Skip to main content
Log in

Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless devices which are deployed in a physical environment to monitor the various environmental conditions. The data collected by the positioned sensor nodes is transmitted through the destination nodes by using multi hop communications. WSNs offer numerous advantages over the othernetworks, including enhanced flexibility, low cost, and simplified deployment. Due to the resource- constraint nature of WSN, it faces various challenges and issues that need to be addressed in order to ensure reliable and secure data transmission. The nodes of WSN are highly vulnerable to various types of security attacks namely black hole attack, Denial of Service (DoS), and node compromise attack. Among these attacks, black hole attack causes a serious threat to the nodes in the network. This attack is carried out by malicious nodes that intentionally drop all data packets and control packets without forwarding them to the intended destination. To ensure the security of the network for black hole attack, it is necessary to design an efficient Intrusion Detection Technique for detecting malicious nodes. In this work, a novel Fuzzy Logic-based Intrusion Detection System with Hidden Markov Model (FIDS-HMM) is proposed to identify the malicious nodes and mitigate the black hole attack. Moreover, an HMM is employed in the proposed protocol to monitor the energy levels of the nodes in order to detect the malicious nodes effectively. The implementation of the proposed protocol is carried out by using NS2 simulator. Simulation results justify the proposed protocol namely FIDS-HMM provides an efficient detection mechanism for black hole attacks in the network. Moreover, the proposed protocol improves the Quality of Service (QoS) parameters, namely packet delivery ratio, delay, and throughput in the network with efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Data is available based on the reasonable request.

References

  1. Jiang S, Zhao J, Xu X (2020) SLGBM: an intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548–169558

    Article  Google Scholar 

  2. Subramani S, Selvi M, Kumar SS, Thangaramya K, Anand M, Kannan A (2023) An intrusion detection system for securing iot based sensor networks from routing attacks. Int Conf Comput Commun Signal Process 321–334

  3. Salmi S, Oughdir L (2023) Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network. J Big Data, Springer 10:1–25

    Google Scholar 

  4. Bout E, Loscri V, Gallais A (2020) Energy and distance evaluation for jamming attacks in wireless networks. IEEE/ACM Int Symp Distrib Simul Real Time Appl (DS-RT) 1–5

  5. Sasirekha D, Radha N (2017) Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks. Int Conf Commun Electron Syst (ICCES) 505–510

  6. Yasin A, Abu Zant M (2018) Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel Commun Mob Comput, Hindawi 2018:1–10

    Article  Google Scholar 

  7. Zhukabayeva TK, Mardenov EM, Abdildaeva AA (2020) Sybil attack detection in wireless sensor networks. Int Conf Appl Inf Commun Technol (AICT), IEEE 1–6

  8. Balasubadra K, Shiny XA, Pramila PV, Solainayagi P, Maniraj SP (2023) Hidden Markov Model with machine learning-based black hole attack identification in wireless sensor networks. Int Conf Intell Innov Technol Comput Electr Electron (IITCEE) 829–833

  9. Wazid M, Das AK (2017) A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel Pers Commun, Springer 94:1165–1191

    Article  Google Scholar 

  10. Rana P, Batra I, Malik A, Imoize AL, Kim Y, Pani SK, Goyal N, Kumar A, Rho S (2022) Intrusion detection systems in cloud computing paradigm: Analysis and overview. Complexity, Hindawi 3999039:2022

    Google Scholar 

  11. Subramani S, Selvi M (2023) Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik 273:170419

    Article  ADS  Google Scholar 

  12. Subramani S, Selvi M (2023) Intelligent IDS in wireless sensor networks using deep fuzzy convolutional neural network. Neural Comput Appl, Springer 1–20

  13. Anand M, Kumar SP, Selvi M, Kumar SS, Ram GD, Kannan A (2023) Deep learning model based IDS for detecting cyber attacks in IoT based smart vehicle network. In Conf Sustain Comput Data Commun Syst (ICSCDS) 281–286

  14. Nancy P, Muthurajkumar S, Ganapathy S, Santhosh Kumar SVN, Selvi M, Arputharaj K (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Commun 14(5):888–895

    Article  Google Scholar 

  15. Joshi G, Sharma V (2023) Hidden Markov Trust for attenuation of selfsh and malicious nodes in the IoT network. Wireless Pers Commun 128:1437–1469

    Article  Google Scholar 

  16. Affane AR, Satori H, Sanhaji F, Boutazart Y, Satori K (2023) Energy enhancement of routing protocol with hidden Markov model in wireless sensor networks. Neural Comput Appl, Springer 35:5381–5393

    Article  Google Scholar 

  17. Balasubadra K, Asha Shiny XS, Pramila PV, Solainayagi P, Maniraj SP (2023) Hidden Markov Model with machine learning-based black hole attack identification in wireless sensor networks. Int Conf Intell Innov Technol Comput Electr Electron (IITCEE), IEEE 829–833

  18. Salmi S, Oughdir L (2022) LCNN-LSTM based approach for dos attacks detection in wireless sensor networks. Int J Adv Comput Sci Appl 13(4):835–841

