Fuzzy optimization based detection of attacker nodes in wireless networks using deep neural network

被引:0
作者
Daniel, Jesline [1 ]
Rose, J. T. Anita [1 ]
Vinnarasi, F. Sangeetha Francelin [1 ]
机构
[1] St Josephs Coll Engn, Chennai, Tamil Nadu, India
关键词
black hole attack; deep neural; fuzzy imperialist competitive algorithm; network; wormhole attack; ALGORITHM;
D O I
10.1002/cpe.7248
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Nowadays, information security attacks are emerging as the main threat to network behavior. The deployment of sensor nodes in the open environment will be subjected to various kinds of DoS attacks and it needs to be analyzed. In this article, we considered two attacks namely, black hole attack and wormhole attack. The number of sensor nodes in the wireless network deployed in the network is taken as input data. Data packet drop and transmission latency are considered as two significant drawbacks of black hole and wormhole attack. Therefore, to conquer such limitations, the deep neural network based fuzzy imperialist competitive algorithm (DNN-FICA) is developed which accurately detects the presence of attacker node in the wireless network. Here, the FICA approach is utilized to optimize the weights of DNN. The simulation is conducted using MATLAB software considering the performance metrics such as detection rate, packet delivery ratio, energy consumption, network lifetime, end-to-end delay, communication overhead, throughput, and residual energy. The comparative results are carried out and the result analysis proved that the proposed DNN-FICA technique achieved greater overall performance than other compared methods.
引用
收藏
页数:17
相关论文
共 30 条
  • [1] Alshambri H., 2020, INT J SCI TECHNOL RE, V8, P579
  • [2] Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission
    Anand, C.
    Vasuki, N.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 121 (04) : 2911 - 2926
  • [3] Anand V., 2016, INT J ADV SCI ENG, V3, P325
  • [4] Belej Olexander, 2020, 2020 IEEE 15th International Conference on Computer Sciences and Information Technologies (CSIT), P316, DOI 10.1109/CSIT49958.2020.9321942
  • [5] Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things
    Borgiani, Vladimir
    Moratori, Patrick
    Kazienko, Juliano F.
    Tubino, Emilio R. R.
    Quincozes, Silvio E.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) : 4569 - 4578
  • [6] Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey
    Fang, Weidong
    Zhang, Wuxiong
    Chen, Wei
    Pan, Tao
    Ni, Yepeng
    Yang, Yinxuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [7] Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol
    Fotohi, Reza
    Bari, Somayyeh Firoozi
    Yusefi, Mehdi
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (04)
  • [8] Ganapathy S., 2020, C INTELLIGENT SYSTEM, P189
  • [9] Hussen A. M., 2021, INT J COMPUT, V4, P18
  • [10] Isaac Sajan R., 2020, INT J SCI RES ENG DE, V3, P270