A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks

被引:21
作者
Pan, Jeng-Shyang [1 ]
Fan, Fang [1 ,2 ]
Chu, Shu-Chuan [1 ,3 ]
Zhao, Hui-Qi [2 ]
Liu, Gao-Yuan [2 ]
机构
[1] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Intelligent Equipment, Tai An 271019, Shandong, Peoples R China
[3] Flinders Univ S Australia, Coll Sci & Engn, 1284 South Rd, Clovelly Pk, SA 5042, Australia
关键词
ALGORITHM;
D O I
10.1155/2021/5540895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide application of wireless sensor networks (WSN) brings challenges to the maintenance of their security, integrity, and confidentiality. As an important active defense technology, intrusion detection plays an effective defense line for WSN. In view of the uniqueness of WSN, it is necessary to balance the tradeoff between reliable data transmission and limited sensor energy, as well as the conflict between the detection effect and the lack of network resources. This paper proposes a lightweight Intelligent Intrusion Detection Model for WSN. Combining k-nearest neighbor algorithm (kNN) and sine cosine algorithm (SCA) can significantly improve the classification accuracy and greatly reduce the false alarm rate, thereby intelligently detecting a variety of attacks including unknown attacks. In order to control the complexity of the model, the compact mechanism is applied to SCA (CSCA) to save the calculation time and space, and the polymorphic mutation (PM) strategy is used to compensate for the loss of optimization accuracy. The proposed PM-CSCA algorithm performs well in the benchmark functions test. In the simulation test based on NSL-KDD and UNSW-NB15 data sets, the designed intrusion detection algorithm achieved satisfactory results. In addition, the model can be deployed in an architecture based on cloud computing and fog computing to further improve the real-time, energy-saving, and efficiency of intrusion detection.
引用
收藏
页数:15
相关论文
共 55 条
[1]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[2]   A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization [J].
Ali, Mohammed Hasan ;
Al Mohammed, Bahaa Abbas Dawood ;
Ismail, Alyani ;
Zolkipli, Mohamad Fadli .
IEEE ACCESS, 2018, 6 :20255-20261
[3]   An optimum forceful generation scheduling and unit commitment of thermal power system using sine cosine algorithm [J].
Bhadoria, Ashutosh ;
Marwaha, Sanjay ;
Kamboj, Vikram Kumar .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (07) :2785-2814
[4]  
Bovenzi G., 2020, HIERARCHICAL HYBRID
[5]   A Survey of Intrusion Detection Systems in Wireless Sensor Networks [J].
Butun, Ismail ;
Morgera, Salvatore D. ;
Sankar, Ravi .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :266-282
[6]  
Chai QW., 2020, J INFORM HIDING MULT, V11, P90
[7]   A probability density function generator based on neural networks [J].
Chen, Chi-Hua ;
Song, Fangying ;
Hwang, Feng-Jang ;
Wu, Ling .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 541
[8]   An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks [J].
Chen, Chien-Ming ;
Xiang, Bing ;
Wu, Tsu-Yang ;
Wang, King-Hang .
APPLIED SCIENCES-BASEL, 2018, 8 (07)
[9]  
Chen J.N., 2018, J. Inf. Hiding Multim. Signal Process., V9, P1264
[10]   Fast density peak clustering for large scale data based on kNN [J].
Chen, Yewang ;
Hu, Xiaoliang ;
Fan, Wentao ;
Shen, Lianlian ;
Zhang, Zheng ;
Liu, Xin ;
Du, Jixiang ;
Li, Haibo ;
Chen, Yi ;
Li, Hailin .
KNOWLEDGE-BASED SYSTEMS, 2020, 187