Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks

被引:29
作者
Rajasoundaran, S. [1 ]
Kumar, S. V. N. Santhosh [2 ]
Selvi, M. [3 ]
Thangaramya, K. [3 ]
Arputharaj, Kannan [3 ]
机构
[1] SRM Inst Sci & Technol, Dept Networking & Commun, Chennai, India
[2] Vellore Inst Technol, Sch Comp Sci Engn & Informat Syst, Vellore, India
[3] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore, India
关键词
Security; LSTM; Intrusion detection; Secure MAC; Wireless sensor networks; Deep learning and channel assessment; ROUTING PROTOCOL; DEEP; SYSTEM;
D O I
10.1007/s11276-023-03470-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.
引用
收藏
页码:209 / 231
页数:23
相关论文
共 59 条
[1]  
Abood Mohammed Salah, 2021, IOP Conference Series: Materials Science and Engineering, V1076, DOI 10.1088/1757-899X/1076/1/012053
[2]  
Agajo J., 2020, APPL MODELLING SIMUL, V4, P40
[3]   Classification of DoS Attacks in Smart Underwater Wireless Sensor Network [J].
Ahmad, Bilal ;
Jian, Wang ;
Enam, Rabia Noor ;
Abbas, Ali .
WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (02) :1055-1069
[4]   Network intrusion detection system: A systematic study of machine learning and deep learning approaches [J].
Ahmad, Zeeshan ;
Shahid Khan, Adnan ;
Wai Shiang, Cheah ;
Abdullah, Johari ;
Ahmad, Farhan .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (01)
[5]  
Akyildiz I. F., 2005, Ad Hoc Networks, V3, P257, DOI 10.1016/j.adhoc.2005.01.004
[6]   A Comparative Performance Evaluation of Distributed Collision-free MAC Protocols for Underwater Sensor Networks [J].
Alfouzan, Faisal ;
Shahrabi, Alireza ;
Ghoreyshi, Seyed Mohammad ;
Boutaleb, Tuleen .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS (SENSORNETS), 2019, :85-93
[7]   A Secure Communication in IoT Enabled Underwater and Wireless Sensor Network for Smart Cities [J].
Ali, Tariq ;
Irfan, Muhammad ;
Shaf, Ahmad ;
Alwadie, Abdullah Saeed ;
Sajid, Ahthasham ;
Awais, Muhammad ;
Aamir, Muhammad .
SENSORS, 2020, 20 (15) :1-24
[8]  
Arifeen Md Murshedul, 2021, Proceedings of International Conference on Trends in Computational and Cognitive Engineering. Proceedings of TCCE 2020. Advances in Intelligent Systems and Computing (AISC 1309), P467, DOI 10.1007/978-981-33-4673-4_37
[9]  
Bagali S., 2020, Int. J. Electr. Comput. Eng. (IJECE), V10, P3284
[10]  
Battula Ashok, 2021, Proceedings of 5th International Conference on Computing Methodologies and Communication (ICCMC 2021), P186, DOI 10.1109/ICCMC51019.2021.9418321