dual Residual Generative Adversarial Network, which accurately classifies WSN attacks. The proposed WSN-AD-ADRGAN technique is implemented in python utilizing WSN-DS dataset. The suggested method's performance is examined using performance metrics like precision, recall, accuracy, F1-score, specificity, ROC, computing time. The proposed AIPE-DBO-LDC-CXR method attains higher accuracy 16.65%, 18.85% and 16.45%; greater sensitivity 16.34%, 12.23%, and 19.12%; greater specificity 14.89%, 16.89% and 20.67% and  82.37%, 87.76% and 78.78% lower computational time analyzed to the existing methods like intrusion identification system in WSN utilizing conditional generative adversarial network (IDS-WSN-CGAN),Service attack improvement in wireless sensor network under machine learning (SAI-WSN-ML),Machine learning based identification,  EC-BRTT technique based DoS attacks prevention in wireless sensor networks (ML-DDoS-WSN) respectively.

Downloads

Download data is not yet available.

References

K. Cheena, T. Amgoth, and G. Shankar, 2023. Deep Learning-Based Black Hole Detection Model for WSN in Smart Grid. In Computational Intelligence: Select Proceedings of InCITe 2022 (pp. 19-30). Singapore: Springer Nature Singapore.

S. Karthic, and SM. Kumar, 2023. Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Processing Letters, 55(1), pp.459-479.

SE. Quincozes, JF. Kazienko, and VE. Quincozes, 2023. An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks. Internet of Things, 22, p.100684.

S. Rajasoundaran, AV. Prabu, S. Routray, PP. Malla, GS. Kumar, A. Mukherjee. and Y. Qi, 2022. Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Computer Communications, 187, pp.71-82.

M. Dener, C. Okur, S. Al. and A. Orman, 2023. WSN-BFSF: A New Dataset for Attacks Detection in Wireless Sensor Networks. IEEE Internet of Things Journal.

NM. Saravana Kumar, E. Suryaprabha, K. Hariprasath. and V. Vijayakumar, 2023. Deep Learning Based Hybrid Security Model in Wireless Sensor Network. Wireless Personal Communications, 129(3), pp.1789-1805.

T. Sood, S. Prakash, S. Sharma, A. Singh, and H. Choubey, 2022. Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Personal Communications, 126(1), pp.911-931.

D. Yu, J. Kang, and J. Dong, 2021. Service attack improvement in wireless sensor network based on machine learning. Microprocessors and Microsystems, 80, p.103637.

K. Lakshmi Narayanan, R. Santhana Krishnan, E. Golden Julie, Y. Harold Robinson, and V. Shanmuganathan, 2021. Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks. Wireless Personal Communications, pp.1-25.

A. Kavousi-Fard, W. Su and T. Jin, 2020. A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Transactions on Industrial Informatics, 17(1), pp.650-658.

S. Rabhi, T. Abbes, and F. Zarai, 2023. IoT routing attacks detection using machine learning algorithms. Wireless Personal Communications, 128(3), pp.1839-1857.

M. Kurtkoti, BS. Premananda, and K. Vishwavardhan Reddy, 2022. Performance analysis of machine learning algorithms in detecting and mitigating black and gray hole attacks. In Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2021 (pp. 945-961). Singapore: Springer Nature Singapore.

MA. Elsadig, 2023. Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach. IEEE Access.

https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds

DE. Alvarado-Carrillo, E. Ovalle-Magallanes, and OS. Dalmau-Cedeño, 2021. D-GaussianNet: Adaptive distorted Gaussian matched filter with convolutional neural network for retinal vessel segmentation. Geometry and Vision (pp. 378-392). Cham: Springer International Publishing.

Q. Luo, H. He, K. Liu, C. Yang, O. Silven, and L. Liu, 2023. Rain-like Layer Removal from Hot-Rolled Steel Strip Based on Attentive Dual Residual Generative Adversarial Network. IEEE Transactions on Instrumentation and Measurement.

S. Safiri, and A. Nikoofard, 2023. Ladybug Beetle Optimization algorithm: application for real-world problems. The Journal of Supercomputing, 79(3), pp.3511-3560.

Dhabliya, D., Sharma, R. Cloud computing based mobile devices for distributed computing (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 1-4.

Dr. Antino Marelino. (2014). Customer Satisfaction Analysis based on Customer Relationship Management. International Journal of New Practices in Management and Engineering, 3(01), 07 - 12. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/26

Ghazaly, N. M. . (2020). Secure Internet of Things Environment Based Blockchain Analysis. Research Journal of Computer Systems and Engineering, 1(2), 26:30. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/8

Downloads

Published

21.09.2023

How to Cite

N., S. ., A., R. ., & Archana, K. S. . (2023). WSN Attack Detection Using Attentive Dual Residual Generative Adversarial Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 659–665. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3601

Issue

Section

Research Article