An intrusion detection system for wireless sensor networks using deep neural network

被引:39
作者
Gowdhaman, V [1 ]
Dhanapal, R. [1 ]
机构
[1] Karpagam Acad Higher Educ, Fac Engn, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Intrusion detection system (IDS); Wireless sensor networks (WSN); Cross-correlation; Deep neural network (DNN); SECURITY; MANAGEMENT;
D O I
10.1007/s00500-021-06473-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network comprises of a large number of sensor nodes to acquire and transmit data to the central location. However, due to resource constrained nodes, deployment strategies and communication channel introduce numerous security challenges to the wireless sensor networks. So, it is essential to detect unauthorized access to improve the security features of wireless sensor networks. Network intrusion detection systems provide such services to the network and it becomes inevitable for any communication network. Machine learning (ML) techniques are widely used in intrusion detection systems; however, the performance of ML techniques is not satisfactory while handling imbalanced attacks. To solve this and to improve the performance, this research work proposed an intrusion detection system based on deep neural network (DNN). Cross-correlation process is used to select the optimal features from the dataset and the selected parameters are used as building blocks for deep neural network structure to find intrusions. The experimental results confirmed that the proposed DNN performs better than conventional machine learning models such as support vector machine, decision tree, and random forest and efficiently identifies the attacks.
引用
收藏
页码:13059 / 13067
页数:9
相关论文
共 28 条
[21]   A review on security challenges of wireless communications in disaster emergency response and crisis management situations [J].
Seba, Abderazek ;
Nouali-Taboudjemat, Nadia ;
Badache, Nadjib ;
Seba, Hamida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 :150-161
[22]  
Smys Dr S, 2021, Journal of Artificial Intelligence and Capsule Networks, V3, P43
[23]  
Smys S., 2020, J ISMAC, V2, P190, DOI [10.36548/jismac.2020.4.002, DOI 10.36548/JISMAC.2020.4.002]
[24]  
Smys S., 2021, J Inf Technol, V3, P67
[25]   Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks [J].
Wang, Wenming ;
Huang, Haiping ;
Li, Qi ;
He, Fan ;
Sha, Chao .
IEEE ACCESS, 2020, 8 :25170-25183
[26]  
Xie Jinhui, 2018, Procedia Computer Science, V131, P1188, DOI 10.1016/j.procs.2018.04.297
[27]   A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security [J].
Yu, Jin-Yong ;
Lee, Euijong ;
Oh, Se-Ra ;
Seo, Young-Duk ;
Kim, Young-Gab .
IEEE ACCESS, 2020, 8 :45304-45324
[28]   Security and application of wireless sensor network [J].
Zhang Huanan ;
Xing Suping ;
Wang Jiannan .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 :486-492