Skip to main content

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks


The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Data availability

Data sharing not applicable—no new data generated.


  • Aliady WA, Al-Ahmadi SA (2019) Energy preserving secure measure against wormhole attack in wireless sensor networks. IEEE Access 7:84132–84141

    Article  Google Scholar 

  • Babaeer HA, Al-Ahmadi SA (2020) Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access 8:92098–92109

    Google Scholar 

  • Baraneetharan E (2020) Role of machine learning algorithms intrusion detection in WSNs: a survey. J Inf Technol 2(03):161–173

    Google Scholar 

  • Borkar GM, Patil LH, Hutke A (2019) A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput: Inform Syst 23:120–135

    Google Scholar 

  • Deshmukh-Bhosale S, Sonavane SS (2019) A real-time intrusion detection system for wormhole attack in the RPL based internet of things. Procedia Manuf 32:840–847

    Article  Google Scholar 

  • Ding J, Zhang H, Guo Z, Yuanming Wu (2021) The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks. IEEE Access 9:20954–20967

    Article  Google Scholar 

  • Elmahdi E, Yoo S-M, Sharshembiev K (2020) Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J Inform Secur Appl 51:1–10

    Google Scholar 

  • Ezhilarasi M, Krishnaveni V (2019) An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks. Soft Comput 23(18):8367–8377

    Article  Google Scholar 

  • Govindasamy J, Punniakody S (2018) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inform Technol 5(3):735–744

    Article  Google Scholar 

  • Haoxiang W, Smys S (2021) A survey on digital fraud risk control management by automatic case management system. J Electr Eng Autom 3(1):1–14

    Article  Google Scholar 

  • Hua J, Zhou Z, Zhong S (2021) Flow misleading: worm-hole attack in software-defined networking via building in-band covert channel. IEEE Trans Inf Forensics Secur 16:1029–1043

    Article  Google Scholar 

  • Jinhui X, Yang T, Yao H (2018) Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Comput Sci 131:1188–1195

    Article  Google Scholar 

  • Kalkha H, Satori H, Satori K (2019) Preventing black hole attack in wireless sensor network using HMM. Procedia Comput Sci 148:552–561

    Article  Google Scholar 

  • Liu Y, Ma M, Liu X, Xiong NN, Liu A, Zhu Y (2020) Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans Netw Sci Eng 7(1):356–372

    Article  Google Scholar 

  • López M, Peinado A, Ortiz A (2019) An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Comput Netw 165:1–37

    Article  Google Scholar 

  • Luo X, Chen Y, Li M, Luo Q, Xue K, Liu S, Chen L (2019) CREDND: a novel secure neighbor discovery algorithm for wormhole attack. IEEE Access 7:18194–18205

    Article  Google Scholar 

  • Nagarajan M and Karthikeyan S (2012) A new approach to increase the life time and efficiency of wireless sensor network. In: International conference on pattern recognition, informatics and medical engineering (PRIME-2012). IEEE

  • Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004

    Article  Google Scholar 

  • Padmanabhan J, Manickavasagam V (2018) Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems. IEEE Access 6:1753–1763

    Article  Google Scholar 

  • Sathesh A (2019) Enhanced soft computing approaches for intrusion detection schemes in social media networks. J Soft Comput Paradigm (JSCP) 1(02):69–79

    Google Scholar 

  • Sekhar CH, Venkata Rao K, Krishna Prasad MHM (2021) Deep learning algorithms for intrusion detection systems: extensive comparison analysis. Turk J Comput Math Educ 12(11):2990–3000

    Google Scholar 

  • Smys S, VijeshJoe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inform Technol 3(02):67–76

    Google Scholar 

  • Smys.S, Vijesh Joe.C, (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inf Technol 3(02):67–76

    Google Scholar 

  • Tsiota A, Xenakis D, Passas N, Merakos L (2019) On jamming and black hole attacks in heterogeneous wireless networks. IEEE Trans Veh Technol 68(11):10761–10774

    Article  Google Scholar 

  • Vashist A, Keats A, Dinakarrao SMP, Ganguly A (2019) Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks. IEEE Trans Very Large Scale Integr (VLSI) Systs 27(12):2781–2791

    Article  Google Scholar 

  • Yin R, Zhang F, Li X (2020) A security routing algorithm against selective forwarding attacks in scale-free networks. Procedia Comput Sci 174:543–548

    Article  Google Scholar 

  • Zuniga-Mejia J, Villalpando-Hernandez R, Vargas-Rosales C, Spanias A (2019) A linear systems perspective on intrusion detection for routing in reconfigurable wireless networks. IEEE Access 7:60486–60500

    Article  Google Scholar 

Download references


No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations


Corresponding author

Correspondence to M. Ezhilarasi.

Ethics declarations

Conflict of interest

None to declare.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V Suma.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A. et al. A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks. Soft Comput 27, 4157–4168 (2023).

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI:


  • Intrusion detection
  • Routing attacks
  • Wireless sensor networks
  • Neural networks