Deep learning-based energy prediction in wireless sensor networks

被引:0
作者
Selvaraj, Manikandan [1 ]
Santhanam, Suganthi [2 ]
机构
[1] Kongunadu Polytech Coll, Dept Comp Engn, Tiruchirappalli, Tamilnadu, India
[2] KRamakrishnan Coll Technol, Dept Elect & Commun Engn, Tiruchirappalli, Tamilnadu, India
关键词
attack detection; Taylor series; wireless sensor networks; WSN; Walrus optimisation algorithm; WaOA; deep learning; DL; deep Q network; DQN; ATTACK DETECTION; PROTOCOL;
D O I
10.1504/IJBIC.2024.141691
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A wireless sensor network (WSN) plays a major role in network protection. In WSN, the data is routed towards the sink node and attack detection is the key process of WSN. In this research, the Taylor Walrus optimisation algorithm (Taylor WaOA) enabled LeNet model (Taylor WaOA-LeNet) is developed for attack detection. Here, the WSN is simulated and the deep Q network (DQN) is used for predicting the energy. The proposed Taylor WaOA is utilised in routing using fitness factors like energy, throughput, trust and distance. In base station (BS), the feature selection and data augmentation are carried out in attack detection; the proposed Taylor WaOA-LeNet model is employed. Furthermore, the energy, throughput, distance, trust, accuracy, sensitivity, and detection rate metrics are used to evaluate the model performance, which offered the finest values of 0.984 J, 0.073 Mbps, 67.08 m, 0.157, 0.918, 0.947, and 0.958.
引用
收藏
页码:176 / 190
页数:16
相关论文
共 31 条
[1]   RETRACTED: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN (Retracted Article) [J].
Angappan, Arthanareeswaran ;
Saravanabava, T. P. ;
Sakthivel, P. ;
Vishvaksenan, K. S. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (06) :6567-6578
[2]  
[Anonymous], 2019, The bot-iot dataset
[3]  
[Anonymous], 2009, NSL KDD DATASET
[4]   Investigating the effect of Black Hole attack on Zone Based Energy Efficient Routing Protocol for Mobile Sensor Networks [J].
Ballav, Bikram ;
Rana, Gayatree ;
Pattanayak, Binod Kumar .
2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, :113-118
[5]   DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions [J].
Bawany, Narmeen Zakaria ;
Shamsi, Jawwad A. ;
Salah, Khaled .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2017, 42 (02) :425-441
[6]  
Bergonzini C, 2009, 2009 3RD INTERNATIONAL WORKSHOP ON ADVANCES IN SENSORS AND INTERFACES, P137
[7]  
Chakraborty C., 2023, ACM Transactions on Sensor Networks
[8]  
Das T, 2015, IEEE I C ADV NETW TE
[9]  
Gupta N., 2021, International Journal of Computer Science Trends and Technology (IJCST), V9, P64
[10]   Compressed domain image retrieval: A comparative study of similarity metrics [J].
Hatzigiorgaki, M ;
Skodras, AN .
VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2003, PTS 1-3, 2003, 5150 :439-448