Artificial Ecosystem Optimizer with Convolutional Recurrent Neural Network for Intrusion Detection System in Wireless Sensor Networks

International Journal of Electronics and Communication Engineering
© 2023 by SSRG - IJECE Journal
Volume 10 Issue 5
Year of Publication : 2023
Authors : C. Murugesh, S. Murugan
pdf
How to Cite?

C. Murugesh, S. Murugan, "Artificial Ecosystem Optimizer with Convolutional Recurrent Neural Network for Intrusion Detection System in Wireless Sensor Networks," SSRG International Journal of Electronics and Communication Engineering, vol. 10,  no. 5, pp. 62-75, 2023. Crossref, https://doi.org/10.14445/23488549/IJECE-V10I5P106

Abstract:

Wireless Sensor Network (WSN) encompasses Sensor Nodes (SNs) used to gather data regarding surroundings. Some features that make WSNs vulnerable to security attacks are open wireless medium, distributed nature, and multi-hop data forwarding. Several security-based solutions for WSNs were devised, like secure routing or security mechanisms, authentication, and key exchange for particular attacks. Such security mechanisms can ensure security at a certain level but cannot eradicate various security attacks. Intrusion Detection System (IDS) was crucial in preventing and detecting security attacks. This study develops an Artificial Ecosystem Optimizer with Convolutional Recurrent Neural Network for IDS (AEOCRNN-IDS) in WSN. The main aim of the AEOCRNN-IDS model lies in recognising and classifying intrusions present in the network. Data preprocessing is done in the suggested AEOCRNN-IDS model to make the data compatible for further processing. The AEOCRNN-IDS approach uses the CRNN technique in this study for intrusion detection and classification. Since hit-and-miss tuning selection is a dreary process, the AEOCRNN-IDS approach implements the AEO method for optimal tuning. The experimental validation of the AEOCRNN-IDS system was tested employing an intrusion database from the Kaggle repository. The extensive experimental analysis stated the authority of the AEOCRNN-IDS approach on IDS in the WSN.

Keywords:

Wireless Sensor Networks, Intrusion detection system, Security, Deep learning, Artificial ecosystem optimizer.

References:

