An intrusion detection system for wireless sensor networks using deep neural network

被引:32
|
作者
Gowdhaman, V [1 ]
Dhanapal, R. [1 ]
机构
[1] Karpagam Acad Higher Educ, Fac Engn, Dept Comp Sci & Engn, Coimbatore, Tamil Nadu, India
关键词
Intrusion detection system (IDS); Wireless sensor networks (WSN); Cross-correlation; Deep neural network (DNN); SECURITY; MANAGEMENT;
D O I
10.1007/s00500-021-06473-y
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor network comprises of a large number of sensor nodes to acquire and transmit data to the central location. However, due to resource constrained nodes, deployment strategies and communication channel introduce numerous security challenges to the wireless sensor networks. So, it is essential to detect unauthorized access to improve the security features of wireless sensor networks. Network intrusion detection systems provide such services to the network and it becomes inevitable for any communication network. Machine learning (ML) techniques are widely used in intrusion detection systems; however, the performance of ML techniques is not satisfactory while handling imbalanced attacks. To solve this and to improve the performance, this research work proposed an intrusion detection system based on deep neural network (DNN). Cross-correlation process is used to select the optimal features from the dataset and the selected parameters are used as building blocks for deep neural network structure to find intrusions. The experimental results confirmed that the proposed DNN performs better than conventional machine learning models such as support vector machine, decision tree, and random forest and efficiently identifies the attacks.
引用
收藏
页码:13059 / 13067
页数:9
相关论文
共 50 条
  • [11] Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network
    Lu, Xue
    Han, Dezhi
    Duan, Letian
    Tian, Qiuting
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 221 - 232
  • [12] Intrusion detection system using Anomaly technique in Wireless Sensor Network
    Pandey, Sushant Kumar
    Kumar, Prabhat
    Singh, Jyoti Prakash
    Singh, M. P.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 611 - 615
  • [13] Design of an Intrusion Detection System for Wireless Sensor Networks
    Du, Ye
    Yang, Shuang
    Zhang, Ruhui
    SENSOR LETTERS, 2011, 9 (05) : 2082 - 2086
  • [14] Intrusion Detection System for Wireless Nano Sensor Networks
    Rahim, Aneel
    Malone, Paul
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 327 - 330
  • [15] Intrusion Detection System in Wireless Sensor Networks: A Review
    Ananthakumar, Anush
    Ganediwal, Tanmay
    Kunte, Ashwini
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (12) : 131 - 139
  • [16] Distributed Intrusion Detection System for Wireless Sensor Networks
    Medhat, Karen
    Ramadan, Rabie A.
    Talkhan, Ihab
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 234 - 239
  • [17] A Hierarchical Intrusion Detection System in Wireless Sensor Networks
    Islam, Md. Safiqul
    Khan, Razib Hayat
    Bappy, Dewan Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 21 - 26
  • [18] Hybrid intrusion detection system for wireless sensor networks
    Hai, Tran Hoang
    Khan, Faraz
    Huh, Eui-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 383 - 396
  • [19] Privacy Protection and Intrusion Detection System of Wireless Sensor Network Based on Artificial Neural Network
    Shi, Lusheng
    Li, Kai
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [20] Intelligent Intrusion Detection System in Wireless Sensor Network
    Sardar, Abdur Rahaman
    Sahoo, Rashmi Ranjan
    Singh, Moutushi
    Sarkar, Souvik
    Singh, Jamuna Kanta
    Majumder, Koushik
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 707 - 712