Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks

被引:23
作者
Alzubi, Jafar A. [1 ]
机构
[1] Al Balqa Appl Univ, Fac Engn, Al Salt, Jordan
关键词
ANOMALY DETECTION;
D O I
10.1002/ett.4069
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Attack detection is a significant problem to be resolved to attain security in industrial sensor network. Few research works have been designed for performing attack discovery process with the help of different classification algorithms. However, classification performance was lowered to accurately find attack nodes and thereby getting higher security level (SL). In order to overcome such limitations, bipolar fully recurrent deep structured neural learning based attack detection (BFRDSNL-AD) technique is proposed in this article. The BFRDSNL-AD technique comprises of three main layers, namely, input, hidden, and output layer to accurately carry-out attack detection process. The input layer in BFRDSNL-AD Technique takes a number of sensor nodes as input. The designed BFRDSNL-AD technique utilized numbers of hidden layers in order to deeply examine each sensor node in industrial sensor network. The result of the hidden layer is fed-back into the network along with the inputs in order to discover the temporal dynamic behavior of sensor nodes. In BFRDSNL-AD technique, output layer applies bipolar activation function to determine the association between identified node features to give attack detection result. If the output layer result is 1, then sensor node is considered as normal. Otherwise, sensor node is considered as malicious attack in industrial sensor network. Thus, the BFRDSNL-AD technique increases the attack detection performance with higher accuracy and minimal time. From that, BFRDSNL-AD technique gets enhanced SL in industrial sensor network. The simulation of BFRDSNL-AD technique is conducted using metrics such as security, data delivery rate, data loss rate, and delay with respect to a different number of sensor nodes and data packets.
引用
收藏
页数:15
相关论文
共 36 条
  • [1] Efficient integration of secure and safety critical industrial wireless sensor networks
    Akerberg, Johan
    Gidlund, Mikael
    Lennvall, Tomas
    Neander, Jonas
    Bjorkman, Mats
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [2] A task-based model for minimizing energy consumption in WSNs
    Alrabea, Adnan
    Alzubi, Omar A.
    Alzubi, Jafar A.
    [J]. ENERGY SYSTEMS-OPTIMIZATION MODELING SIMULATION AND ECONOMIC ASPECTS, 2022, 13 (03): : 671 - 688
  • [3] Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud
    Alzubi, Jafar A.
    Manikandan, Ramachandran
    Alzubi, Omar A.
    Qiqieh, Issa
    Rahim, Robbi
    Gupta, Deepak
    Khanna, Ashish
    [J]. MEASUREMENT, 2020, 150 (150)
  • [4] Alzubi OA, 2016, J U COMPUT SCI, V22, P2440
  • [5] Alzubi O, 2018, INT ARAB J INF TECHN, V15, P76
  • [6] Cryptosystem design based on Hermitian curves for IoT security
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Dorgham, Osama
    Alsayyed, Mohammad
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) : 8566 - 8589
  • [7] An optimal pruning algorithm of classifier ensembles: dynamic programming approach
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Alweshah, Mohammed
    Qiqieh, Issa
    Al-Shami, Sara
    Ramachandran, Manikandan
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (20) : 16091 - 16107
  • [8] Ben Saied Yosra, 2016, International Journal of Network Security, V18, P842
  • [9] Review of Security Issues in Industrial Networks
    Cheminod, Manuel
    Durante, Luca
    Valenzano, Adriano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 277 - 293
  • [10] Chen T, 2014, INT WORKS HIGH MOBIL, P1, DOI 10.1109/HMWC.2014.7000203