A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

被引:0
作者
M. Ezhilarasi
L. Gnanaprasanambikai
A. Kousalya
M. Shanmugapriya
机构
[1] Sri Ramakrishna Engineering College,Department of EEE
[2] Karpagam Academy of Higher Education,Department of Computer Science
[3] Sri Krishna College of Engineering and Technology,Department of IT
[4] Ayya Nadar Janaki Ammal College,Department of Computer Science
来源
Soft Computing | 2023年 / 27卷
关键词
Intrusion detection; Routing attacks; Wireless sensor networks; Neural networks;
D O I
暂无
中图分类号
学科分类号
摘要
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.
引用
收藏
页码:4157 / 4168
页数:11
相关论文
共 75 条
  • [1] Aliady WA(2019)Energy preserving secure measure against wormhole attack in wireless sensor networks IEEE Access 7 84132-84141
  • [2] Al-Ahmadi SA(2020)Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking IEEE Access 8 92098-92109
  • [3] Babaeer HA(2020)Role of machine learning algorithms intrusion detection in WSNs: a survey J Inf Technol 2 161-173
  • [4] Al-Ahmadi SA(2019)A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept Sustain Comput: Inform Syst 23 120-135
  • [5] Baraneetharan E(2019)A real-time intrusion detection system for wormhole attack in the RPL based internet of things Procedia Manuf 32 840-847
  • [6] Borkar GM(2021)The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks IEEE Access 9 20954-20967
  • [7] Patil LH(2020)Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks J Inform Secur Appl 51 1-10
  • [8] Hutke A(2019)An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks Soft Comput 23 8367-8377
  • [9] Deshmukh-Bhosale S(2018)A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack J Electr Syst Inform Technol 5 735-744
  • [10] Sonavane SS(2021)A survey on digital fraud risk control management by automatic case management system J Electr Eng Autom 3 1-14