Skip to main content
Log in

Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Malicious attacks like denial-of-service massively affect the network activities of wireless sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of the network. Anomaly based intrusion detection system (AIDS) are designed for monitoring such unpredictable attacks but it generates high false positive. In the proposed study we design robust and efficient AIDS which use fuzzy and neural network (NN) based tools. The proposed system can be implemented in each node as it is lightweight and does not consume much overhead. Also it can independently monitor the local nodes behaviour and identify whether a node is trust, distrust or enemy. The use of a trained NN filters the false alarms generated due to fuzzy logic applied in the first step thus enhancing the system accuracy. We evaluate the system’s performance in NS2.35 and result shows a 100% true positive with 0% false positive.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Lakshmi, H. N., Anand, S., & Sinha, S. (2019). Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8(5), 1792–1796.

    Google Scholar 

  2. Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2014). DoS and DDoS attacks: Defense, detection and traceback mechanisms—A survey. Global Journal Computer Science & Technology, 14(7), 1–19.

    Google Scholar 

  3. Zargar, S. T., Jyoti, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communication Survey & Tutorials, 15(4), 2046–2069.

    Article  Google Scholar 

  4. Sonar, K., & Upadhyay, H. (2014). Asurvey: DDoS attack on internet of things. International Journal of Engineering Research and Development, 10(11), 58–63.

    Google Scholar 

  5. Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM.

  6. Paul, A., & Sinha, S. (2017). Performance analysis of received signal power-based sybil detection in MANET using spline curve. International Journal of Mobile Network Design and Innovation, 7(3/4), 222–232.

    Article  Google Scholar 

  7. Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multi hop data delivery in wireless sensor networks. International Journal of Security and Networks, 1(3/4), 167–178.

    Article  Google Scholar 

  8. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on information processing in sensor networks, IPSN’04 (New York, NY, USA). ACM.

  9. Sun, B., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communication, 14(5), 56–63.

    Article  Google Scholar 

  10. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. In Y. Xiao (Ed.), Security in distributed, grid, and pervasive computing (Chapter 17). Boca Raton: Auerbach Publications, CRC Press.

    Google Scholar 

  11. Kizza, J. M. (2017). System intrusion detection and prevention: Guide to computer network security. Computer Communications and Networks. Berlin: Springer.

    Book  Google Scholar 

  12. Kumar, S., & Dutta, K. (2016). Intrusion detection in mobile ad hoc networks: Techniques, systems, and future challenges. Security and Communication Network. https://doi.org/10.1002/sec.1484.

    Article  Google Scholar 

  13. Abduvaliyev, A., Pathan, A. S. K., Jianying, Z., Roman, R., & Wai-Choong, W. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15(3), 1223–1237.

    Article  Google Scholar 

  14. Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.

    Article  Google Scholar 

  15. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42–57.

    Article  Google Scholar 

  16. Gupta, A., Pandey, O., Shukla, M., Dadhich, A., Mathur, S., & Ingle, A. (2013). Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks. In Computational intelligence and computing research (ICCIC), IEEE international conference (pp. 1–7).

  17. Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Application, 121(9), 1–9.

    Article  Google Scholar 

  18. Pastrana, S., Mitrokotsa, A., Orfila, A., & Peris-Lopez, P. (2012). Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems, 36, 217–225.

    Article  Google Scholar 

  19. Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2017.02.009.

    Article  Google Scholar 

  20. Mehmood, A., Mukherjee, M., & Ahmed, S. A. (2018). NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing, 74(10), 5156.

    Article  Google Scholar 

  21. Ioannou, C., Vassiliou, V., & Sergiou, C. (2017). An intrusion detection system for wireless sensor networks. In 24th international conference on telecommunications (ICT) (pp. 3–5).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Somnath Sinha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sinha, S., Paul, A. Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network. Wireless Pers Commun 114, 835–851 (2020). https://doi.org/10.1007/s11277-020-07395-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07395-y

Keywords

Navigation