Adaptive convolutional-LSTM neural network with NADAM optimization for intrusion detection in underwater IoT wireless sensor networks

被引:1
作者
Arivumani, Samson [1 ]
Nagarajan, M. [1 ]
机构
[1] Bharath Inst Higher Educ & Res, Dept ECE, Chennai, India
来源
ENGINEERING RESEARCH EXPRESS | 2024年 / 6卷 / 03期
关键词
underwater iot sensor networks; deep learning; intrusion detection system; convolutional LSTM; NADAM optimizer; ATTACKS;
D O I
10.1088/2631-8695/ad7935
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Underwater IoT networks rely on sensor nodes to continuously monitor and collect real-time data from marine environments. The nodes in the underwater networks face security challenges in terms of intrusions. Intrusions are common in conventional wireless sensor networks as well as in underwater sensor networks. Intrusions like data tampering, node insertion, unauthorized access compromises the security and privacy of the network. The existing Intrusion Detection Systems (IDS) faces limitations while detecting intrusions in Underwater IoT Wireless Sensor Networks (UIoTWSN) due to the dynamic condition of underwater environment. To overcome this, a novel IDS for UIoTWSN is proposed by combining the features of advanced deep learning techniques in an optimized manner. The proposed hybrid model comprises convolutional LSTM network with NADAM optimizer to analyze the spatial and temporal features to detect the intrusions. To handle the dynamic nature of underwater sensor network and to improve the convergence speed of the proposed IDS, NADAM optimizer is integrated in this research work. Experimentations of the proposed model validates the higher accuracy of 96.7%, precision of 94.5% and recall of 95.2% which is better than the conventional techniques.
引用
收藏
页数:16
相关论文
共 31 条
[1]   Classification of DoS Attacks in Smart Underwater Wireless Sensor Network [J].
Ahmad, Bilal ;
Jian, Wang ;
Enam, Rabia Noor ;
Abbas, Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) :1055-1069
[2]   Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks [J].
Ahmad, Irfan ;
Rahman, Taj ;
Zeb, Asim ;
Khan, Inayat ;
Ullah, Inam ;
Hamam, Habib ;
Cheikhrouhou, Omar .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[3]   Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks [J].
Aljebreen, Mohammed ;
Alohali, Manal Abdullah ;
Saeed, Muhammad Kashif ;
Mohsen, Heba ;
Al Duhayyim, Mesfer ;
Abdelmageed, Amgad Atta ;
Drar, Suhanda ;
Abdelbagi, Sitelbanat .
SENSORS, 2023, 23 (08)
[4]  
Anuradha K., 2024, African Journal of Biological Sciences, V6, P211
[5]   AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks [J].
Das, Soumadeep ;
Pasikhani, Aryan Mohammadi ;
Gope, Prosanta ;
Clark, John ;
Patel, Chintan ;
Sikdar, Biplab .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (02) :1080-1095
[6]  
Deshpande S, 2021, SECURITY ISSUES PRIV, P173
[7]   A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges [J].
Fattah, Salmah ;
Gani, Abdullah ;
Ahmedy, Ismail ;
Idris, Mohd Yamani Idna ;
Hashem, Ibrahim Abaker Targio .
SENSORS, 2020, 20 (18) :1-30
[8]   Localization and Detection of Multiple Attacks in Wireless Sensor Networks Using Artificial Neural Network [J].
Gebremariam G.G. ;
Panda J. ;
Indu S. .
Wireless Communications and Mobile Computing, 2023, 2023
[9]  
Goyal N., 2020, J COMPUT THEOR NANOS, V17, P2706, DOI [10.1166/jctn.2020.9109, DOI 10.1166/JCTN.2020.9109]
[10]   Underwater Networked Wireless Sensor Data Collection for Computational Intelligence Techniques: Issues, Challenges, and Approaches [J].
Gupta, Osho ;
Goyal, Nitin ;
Anand, Divya ;
Kadry, Seifedine ;
Nam, Yunyoung ;
Singh, Aman .
IEEE ACCESS, 2020, 8 :122959-122974