WSN Attack Detection Using Attentive Dual Residual Generative Adversarial Networks
Keywords:
Adaptive distorted Gaussian matched filter, Attentive Dual Residual Generative Adversarial Networks, Ladybug Beetle Optimization, Wireless Sensor NetworkAbstract
Wireless sensor networks (WSN) play an important role in different industries because of lack infrastructure but remain vulnerable to numerous attacks. Denial-of-Service (Dos) attacks are the main attack that scares WSN. If a DoS attacks targets a company, it could lower that company's perceived value in the market. To minimize these issues this research article presents an approach of a WSN Attack detection using Attentive Dual Residual Generative Adversarial Networks (WSN-AD-ADRGAN) technique. Initially, input data is collected from WSN-DS. Afterward the data are fed to preprocessing. The pre processing segment removes noise and redundant data by utilizing Adaptive distorted Gaussian matched filter (ADGMF)and the preprocessed output fed to Attentive Dual Residual Generative Adversarial Networks (ADRGAN) method that classifies the WSN attacks into Black hole attack, Grey hole attack, Flooding attack, Timing attack ,normal. Attentive Dual Residual Generative Adversarial Network classifier, in general, does not describe modifying optimization techniques to identify optimum parameters to enable accurate WSN attack classification. Therefore, it is proposed to use Ladybug Beetle Optimization Algorithm (LBOA) to optimize Attentive Dual Residual Generative Adversarial Network, which accurately classifies WSN attacks. The proposed WSN-AD-ADRGAN technique is implemented in python utilizing WSN-DS dataset. The suggested method's performance is examined using performance metrics like precision, recall, accuracy, F1-score, specificity, ROC, computing time. The proposed AIPE-DBO-LDC-CXR method attains higher accuracy 16.65%, 18.85% and 16.45%; greater sensitivity 16.34%, 12.23%, and 19.12%; greater specificity 14.89%, 16.89% and 20.67% and 82.37%, 87.76% and 78.78% lower computational time analyzed to the existing methods like intrusion identification system in WSN utilizing conditional generative adversarial network (IDS-WSN-CGAN),Service attack improvement in wireless sensor network under machine learning (SAI-WSN-ML),Machine learning based identification, EC-BRTT technique based DoS attacks prevention in wireless sensor networks (ML-DDoS-WSN) respectively.
Downloads
References
K. Cheena, T. Amgoth, and G. Shankar, 2023. Deep Learning-Based Black Hole Detection Model for WSN in Smart Grid. In Computational Intelligence: Select Proceedings of InCITe 2022 (pp. 19-30). Singapore: Springer Nature Singapore.
S. Karthic, and SM. Kumar, 2023. Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Processing Letters, 55(1), pp.459-479.
SE. Quincozes, JF. Kazienko, and VE. Quincozes, 2023. An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks. Internet of Things, 22, p.100684.
S. Rajasoundaran, AV. Prabu, S. Routray, PP. Malla, GS. Kumar, A. Mukherjee. and Y. Qi, 2022. Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Computer Communications, 187, pp.71-82.
M. Dener, C. Okur, S. Al. and A. Orman, 2023. WSN-BFSF: A New Dataset for Attacks Detection in Wireless Sensor Networks. IEEE Internet of Things Journal.
NM. Saravana Kumar, E. Suryaprabha, K. Hariprasath. and V. Vijayakumar, 2023. Deep Learning Based Hybrid Security Model in Wireless Sensor Network. Wireless Personal Communications, 129(3), pp.1789-1805.
T. Sood, S. Prakash, S. Sharma, A. Singh, and H. Choubey, 2022. Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Personal Communications, 126(1), pp.911-931.
D. Yu, J. Kang, and J. Dong, 2021. Service attack improvement in wireless sensor network based on machine learning. Microprocessors and Microsystems, 80, p.103637.
K. Lakshmi Narayanan, R. Santhana Krishnan, E. Golden Julie, Y. Harold Robinson, and V. Shanmuganathan, 2021. Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks. Wireless Personal Communications, pp.1-25.
A. Kavousi-Fard, W. Su and T. Jin, 2020. A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Transactions on Industrial Informatics, 17(1), pp.650-658.
S. Rabhi, T. Abbes, and F. Zarai, 2023. IoT routing attacks detection using machine learning algorithms. Wireless Personal Communications, 128(3), pp.1839-1857.
M. Kurtkoti, BS. Premananda, and K. Vishwavardhan Reddy, 2022. Performance analysis of machine learning algorithms in detecting and mitigating black and gray hole attacks. In Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2021 (pp. 945-961). Singapore: Springer Nature Singapore.
MA. Elsadig, 2023. Detection of Denial-of-Service Attack in Wireless Sensor Networks: A lightweight Machine Learning Approach. IEEE Access.
https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds
DE. Alvarado-Carrillo, E. Ovalle-Magallanes, and OS. Dalmau-Cedeño, 2021. D-GaussianNet: Adaptive distorted Gaussian matched filter with convolutional neural network for retinal vessel segmentation. Geometry and Vision (pp. 378-392). Cham: Springer International Publishing.
Q. Luo, H. He, K. Liu, C. Yang, O. Silven, and L. Liu, 2023. Rain-like Layer Removal from Hot-Rolled Steel Strip Based on Attentive Dual Residual Generative Adversarial Network. IEEE Transactions on Instrumentation and Measurement.
S. Safiri, and A. Nikoofard, 2023. Ladybug Beetle Optimization algorithm: application for real-world problems. The Journal of Supercomputing, 79(3), pp.3511-3560.
Dhabliya, D., Sharma, R. Cloud computing based mobile devices for distributed computing (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 1-4.
Dr. Antino Marelino. (2014). Customer Satisfaction Analysis based on Customer Relationship Management. International Journal of New Practices in Management and Engineering, 3(01), 07 - 12. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/26
Ghazaly, N. M. . (2020). Secure Internet of Things Environment Based Blockchain Analysis. Research Journal of Computer Systems and Engineering, 1(2), 26:30. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/8
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.