Moth Search Optimizer with Deep Learning Enabled Intrusion Detection System in Wireless Sensor Networks

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 4
Year of Publication : 2023
Authors : C. Murugesh, S. Murugan
pdf
How to Cite?

C. Murugesh, S. Murugan, "Moth Search Optimizer with Deep Learning Enabled Intrusion Detection System in Wireless Sensor Networks," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 4, pp. 77-90, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I4P108

Abstract:

The latest wireless sensor network (WSN) developments in critical applications have introduced security risks, like jamming. Intrusion Detection System (IDS) in WSN is the method of recognizing malevolent or unauthorized activities in the network. The intruder's presence to launch different attacks within the network cannot be disregarded. Despite a great deal of effort by the researcher workers, IDS still experienced difficulties enhancing recognition performance while minimizing the false alarm rate and identifying novel intrusions. Recently, Deep Learning (DL) and Machine Learning (ML) based IDS system has been deployed as promising solution to effectively identify intrusion across the network. Therefore, the study presents a Moth Search Optimization with DL-based Intrusion Detection (MSODL-ID) method in the WSN. The MSODL-ID technique aims to effectually identify the occurrence of malicious activities or intrusions in the network. To accomplish this, the MSODL-ID technique undergoes two stages of preprocessing: data conversion and data scaling. In addition, the MSODL-ID technique employs Convolutional Recurrent Neural Network (CRNN) model with a Hopfield layer for intrusion detection purposes. For optimal hyperparameter selection of the CRNN model, the MSO algorithm is used and thereby enhances the classification performance of the CRNN model. The stimulation analysis of the MSODL-ID system is tested by means of Kaggle datasets, and the outcomes exhibit the promising performance of the MSODL-ID system over other current DL approaches.

Keywords:

Intrusion Detection System, Wireless Sensor Networks, Deep Learning, Security, Moth Search Optimizer.

References:

