Anomaly detection in WSN IoT (Internet of Things) environment through a consensus-based anomaly detection approach

被引:0
作者
Anitha, C. L. [1 ]
Sumathi, R. [1 ]
机构
[1] SIT, Dept Comp Sci & Engn, Tumkur, India
关键词
Anomaly detection; WSN (Wireless Sensor Network); IoT (Internet of things); CSAD (consensus-based novel anomaly detection); Data packets; WIRELESS SENSOR NETWORKS; INTRUSION DETECTION; SECURITY;
D O I
10.1007/s11042-023-17894-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most essential part of any IoT (Internet of Things) model is the wireless network sensors (WSN). The application of these networks combined with the latest technologies relating to IoT provides fast, economical as well as flexible applications. Wireless sensor networks have various applications for IoT where devices combined with the sensors are used for data collection from various environments as well as monitoring of these environments. These networks are highly prone to attacks considering their characteristic nature, which includes self-organization, a topology that is dynamic, large-scale, and constrained on resources. Various models have been proposed for the detection of attacks in these Wireless sensor networks. Although, the recent survey studies on the attacks in this network aims at the methodologies for detecting only one to two kinds of attacks as well as have the absence of performance analysis in detail. This research work proposes a CSAD (consensus-based novel anomaly detection) approach in three steps; first step; each step includes a novel algorithm. A novel distributed algorithm is proposed to classify the anomaly and normal data packets. In the second step level based approach is used for decision implementation to identify the anomaly; also it is responsible for efficient packet transmission. The third step includes discarding the anomaly Moreover, the proposed model is evaluated by inducing the different malicious nodes, and an anomaly detected is observed. Further comparison with the existing model is carried out based on the classified and misclassified packet; through the comparative analysis, it is observed that the Consensus-AD (Anomaly Detection) approach simply outperforms the existing model. A comparative analysis is carried out considering the throughput for model efficiency. Moreover, comparative analysis shows that the proposed model outperforms the existing anomaly detection protocol. The existing model observes a throughput of 80.99% whereas the CSAD model observes a throughput of 81.81%.
引用
收藏
页码:58915 / 58934
页数:20
相关论文
共 22 条
  • [1] On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks
    Abduvaliyev, Abror
    Pathan, Al-Sakib Khan
    Zhou, Jianying
    Roman, Rodrigo
    Wong, Wai-Choong
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03): : 1223 - 1237
  • [2] Self-Supervised Online and Lightweight Anomaly and Event Detection for IoT Devices
    Abououf, Menatalla
    Mizouni, Rabeb
    Singh, Shakti
    Otrok, Hadi
    Damiani, Ernesto
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24) : 25285 - 25299
  • [3] FSCB-IDS: Feature Selection and Minority Class Balancing for Attacks Detection in VANETs
    Amaouche, Sara
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Khattak, Sohaib Bin Altaf
    Farman, Haleem
    Nasralla, Moustafa M.
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (13):
  • [4] HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices
    Breitenbacher, Dominik
    Homoliak, Ivan
    Aung, Yan Lin
    Tippenhauer, Nils Ole
    Elovici, Yuval
    [J]. PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 479 - 484
  • [5] Monotone Split and Conquer for Anomaly Detection in IoT Sensory Data
    Dang, Thien-Binh
    Le, Duc-Tai
    Nguyen, Tien-Dung
    Kim, Moonseong
    Choo, Hyunseung
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (20) : 15468 - 15485
  • [6] Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor Networks
    Desai, S. Sundeep
    Nene, Manisha J.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4092 - 4100
  • [7] An improved anomaly detection model for IoT security using decision tree and gradient boosting
    Douiba, Maryam
    Benkirane, Said
    Guezzaz, Azidine
    Azrour, Mourade
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (03) : 3392 - 3411
  • [8] lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning
    Hazman, Chaimae
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 4069 - 4083
  • [9] Wireless Sensor Network Reliability and Security in Factory Automation: A Survey
    Islam, Kamrul
    Shen, Weiming
    Wang, Xianbin
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (06): : 1243 - 1256
  • [10] SLGBM: An Intrusion Detection Mechanism for Wireless Sensor Networks in Smart Environments
    Jiang, Shuai
    Zhao, Juan
    Xu, Xiaolong
    [J]. IEEE ACCESS, 2020, 8 : 169548 - 169558