The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price excludes VAT (USA)
Tax calculation will be finalised during checkout.
Data sharing not applicable—no new data generated.
Aliady WA, Al-Ahmadi SA (2019) Energy preserving secure measure against wormhole attack in wireless sensor networks. IEEE Access 7:84132–84141
Babaeer HA, Al-Ahmadi SA (2020) Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access 8:92098–92109
Baraneetharan E (2020) Role of machine learning algorithms intrusion detection in WSNs: a survey. J Inf Technol 2(03):161–173
Borkar GM, Patil LH, Hutke A (2019) A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput: Inform Syst 23:120–135
Deshmukh-Bhosale S, Sonavane SS (2019) A real-time intrusion detection system for wormhole attack in the RPL based internet of things. Procedia Manuf 32:840–847
Ding J, Zhang H, Guo Z, Yuanming Wu (2021) The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks. IEEE Access 9:20954–20967
Elmahdi E, Yoo S-M, Sharshembiev K (2020) Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks. J Inform Secur Appl 51:1–10
Ezhilarasi M, Krishnaveni V (2019) An evolutionary multipath energy-efficient routing protocol (EMEER) for network lifetime enhancement in wireless sensor networks. Soft Comput 23(18):8367–8377
Govindasamy J, Punniakody S (2018) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inform Technol 5(3):735–744
Haoxiang W, Smys S (2021) A survey on digital fraud risk control management by automatic case management system. J Electr Eng Autom 3(1):1–14
Hua J, Zhou Z, Zhong S (2021) Flow misleading: worm-hole attack in software-defined networking via building in-band covert channel. IEEE Trans Inf Forensics Secur 16:1029–1043
Jinhui X, Yang T, Yao H (2018) Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Comput Sci 131:1188–1195
Kalkha H, Satori H, Satori K (2019) Preventing black hole attack in wireless sensor network using HMM. Procedia Comput Sci 148:552–561
Liu Y, Ma M, Liu X, Xiong NN, Liu A, Zhu Y (2020) Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans Netw Sci Eng 7(1):356–372
López M, Peinado A, Ortiz A (2019) An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Comput Netw 165:1–37
Luo X, Chen Y, Li M, Luo Q, Xue K, Liu S, Chen L (2019) CREDND: a novel secure neighbor discovery algorithm for wormhole attack. IEEE Access 7:18194–18205
Nagarajan M and Karthikeyan S (2012) A new approach to increase the life time and efficiency of wireless sensor network. In: International conference on pattern recognition, informatics and medical engineering (PRIME-2012). IEEE
Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004
Padmanabhan J, Manickavasagam V (2018) Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems. IEEE Access 6:1753–1763
Sathesh A (2019) Enhanced soft computing approaches for intrusion detection schemes in social media networks. J Soft Comput Paradigm (JSCP) 1(02):69–79
Sekhar CH, Venkata Rao K, Krishna Prasad MHM (2021) Deep learning algorithms for intrusion detection systems: extensive comparison analysis. Turk J Comput Math Educ 12(11):2990–3000
Smys S, VijeshJoe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inform Technol 3(02):67–76
Smys.S, Vijesh Joe.C, (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inf Technol 3(02):67–76
Tsiota A, Xenakis D, Passas N, Merakos L (2019) On jamming and black hole attacks in heterogeneous wireless networks. IEEE Trans Veh Technol 68(11):10761–10774
Vashist A, Keats A, Dinakarrao SMP, Ganguly A (2019) Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks. IEEE Trans Very Large Scale Integr (VLSI) Systs 27(12):2781–2791
Yin R, Zhang F, Li X (2020) A security routing algorithm against selective forwarding attacks in scale-free networks. Procedia Comput Sci 174:543–548
Zuniga-Mejia J, Villalpando-Hernandez R, Vargas-Rosales C, Spanias A (2019) A linear systems perspective on intrusion detection for routing in reconfigurable wireless networks. IEEE Access 7:60486–60500
No funding was received to assist with the preparation of this manuscript.
Conflict of interest
None to declare.
This article does not contain any studies with human participants or animals performed by any of the authors.
Communicated by V Suma.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A. et al. A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks. Soft Comput 27, 4157–4168 (2023). https://doi.org/10.1007/s00500-022-06915-1
- Intrusion detection
- Routing attacks
- Wireless sensor networks
- Neural networks