[1] Sumit Pundir et al., “Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges,” IEEE Access, vol. 8, pp. 3343-3363, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Aftab Alam Abdussami, and Mohammed Faizan Farooqui, “Incremental Deep Neural Network Intrusion Detection in Fog Based IOT Environment: An Optimization Assisted Framework,” Indian Journal of Computer Science and Engineering, vol. 12, no. 6, pp. 1847- 1859, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] N.V.L. Ch.Satya Keerthi et al., "Intrusion Detection System Using Genetic Algorithm,” International Journal of P2P Network Trends and Technology, vol. 1, no. 2, pp. 1-7, 2011.
[Publisher Link]
[4] Weidong Fang et al., “TMSRS: Trust Management-Based Secure Routing Scheme in Industrial Wireless Sensor Network with Fog Computing,” Wireless Networks, vol. 26, no. 5, pp.3169-3182, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Nausheen Sahar, Ratnesh Mishra, and Sidra Kalam, “Deep Learning Approach-Based Network Intrusion Detection System for Fog-Assisted IoT,” In Proceedings of International Conference on Big Data, Machine Learning and Their Applications, pp. 39-50, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Md Arafatur Rahman et al., “Scalable Machine Learning-Based Intrusion Detection System for IoT-Enabled Smart Cities,” Sustainable Cities and Society, vol. 61, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Sohail Saif et al., “HIIDS: Hybrid Intelligent Intrusion Detection System Empowered with Machine Learning and Metaheuristic Algorithms for Application in IoT Based Healthcare,” Microprocessors and Microsystems, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Phyu Thi Htun, and Kyaw Thet Khaing, “Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor,” International Journal of P2P Network Trends and Technology , vol. 3, no. 1, pp. 39-43, 2013.
[Google Scholar] [Publisher Link]
[9] Thavavel Vaiyapuri et al., “Deep Learning Approaches for Intrusion Detection in IIoT Networks–Opportunities and Future Directions,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, pp. 86-92, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] M.P. Ramkumar et al., “Intrusion Detection Using Optimized Ensemble Classification in Fog Computing Paradigm,” Knowledge-Based Systems, vol. 252, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Cristiano Antonio de Souza et al., “Intrusion Detection and Prevention in Fog Based IoT environments: A Systematic Literature Review, Computer Networks, vol. 214, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Victor Chang et al., “A Survey on Intrusion Detection Systems for Fog and Cloud Computing,” Future Internet, vol. 14, no. 3, pp. 89, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Maamar Ali Saud AL Tobi et al., “Machinery Faults Diagnosis using Support Vector Machine (SVM) and Naïve Bayes classifiers,” International Journal of Engineering Trends and Technology, vol. 70, no. 12, pp. 26-34, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] S. Shashikala, and G. K. Ravikumar, "Deep Studying Signature for Obstruction obscure in Copy Move Image Forgeries," International Journal of Engineering Trends and Technology, vol. 70, no. 10, pp. 262-270, 2022.
[CrossRef] [Publisher Link]
[15] S. Revathi, and A. Malathi."Network Intrusion Detection Using Hybrid Simplified Swarm Optimization Technique,” International Journal of P2P Network Trends and Technology, vol. 3, no. 5, pp. 6-10, 2013.
[Google Scholar] [Publisher Link]
[16] Stanislav Yamashkin et al., "Metageosystem Analysis Based on a System of Machine Learning and Simulation Algorithms,” International Journal of Engineering Trends and Technology, vol. 70, no. 12, pp. 1-12, 2022.
[CrossRef] [Publisher Link]
[17] Ranjeet B. Kagade, and Santhosh Jayagopalan, “Optimization Assisted Deep Learning Based Intrusion Detection System in Wireless Sensor Network with Two‐Tier Trust Evaluation,” International Journal of Network Management, vol. 32, no. 4, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Pooja Manisha, and Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 1-6, 2013.
[Google Scholar] [Publisher Link]
[19] S. Muruganandam et al., “A Deep Learning Based Feed Forward Artificial Neural Network to Predict The K-Barriers for Intrusion Detection Using a Wireless Sensor Network,” Measurement: Sensors, vol. 25, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Mohammed Otair et al., “An Enhanced Grey Wolf Optimizer Based Particle Swarm Optimizer for Intrusion Detection System in Wireless Sensor Networks,” Wireless Networks, vol. 28, no. 2, pp.721-744, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] R. Surendiran, and K. Alagarsamy, “A Crtitical Approach for Intruder Detection in Mobile Devices,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 4, pp.6-14, 2014.
[CrossRef] [Publisher Link]
[22] Sibi Amaran, and R. Madhan Mohan, “Intrusion Detection System Using Optimal Support Vector Machine for Wireless Sensor Networks,” International Conference on Artificial Intelligence and Smart Systems (ICAIS), pp. 1100-1104, 2021.
[Google Scholar] [Publisher Link]
[23] S. Gavaskar, E. Ramaraj, and R. Surendiran, “A Compressed Anti IP Spoofing Mechanism Using Cryptography,” IJCSNS International Journal of Computer Science and Network Security, vol. 12, no. 11, pp.137-140, 2012.
[Google Scholar] [Publisher Link]
[24] Ch. Mounika, and Ch. Suresh Babu, "A Novel Security Based Data Transmission Protocol for Cluster Based Wireless Sensor Networks,” International Journal of Computer and organization Trends, vol. 6, no. 1, pp. 1-7, 2016.
[CrossRef] [Publisher Link]
[25] Shaimaa Ahmed Elsaid, and Nouf Saleh Albatati, “An Optimized Collaborative Intrusion Detection System for Wireless Sensor Networks,” Soft Computing, vol. 24, no. 16, pp.12553-12567, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[26] P. Manjula, Priya, and S.Baghavathi, “An Effective Network Intrusion Detection and Classification System for Securing WSN using VGG-19 and Hybrid Deep Neural Network Techniques,” Journal of Intelligent & Fuzzy Systems, vol. 43, no. 5, pp.1-14, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Dai Jianjian, Tao Yang, and Yang Feiyue, “A Novel Intrusion Detection System Based on IABRBFSVM for Wireless Sensor Networks,” Procedia Computer Science, vol. 131, pp.1113-1121, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Mnahi Alqahtani et al., “A Genetic-Based Extreme Gradient Boosting Model for Detecting Intrusions in Wireless Sensor Networks,” Sensors, vol. 19, no. 20, pp. 4383, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Yu-Huei Cheng et al., “Automatic Music Genre Classification Based on CRNN,” Engineering Letters, vol. 29, no. 1, pp. 312-316, 2021.
[Google Scholar] [Publisher Link]
[30] Z. Tabekoueng Njitacke, J. Kengne, and H.B. Fotsin, “Coexistence of Multiple Stable States and Bursting Oscillations in a4d Hopfield Neural Network,” Circuits, Systems, and Signal Processing, vol. 39, pp.3424-3444, 2020.
[CrossRef] [Publisher Link]
[31] K. Shankar, Eswaran Perumal, and R. M. Vidhyavathi, “Deep Neural Network with Moth Search Optimization Algorithm Based Detection and Classification of Diabetic Retinopathy Images,” SN Applied Sciences, vol. 2, no. 748, pp.1-10, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Iman Almomani, Bassam Al-Kasasbeh, and Mousa AL-Akhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks,” Journal of Sensors, vol. 2016, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Gaoyuan Liu et al., “An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs,” Sensors, vol. 22, no. 4, pp. 1407, 2022.
[CrossRef] [Google Scholar] [Publisher Link]