[1] E. Baraneetharan, “Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey,” Journal of Information Technology and Digital World, vol. 2, no. 3, pp. 161-173, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mohammed S. Alsahli et al., “Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Abhilash Singh et al., “LT-FS-ID: Log-Transformed Feature Learning and Feature-Scaling-Based Machine Learning Algorithms to Predict the K-Barriers for Intrusion Detection Using Wireless Sensor Network,” Sensors, vol. 22, no. 3, p. 1070, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Saurabh Deshpande et al., “A Comparative Analysis of Machine Deep Learning Algorithms for Intrusion Detection in WSN,” In Security Issues and Privacy Threats in Smart Ubiquitous Computing, pp. 173-193, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Abhilash Singh et al., “AutoML-ID: Automated Machine Learning Model for Intrusion Detection Using Wireless Sensor Network,” Scientific Reports, vol. 12, no. 1, pp. 1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] GeetaSingh, and NeeluKhare, “A Survey of Intrusion Detection from the Perspective of Intrusion Datasets and Machine Learning Techniques,” International Journal of Computers and Applications, vol. 44, no. 7, pp. 659-669, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Hamza Elbahadır, and Ebubekir Erdem, “Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks,” In 2021 6th International Conference on Computer Science and Engineering (UBMK), pp. 401-406, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Pankaj Ramchandra Chandre, Parikshit Mahalle, and Gitanjali Shinde, “Intrusion Prevention System Using Convolutional Neural Network for Wireless Sensor Network,” International Journal of Artificial Intelligence (IJ-AI), vol. 11, no. 2, pp. 504-515, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] S. Suma Christal Mary et al., “Selfish Herd Optimization with Improved Deep Learning Based Intrusion Detection for Secure Wireless Sensor Network,” SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 4, pp. 1-8, 2023.
[CrossRef] [Publisher Link]
[10] D. Narmatha, W. Jenifa, and Pushpa Mettilsha, “Implementation of Cognitive Wireless Sensor Network with Energy Aware Cooperative Spectrum Sensing by Different Censoring Techniques,” SSRG International Journal of Electronics and Communication Engineering, vol. 7, no. 5, pp. 24-32, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] R. Anushiya, and V.S. Lavanya, “A New Deep-Learning with Swarm Based Feature Selection for Intelligent Intrusion Detection for the Internet of Things,” Measurement: Sensors, vol. 26, p. 100700, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Rashid Md Mamunur, A Novel Intrusion Detection System in IoT Networks Leveraging Blockchain-Enabled Federated Learning, 2023. [Online] Available: https://repository.pknu.ac.kr:8443/handle/2021.oak/32882
[13] KhurramHussain et al., “Hybrid of WOA-ABC and Proposed CNN for Intrusion Detection System in Wireless Sensor Networks,” Optik, vol. 271, p. 170145, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Judy Simon et al., “Hybrid Intrusion Detection System for Wireless IoT Networks Using Deep Learning Algorithm,” Computers and Electrical Engineering, vol. 102, p. 108190, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Gaoyuan Liu et al., “An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs,” Sensors, vol. 22, no. 4, p. 1407, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Hamza Elbahadır, and Ebubekir Erdem, “Modeling Intrusion Detection System Using Machine Learning Algorithms in Wireless Sensor Networks,” In 2021 6th International Conference on Computer Science and Engineering (UBMK), pp. 401-406, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Mohammad RezaBegli, Farnaz Derakhshan, and Hadis Karimipour, “A Layered Intrusion Detection System for Critical Infrastructure Using Machine Learning,” In 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), pp. 120-124, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Weimin Wen et al., “An Intrusion Detection Model Using Improved Convolutional Deep Belief Networks for Wireless Sensor Networks,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 36, no. 1, pp. 20-31, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Subarna Shakya, “Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection,” IRO Journal on Sustainable Wireless Systems, vol. 3, no. 2, pp. 118-127, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mohamed Hammad, Nabil Hewahi, and Wael Elmedany, “T-SNERF: A Novel High Accuracy Machine Learning Approach for Intrusion Detection Systems,” IET Information Security, vol. 15, no. 2, pp. 178-190, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Hafsa Benaddi et al., “A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) for Securing Wireless Sensor Networks and Internet of Things,” In International Wireless Internet Conference, pp. 73-87, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Longting Chen et al., “Health Indicator Construction of Machinery Based on End-to-End Trainable Convolution Recurrent Neural Networks,” Journal of Manufacturing Systems, vol. 54, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Kuntal Bhattacharjee, Kathan Shah, and Jatin Soni, “Solving Economic Dispatch Using Artificial Eco System-Based Optimization,” Electric Power Components and Systems, vol. 49, no. 11-12, pp. 1034-1051, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Iman Almomani, Bassam Al-Kasasbeh, and Mousa AL-Akhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks,” Journal of Sensors, vol. 2016, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Mnahi Alqahtani et al., “A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions in Wireless Sensor Networks,” Sensors, vol. 19, no. 20, p. 4383, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Shraddha Kamble, B.K Mishra, and Rajesh Bansode, “Detection of Routing Misbehaving Links in MANET by Advance EAACK Scheme,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 6, no. 3, pp. 1-5, 2016.
[CrossRef] [Publisher Link]
[27] Harikishan, and P. Srinivasulu, “Intrusion Detection System Using Fuzzy Inference System,” International Journal of Computer & organization Trends (IJCOT), vol. 3, no. 4, pp. 59-66, 2013.
[Google Scholar] [Publisher Link]
[28] S. Navya Sai, and K. KishoreRaju, “Improved Privacy Preserving Decision Tree Approach for Network Intrusion Detection,” International Journal of Computer & organization Trends (IJCOT), vol. 6, no. 1, pp. 55-60, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[29] S. Kulkarni Sagar, and A. Kahate Sandip, “Review of a Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Dis-contiguous System Call Patterns,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 6, pp. 9-12, 2015.
[CrossRef] [Publisher Link]
[30] Mohammad Dawood Momand, Vikas Thada, and Utpal Shrivastava, “Intrusion Detection System in IoT Network,” SSRG International Journal of Computer Science and Engineering, vol. 7, no. 4, pp. 11-15, 2020.
[CrossRef] [Publisher Link]