    Google Scholar 

  19. Aggarwal M, Khullar V, Goyal N, Singh A, Tolba A, Thompson EB, Kumar S (2023) Pre-trained deep neural network-based features selection supported machine learning for rice leaf disease classification. Agriculture, MDPI 2023

  20. Rajasoundaran S, Kumar SS, Selvi M, Thangaramya K, Arputharaj K (2023) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wirel Netw 1–23

  21. Dey MR, Patra M, Mishra P (2023) Efficient detection and localization of DoS attacks in heterogeneous vehicular networks. IEEE Trans Veh Technol 1–15

  22. Farahani G (2021) Black hole attack detection using k-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks. Secur Commun Netw, Hindawi 2021(8814141):1–15

    Google Scholar 

  23. Lakshmi Narayanan K, Santhana Krishnan R, Golden Julie E, Harold Robinson Y, Shanmuganathan V (2022) Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks. Wirel Pers Commun 127:479–503

    Article  Google Scholar 

  24. Pajila PB, Julie EG, Robinson YH (2022) FBDR-fuzzy based DDoS attack detection and recovery mechanism for wireless sensor networks. Wirel Pers Commun 122:3053–3083

    Article  Google Scholar 

  25. Yao C, Yang Y, Yin K, Yang J (2022) Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network. IEEE Access 10

  26. Clement Sunder AJ, Shanmugam A (2020) Black hole attack detection in healthcare wireless sensor networks using independent component analysis machine learning technique. Curr Signal Transduct Ther Bentham Sci 15:56–64

    Article  Google Scholar 

  27. Kumar A, Sharma S, Singh A, Alwadain A, Choi BJ, Manual-Brenosa J, Ortega-Mansilla A, Goyal N (2021) Revolutionary strategies analysis and proposed system for future infrastructure in internet of things. Sustainability, MDPI 2021

  28. Raghavendra T, Anand M, Selvi M, Thangaramya K, Kumar SS, Kannan A (2022) An intelligent RPL attack detection using machine learning-based intrusion detection system for internet of things. Procedia Comput Sci, Elsevier 215:61–70

    Article  Google Scholar 

  29. Murali S, Jamalipour A (2020) A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet Things J 7:1

    Article  Google Scholar 

  30. Gite P, Chouhan K, Krishna KM, Nayak CK, Soni M, Shrivastava A (2021) ML based intrusion detection scheme for various types of attacks in a WSN using C4.5 and CART classifiers. Maters Today: Proc, Elsevier, 1–8

  31. Hikal NA, Shams MY, Salem H, Eid MM (2021) Detection of black-hole attacks in MANET using adaboost support vector machine. J Intell Fuzzy Syst 41:669–682

    Article  Google Scholar 

  32. Qazi S, Raad R, Mu Y, Susilo W (2013) Securing DSR against wormhole attacks in multirate ad hoc networks. J Netw Comput Appl 36(2):582–592

    Article  Google Scholar 

  33. Singh R, Singh J, Singh R (2016) WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mob Inf Syst, Hindawi 2016:1–14

    Google Scholar 

  34. Younas S, Rehman F, Maqsood T, Mustafa S, Akhunzada A, Gani A (2022) Collaborative detection of black hole and gray hole attacks for secure data communication in VANETs. Appl Sci, MDPI 12:1–17

    Google Scholar 

  35. Sharma S, Kaul A (2018) A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Veh Commun 12:138–164

    Google Scholar 

  36. Santhosh Kumar SV, Selvi M, Kannan A (2023) Comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Comput Intell Neurosci, Hindawi 2023:1–24

    Article  Google Scholar 

  37. Kasim Ö (2020) An efficient and robust deep learning based network anomaly detection against distributed denial of service attacks. Comput Netw, Elsevier 180

  38. Dener M, Al S, Orman A (2022) STLGBM-DDS: an efficient data balanced DoS detection system for wireless sensor networks on big data environment. IEEE Access 10:92931–92945

    Article  Google Scholar 

  39. Logambigai R, Kannan A (2016) Fuzzy logic based unequal clustering for wireless sensor networks. Wirel Netw, Springer 22:945–957

    Article  Google Scholar 

  40. Moundounga AR, Satori H, Boutazart Y, Abderrahim E (2023) Malicious attack detection based on continuous Hidden Markov Models in wireless sensor networks. Microprocess Microsyst, Elsevier 101:104888

    Article  Google Scholar 

Download references

Funding

There is no funding used to conduct this work.

Author information

Authors and Affiliations

Authors

Contributions

Binthiya A designed the algorithm, performed the simulation results and drafted the manuscript under the supervision of Dr. Selvi Ravindran. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Binthiya A.

Ethics declarations

Ethics approval

This research work does not involve any human participants and / or animals.

Human and animal ethics

This research work does not involve any human participants and/or animals.

Consent for publication

All authors agree with the content and both of them has given their explicit consent to submit.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: 1- Track on Networking and Applications

Guest Editor: Vojislav B. Misic

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

A, B., Ravindran, S. Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01629-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01629-7

Keywords

Navigation