ETELMAD: Anomaly Detection Using Enhanced Transient Extreme Machine Learning System in Wireless Sensor Networks

被引:0
作者
Chaya Ravindra
Manjunath R. Kounte
Gangadharaiah Soralamavu Lakshmaiah
V. Nuthan Prasad
机构
[1] Reva University,School of ECE
[2] REVA University,School of Electronics Communications Engineering
[3] Ramaiah Institute of Technology,Department of Electronics and Communication Engineering
[4] Ramaiah Institute of Technology,undefined
来源
Wireless Personal Communications | 2023年 / 130卷
关键词
Wireless sensor network; Anomaly detection; Prediction; Enhanced transient search optimization;
D O I
暂无
中图分类号
学科分类号
摘要
Anomaly detection is a major task for ensuring security in WSNs, and they are sensitive to several attacks, which cause the node to break and generate faulty results. This proposed architecture introduces a method named Enhanced Transient Extreme Learning Machine Anomaly Detection to resolve such an issue. The detection of anomalies in the sensor data is recorded in three stages: data compression, prediction, and anomalous detection. The data collected from the network is pre-processed, and the duplicate values are eliminated from the dataset. Piecewise Aggregate Approximation is employed for the data compression process. This method can extract a low-dimensional set of features with less dimension and high accuracy. The reduction in dimensionality plays a major role in the WSN environment and attains less computation or training time. The second phase is prediction, done by an Extreme Learning Machine (ELM). The parameters of ELM are optimized by the meta-heuristic approach Enhanced Transient Search Arithmetic Optimization. Finally, the anomalous data is detected using the dynamic thresholding method. Dynamic thresholding is a process that generates a set of threshold values to differentiate the normal and abnormal sensed data. The PYTHON platform is used to simulate the proposed process. The achieved performance is compared over other models based on some measures to depict the efficacy of the proposed anomaly detection model. The overall accuracy achieved by this proposed architecture for the IBRL dataset is 97.4%, which is more efficient than other existing approaches.
引用
收藏
页码:21 / 41
页数:20
相关论文
共 97 条
[1]  
Yu JY(2020)A survey on security requirements for WSNs: Focusing on the characteristics related to security IEEE Access 8 45304-45324
[2]  
Lee E(2018)Remote monitoring and reconfiguration of environment and structural health using wireless sensor networks Materials Today: Proceedings 5 1169-1175
[3]  
Oh SR(2018)ResiDI: Towards a smarter smart home system for decision-making using wireless sensors and actuators Computer Networks 135 54-69
[4]  
Seo YD(2020)Hybrid intrusion detection system for Internet of things (IoT) Journal of ISMAC 2 190-199
[5]  
Kim YG(2021)Security and application of wireless sensor network Procedia Computer Science 183 486-492
[6]  
Rekha KS(2021)Metric routing protocol for detecting untrustworthy nodes for packet transmission Journal of Information Technology 3 67-76
[7]  
Sreenivas TH(2020)Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach Software: Practice and Experience 50 428-446
[8]  
Kulkarni AD(2018)A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study Sensors 18 2491-889
[9]  
Geraldo Filho PR(2020)LUCID: A practical, lightweight deep learning solution for DDoS attack detection IEEE Transactions on Network and Service Management 17 876-14
[10]  
Villas LA(2017)Self-maintenance model for wireless sensor networks Computers and Electrical Engineering 70 1-191