Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

被引:29
作者
Rajasoundaran, S. [1 ]
Prabu, A., V [2 ,8 ]
Routray, Sidheswar [3 ,7 ]
Malla, Prince Priya [4 ]
Kumar, G. Sateesh [5 ]
Mukherjee, Amrit [6 ,7 ]
Qi, Yinan [7 ]
机构
[1] VIT Bhopal Univ, Sch Comp Sci & Engn, Bhopal, Madhya Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept Elect & Commun Engn, Guntur, Andhra Pradesh, India
[3] Indrashil Univ, Sch Engn, Dept Comp Sci & Engn, Mehsana, Gujarat, India
[4] Kalinga Inst Ind Technol KIIT, Sch Elect Engn, Bhubaneswar, India
[5] AITAM, Dept Elect & Commun Engn, Tekkali, India
[6] Univ South Bohemia Ceske Budejovice, Fac Sci, Dept Comp Sci, Ceske Budejovice, Czech Republic
[7] Zhejiang Univ, Zhejiang Lab, Hangzhou, Peoples R China
[8] Jawaharlal Nehru Technol Univ, Dept ECE, Kakinada, India
关键词
5G; IoT; Wireless sensor networks; Deep learning; Multi-watchdog; Security; IDS; Particle analysis; INTRUSION DETECTION; SCHEME; AUTHENTICATION; OPTIMIZATION; ALGORITHM; PROTOCOL; INTERNET; NODES;
D O I
10.1016/j.comcom.2022.02.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fifth Generation (5G) security principles are widely expected with effective cryptography models, information security models, Machine Learning (ML) based Intrusion Detection systems (IDS) for Internet of Things (IoT) based Wireless Sensor Networks (WSN). However, the current security models are insufficient against the dynamic network nature of WSNs. On this scope, the proposed system develops Deep Convolutional Neural Network (DCNN) and Distributed Particle Filtering Evaluation Scheme (DPFES) for constructing a secure and cooperative multi-watchdog system. The proposed Deep Learning (DL) based dynamic multi-watchdog system protects each sensor node by monitoring the node transmission. In addition, the proposed work encompasses secure data-centric and node-centric evaluation procedures that are required for expanding the secure medium of 5G-based IoT-WSN networks. The DL-based network evaluation procedures drive the entire network to build a secure multi-watchdog system that enables on-demand active watchdog IDS agents among dense IoT-WSN. Notably, the proposed work contains a system dynamics model, cooperative watchdog model, Dual Line Minimum Connected Dominating Set (DL-MCDS), and DL-based event analysis procedures. Based on technical aspects, the proposed system is motivated to implement DPFES to analyze network events using particle filtering frameworks to build a secure 5G environment. The system is implemented and results are compared with related works. The performance of the proposed cooperative multi-watchdog system delivers 10% and 15% of better results than other techniques.
引用
收藏
页码:71 / 82
页数:12
相关论文
共 51 条
[1]   Intrusion Detection Systems in Wireless Sensor Networks: A Review [J].
Alrajeh, Nabil Ali ;
Khan, S. ;
Shams, Bilal .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[2]   An efficient data transmission scheme through 5G D2D-enabled relays in wireless sensor networks [J].
Barik, Pradip Kumar ;
Singhal, Chetna ;
Datta, Raja .
COMPUTER COMMUNICATIONS, 2021, 168 :102-113
[4]   Cooperative communication based access technique for sensor networks [J].
Bayrakdar, Muhammed Enes .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2020, 107 (02) :212-225
[5]   Genetically derived secure cluster-based data aggregation in wireless sensor networks [J].
Bhasker, Lathies .
IET INFORMATION SECURITY, 2014, 8 (01) :1-7
[6]   A lightweight trust management based on Bayesian and Entropy for wireless sensor networks [J].
Che, Shenyun ;
Feng, Renjian ;
Liang, Xuan ;
Wang, Xiao .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) :168-175
[7]   Minimum connected dominating set based RSU allocation for smartCloud vehicles in VANET [J].
Chinnasamy, A. ;
Sivakumar, B. ;
Selvakumari, P. ;
Suresh, A. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :12795-12804
[8]   A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks [J].
Deebak, B. D. ;
Al-Turjman, Fadi .
AD HOC NETWORKS, 2020, 97
[9]   A SURVEY OF SECURITY ISSUES IN MOBILE AD HOC AND SENSOR NETWORKS [J].
Djenouri, Djamel ;
Khelladi, Lyes ;
Badache, Nadjib .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2005, 7 (04) :2-28
[10]  
GARNAUT R, 1992, ECONOMIC REFORM AND INTERNATIONALISATION: CHINA AND THE PACIFIC REGION, P1