Secure Communication Using Multi-Layer Perceptron Neural Network and the Adaptive-Network-Based Fuzzy Inference System in Wireless Network

被引:0
作者
Kamala J. [1 ]
Nawaz G.M.K. [1 ]
机构
[1] Sona College of Arts and Science, Tamil Nadu, Salem
基金
英国科研创新办公室;
关键词
Classification; Decision-making; Feature selection; Intrusion detection; Pre-processing; Traffic dataset; WSN;
D O I
10.1007/s42979-023-02121-4
中图分类号
学科分类号
摘要
A Wireless Sensor Network (WSN) consists of many sensor nodes that collect data from various environmental conditions using the Internet of Things (IoT) and are often used to monitor and tune network environments. In this case, the presence of malicious nodes in the network leads to transmission security challenges, as it is believed to be a significant problem for successfully delivering captured data. Therefore, it is essential to protect network communication from security threats by detecting dangerous behavior for each sensor node and separating malicious nodes. This can be achieved by deploying an Intrusion Detection System (IDS) at the sensor nodes. However, limitations exist when dealing with high-dimensional data with complex underlying distributions. To tackle this issues, we introduce the Multi-layer Perceptron Neural Network (MLPNN) algorithm and the Adaptive-Network-Based Fuzzy Inference System (ANFIS) algorithm for secure communication in WSN. Initially, we gathered a dataset called Darknet Internet Traffic from an online source. This dataset was organized using the Min–Max Scaling (MMS) technique. Afterwards, our proposed method identifies the network traffic using Traffic Intensive Cumulative Rate (TICR) method. Based on the network traffic, we analyze the transmission delay and optimal route using Trust factor Evaluation Rate (TFER). Next, it picks the best features of malicious activity using the ANFIS algorithm. Lately, our proposed MLPNN classifier with ReLU activation function has been used to categorize malicious activity and improve security in the network. Therefore, the proposed classifier's significant advantages in this paper include increased classification accuracy, precision, recall, and F1-score. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 22 条
[1]  
Maheswari M., Karthika R.A., A Novel hybrid deep learning framework for intrusion detection systems in WSN-IoT networks, Intell Autom Soft Comput, 33, (2022)
[2]  
Tsai C.W., Lai C.F., Vasilakos A.V., Future internet of things: open issues and challenges, Wireless Netw, 20, 8, pp. 2201-2217, (2014)
[3]  
Elrawy M., Awad A., Hamed H., Intrusion detection systems for IoT-based smart environments: a survey, J Cloud Comp, 7, (2018)
[4]  
Benaddi H., Et al., A deep reinforcement learning based intrusion detection system (DRL-IDS) for securing wireless sensor networks and internet of things, International Wireless Internet Conference, (2019)
[5]  
Sood T., Prakash S., Sharma S., Singh A., Choubey H., Intrusion detection system in wireless sensor network using conditional generative adversarial network, Wireless Pers Commun, 126, (2022)
[6]  
Jeyanthi D.V., Indrani B., Iot Based Intrusion Detection System for Healthcare Using Rnnbilstm Deep Learning Strategy with Custom Features, (2022)
[7]  
Wang J., Hu F., Li L., Deep Bi-directional Long Short-Term Memory Model for Short-Term Traffic Flow Prediction, Neural Information Processing. ICONIP, (2017)
[8]  
Chaitanya K., Narayanan S., Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey, 2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 2023, pp. 1-8
[9]  
Le Jeune L., Goedeme T., Mentens N., Machine learning for misuse-based network intrusion detection: overview, unified evaluation and feature choice comparison framework, IEEE Access, 9, pp. 63995-64015, (2021)
[10]  
Dener M., Al S., Orman A., STLGBM-DDS: an efficient data balanced DoS detection system for wireless sensor networks on big data environment, IEEE Access, 10, pp. 92931-92945, (2022)