Intrusion detection in WSN using Supervised Machine Learning Techniques

Authors

  • Deepa Jeevaraj Research Scholar, Department of ECE, Bharath Institute of Higher Education and Research, India.
  • B. Karthik Associate Professor, Department of ECE, Bharath Institute of Higher Education and Research, India
  • M. Sriram Associate Professor, Department of CSE, Bharath Institute of Higher Education and Research, India.
  • S. P. Vijayaragavan Professor, Department of EEE, Bharath Institute of Higher Education and Research, India.
  • D. Gokulakrishnan Assistant rofessor, Department of Computing Technology, SRM Institute of Science and Technology, Chennai, India.

Keywords:

Wireless Sensor Network, Intrusion Detection, Machine Learning, Naïve Bayes, WEKA, IBK, One R

Abstract

Wireless sensor network (WSN) is becoming increasingly one of the trendiest research areas in Computer Science applications. It finds wide applications department of Defence, banking, hospital, marketing, education, and all prioritized government sectors. Applications that have created many problems especially in security levels and hindrance caused due to the intrusion in WSN based communication. In proposed system depending upon the security and dependability of this article builds model on IoT is established using machine learning algorithms. This intrusion detection system is very compatible and characteristics of determining the interactions in any dataset have given an exemplary classification, performance level and receiver of operator characteristics. This paper uses specialized data set of WSN to detect and classify different class attributes like black hole flooding and scheduling attacks. This paper considers the use of novel Framework that is trained using a dataset to detect and classify different attacks. Output results of the model show that WSN   has improved ability for the intrusion detection system using higher classification and accuracy rate of 99.45% for IBk classifier using Weka tool.  The precision rate for the built model is 97% and the area under the curve is also gave an optimum result ranging from 0.77 to 0.985 for Naïve Bayes multinominal and IBk classifier. An optimum model is built using the Weka tool which is trained using the dataset different types of attacks using some selected classifiers. The attacks like black hole, flooding, scheduling, and grey hole were predicted in WSN.

Downloads

Download data is not yet available.

References

R. Ruskone, S. Airault, and O. Jamet, “Vehicle Detection on Aerial Images”, International Journal of Intelligent Engineering and Systems, Vol. 1, No. 1, pp. 123-456, 2009.

Liu Zhiqiang, Ghulam Mohiuddin, Zheng Jiangbin, Muhammad Asim, Wang Sifei,” Intrusion detection in wireless sensor network using enhanced empirical based component analysis,”Future Generation Computer Systems,Volume 135,2022,Pages 181-193.

Creech, G.; Hu, J. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns. IEEE Trans. Comput. 2014, 63, 807–819.

Vokorokos, L.; BaláŽ, A. Host-Based Intrusion Detection System. In Proceedings of the 2010 IEEE 14th International Conference on Intelligent Engineering Systems, Las Palmas, Spain, 5–7 May 2010; pp. 43–47

Mohammadi, S., Mirvaziri, H., Ghazizadeh-Ahsaee, M. and Karimipour, H., Cyber intrusion detection by combined feature selection algorithm. Journal of information security and applications, 44, (2017), 80-88.

Koli, MS & Chavan, MK 2017, ‘An Advanced Method for Detection of Botnet Traffic using Intrusion Detection System’, IEEE IEEE International Conference on Inventive Communication and Computational Technologies (ICICCT), pp. 481-485.

Sun, Y & Liu, F, 2016, ‘SMOTE-NCL: A Re-Sampling Method with Filter for Network Intrusion Detection’, IEEE International Conference on Computer and Communications (ICCC), pp. 1157-1161.

Vijayan T, Sangeetha M, A. Kumaravel, Karthik B, “Feature selection for Simple Color Histogram Filter based on Retinal Fundus Images for Diabetic Retinopathy recognition,” IETE Journal of Research, 2020. https://doi.org/10.1080/03772063.2020.1844082

H. Elbahadır and E. Erdem, "Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks," 2021 6th International Conference on Computer Science and Engineering (UBMK), 2021, pp. 401-406, DOI: 10.21817/indjcse/2021/v12i6/211206061.

Geetha Hari Priya ,K. Amuthavalli, T.Vijayan et al., “Classifiers with synthetic oversampling preprocess for In Vitro Fertilization predictions,” Indian Journal of Computer Science and Engineering (IJCSE), Vol. 12, No. 6, pp. 1532-1541 Nov-Dec 2021. DOI: 10.21817/indjcse/2020/v11i5/201105266.

Sajjad, S.M.; Bouk, S.H.; Yousaf, M. Neighbor Node Trust Based Intrusion Detection System for WSN. Procedia Comput. Sci. 2015, 63, 183–188.

https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds

https://www.cs.waikato.ac.nz/ml/weka/

I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266–282, 2014.

Tan, Xiaopeng et al. “Wireless Sensor Networks Intrusion Detection Based on SMOTE and the Random Forest Algorithm.” Sensors (Basel, Switzerland) vol. 19,1 203. 8 Jan. 2019, doi:10.3390/s19010203

Jeevaraj, D., Karthik, B., Sriram, M., Vijayaragavan, S.P., A Second Order Inductive Deduction Approach for Identification of Room Occupancy by Wireless Sensors, Indian Journal of Computer Science and Engineering, 13(5), pp. 1702–1715, 2022.

Mohammed S. Alsahli, Marwah M. Almasri, Mousa Al-Akhras, Abdulaziz I. Al-Issa and Mohammed Alawairdhi, “Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN” International Journal of Advanced Computer Science and Applications(IJACSA), 12(5), 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120574.

Jeevaraj, D., Karthik, B., Sriram, M., Vijayaragavan, S.P., A Novel Model for Network Intrusion Detection by Using Statistical Learning Approach, Indian Journal of Computer Science and Engineering, 13(5), pp. 1688–1701, 2022.

S. S. Shivaji and A. B. Patil, "Energy Efficient Intrusion Detection Scheme Based on Bayesian Energy Prediction in WSN," 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), 2015, pp. 114-117, doi: 10.1109/ICACC.2015.107.

S. Jiang, J. Zhao and X. Xu, "SLGBM: An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments," in IEEE Access, vol. 8, pp. 169548-169558, 2020, doi: 10.1109/ACCESS.2020.3024219.

S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues and Y. Park, "Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges," in IEEE Access, vol. 8, pp. 3343-3363, 2020, doi: 10.1109/ACCESS.2019.2962829.

Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi and R. Ahmad, "CNN-LSTM: Hybrid Deep Neural Network for Network Intrusion Detection System," in IEEE Access, vol. 10, pp. 99837-99849, 2022, doi: 10.1109/ACCESS.2022.3206425

D. Thomas, R. Shankaran, M. A. Orgun and S. C. Mukhopadhyay, "SEC2: A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications," in IEEE Transactions on Green Communications and Networking, vol. 5, no. 2, pp. 622-634, June 2021, doi: 10.1109/TGCN.2021.3067606.

Downloads

Published

27.12.2023

How to Cite

Jeevaraj, D. ., Karthik, B. ., Sriram, M. ., Vijayaragavan, S. P. ., & Gokulakrishnan, D. . (2023). Intrusion detection in WSN using Supervised Machine Learning Techniques. International Journal of Intelligent Systems and Applications in Engineering, 12(9s), 483–490. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4368

Issue

Section

Research Article