Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models

被引:2
作者
Affane, M. Anselme R. [1 ,2 ]
Satori, Hassan [1 ,2 ]
Boutazart, Youssef [1 ,2 ]
Ezzine, Abderahim [1 ,2 ]
Satori, Khalid [2 ]
机构
[1] Lab Informat Signals Automat & Cognit LISAC, Fes 30003, Morocco
[2] Sidi Mohamed Ben Abdallah Univ, Fac Sci Dhar Mahraz, Dept Comp Sci, Fes 30003, Morocco
关键词
Machine Learning; Anomaly identification; Stochastic classifier; Artificial intelligence; Attack detection; Continuous hidden markov model; Dimensionality reduction; WSN security; Wireless sensor network; CLASSIFICATION; FUSION;
D O I
10.1007/s11277-024-10999-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The progress of Wireless Sensor Networks (WSNs) technologies has introduced a greater susceptibility of sensors and networks to being victims of distributed attacks. These attacks include various malicious activities such as intrusions during routing processes, data intercepting and other disruptive actions. In response to this increasing security challenge, numerous models for attack identification have been proposed. These models typically involve the deployment of detection systems that collect sensor data and employ machine learning and artificial intelligence techniques to categorize them. This research introduces a novel method for the analysis and classification of WSN datasets. The primary objective is to develop an anomaly identification approach that enhances sensor network security and operational efficiency with a good degree of accuracy. To achieve this goal, artificial intelligence method based-on stochastic models are used to create a detection system that learns from existing routing data to identify potential malicious network entries. The proposed approach relies on the principles of the Hidden Markov Model (HMM) and the Gaussian Mixture Model (GMM), a part of artificial intelligence stochastic functions, which incorporate predictive assumptions. In addition, dimensionality reduction is used to select the most pertinent routing features for the training of the system. To assess the effectiveness of our proposed approach, we performed experiments using a custom dataset that represents various network scenarios, including both normal and attacked states. The results demonstrate the performance of the model, achieving a classification score of 92. 18% when using a combination of two HMM and three GMM in the classifier. The proposed method attains a 98% precision value and 95% accuracy, better than performances of SVM, NB, DT and RF methods. This highlights the efficacy of our proposed approach compared to existing research.
引用
收藏
页码:1965 / 1992
页数:28
相关论文
共 36 条
  • [11] AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
    Hanif, Maria
    Ashraf, Humaira
    Jalil, Zakia
    Jhanjhi, Noor Zaman
    Humayun, Mamoona
    Saeed, Saqib
    Almuhaideb, Abdullah M.
    [J]. ELECTRONICS, 2022, 11 (15)
  • [12] Hu P, 2007, C IND ELECT APPL, P2253
  • [13] Ismail S, 2022, 2022 IEEE WORLD AI IOT CONGRESS (AIIOT), P283, DOI [10.1109/AIIoT54504.2022.9817298, 10.1109/AIIOT54504.2022.9817298]
  • [14] Issariyakul T, 2012, INTRODUCTION TO NETWORK SIMULATOR NS2, SECOND EDITION, P21, DOI 10.1007/978-1-4614-1406-3_2
  • [15] Kassambara A, 2017, PRACTICAL GUIDE PRIN
  • [16] Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks
    Khiati, Mustapha
    Djenouri, Djamel
    [J]. COMPUTER NETWORKS, 2018, 143 : 263 - 274
  • [17] A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks
    Kim, Tai-Hoon
    Goyat, Rekha
    Rai, Mritunjay Kumar
    Kumar, Gulshan
    Buchanan, William J.
    Saha, Rahul
    Thomas, Reji
    [J]. IEEE ACCESS, 2019, 7 : 184133 - 184144
  • [18] An efficient scheme of target classification and information fusion in wireless sensor networks
    Kim, Youngsoo
    Jeong, Sangbae
    Kim, Daeyoung
    Lopez, Tomas Sanchez
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (07) : 499 - 508
  • [19] Distributed multitarget classification in wireless sensor networks
    Kotecha, JH
    Ramachandran, V
    Sayeed, AM
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (04) : 703 - 713
  • [20] Lember J., 2011, HIDDEN MARKOV MODELS, DOI [10.1002/sim.4780100317, DOI 10.1002/SIM.4780100317]