Skip to main content
Log in

Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN

  • Research
  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As a result of technological growth, WSNs enable creative practical solutions for anything from basic communication to sophisticated applications, which are not confined to a particular domain. In addition to the advances, there is an ongoing issue concerning the frequent threats or attacks on WSNs. The sinkhole attack, which jeopardizes the accuracy and trustworthiness of information in a WSN, is one of the most devastating attacks. Moreover, WSN routing schemes are extremely vulnerable to sinkhole attacks. To address the security challenges faced by WSNs, timely and reliable intrusion detection is of utmost importance. In this paper, a novel intrusion detection scheme, called Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model (TSMR-CDNN), is introduced for sinkhole attack detection. TSMR-CDNN incorporates a reverse time synchronization scheme for its potential to provide precise clock skews and offsets, effectively reducing detection delays. The Broken-stick regression method is applied for the analysis of multivariate data such as clock features, RSSI, LQI, and energy by setting the threshold value, for enhancing its detection capabilities. The steepest gradient function is used to update the weight parameter in order to reduce the false positive rate. This approach minimizes the error rate, resulting in superior classification performance. The experimental results confirm that TSMR-CDNN outperforms the existing methods in terms of various metrics, and demonstrates 5% improvement in attack detection accuracy, 3% enhancement in precision, recall, and F-measure, and 10% reduction in detection time, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability:

N/A

References

  1. Huan, X., Kyeong, S. K., & Zhang, J. (2021). NISA: Node identification and spoofing attack detection based on clock features and radio information for wireless sensor networks. IEEE Transactions on Communications, 69(7), 4691–4703.

    Article  Google Scholar 

  2. Gowdhaman, V., & Dhanapal, R. (2021). An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing, 26, 1–9.

    Google Scholar 

  3. Bilal, A., Hasany, S. M. N., & Pitafi, A. H. (2022). Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices. IET Communications, 16(8), 845–855.

    Article  Google Scholar 

  4. Babaeer, Huda A., & Al-Ahmadi, Saad A. (2020). Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access, 8, 92098–92109.

    Google Scholar 

  5. Sejaphala, L. C., & Velempini, M. (2020). The design of a defense mechanism to mitigate sinkhole attack in software-defined wireless sensor cognitive radio networks. Wireless Personal Communications, 113, 977–993.

    Article  Google Scholar 

  6. An, G. H., & Cho, T. H. (2022). Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT. International Journal of Computer Networks and Applications, 9, 169.

    Article  Google Scholar 

  7. Khosravi, H., & GhasemiGol, M. (2021). A mobile agent-based method to counter sinkhole attacks in wireless sensor networks. Jordanian Journal of Computers and Information Technology, 7(4), 1.

    Article  Google Scholar 

  8. Hasan, B., Alani, S., & Saad, M. A. (2021). Secured node detection technique based on artificial neural network for wireless sensor network. International Journal of Electrical & Computer Engineering (2088–8708), 11(1), 1.

    Google Scholar 

  9. Pundir, S., et al. (2020). Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment. Sensors, 20(5), 1300.

    Article  Google Scholar 

  10. Prathapchandran, K., & Janani, T. (2021). A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST. Computer Networks, 198, 108413.

    Article  Google Scholar 

  11. Mondal, K., et al. (2022). Detecting sinkhole attacks in IoT-based wireless sensor networks using distance from base station. International Journal of Information System Modeling and Design (IJISMD), 13(6), 1–18.

    Article  Google Scholar 

  12. Gite, P., et al. (2023). ML based intrusion detection scheme for various types of attacks in a WSN using C45 and CART classifiers. Materials Today Proceedings, 80, 3769–3776.

    Article  Google Scholar 

  13. Khedr, A. M., et al. (2020). A novel association rule-based data mining approach for internet of things based wireless sensor networks. IEEE Access, 8, 151574–151588.

    Article  Google Scholar 

  14. Salim, A., et al. (2020). A secure data gathering scheme based on properties of primes and compressive sensing for IoT-based WSNs. IEEE Sensors Journal, 21(4), 5553–5571.

    Article  Google Scholar 

  15. Salim, A., et al. (2021). Compressive sensing based secure data aggregation scheme for IoT based WSN applications. PloS One, 16(12), e0260634.

    Article  Google Scholar 

  16. Al-Naeem, Mohammed Abdulaziz. (2021). Prediction of re-occurrences of spoofed ACK packets sent to deflate a target wireless sensor network node by DDOS. IEEE Access, 9, 87070–87078.

    Article  Google Scholar 

  17. Marabissi, Dania, Mucchi, Lorenzo, & Stomaci, Andrea. (2022). IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet, 14(2), 61.

    Article  Google Scholar 

  18. Hanif, M., et al. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.

    Article  Google Scholar 

  19. Alruhaily, Nada M., & Ibrahim, Dina M. (2021). A multi-layer machine learning-based intrusion detection system for wireless sensor networks. International Journal of Advanced Computer Science and Applications, 12(4), 281–288.

    Article  Google Scholar 

  20. Pang, B., et al. (2021). A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network. IEEE Wireless Communications Letters, 10(8), 1613–1617.

    Article  Google Scholar 

  21. Mousavi, S. K., & Ghaffari, A. (2021). Data cryptography in the Internet of Things using the Artificial Bee Colony algorithm in a smart irrigation system. Journal of Information Security and Applications, 61, 102945.

    Article  Google Scholar 

  22. Mousavi, S. K., et al. (2021). Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems). Wireless Personal Communications, 116, 1713–1742.

    Article  Google Scholar 

  23. Beheshtiasl, Azam, & Ghaffari, Ali. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communications, 107, 1799–1814.

    Article  Google Scholar 

  24. Mohammadi, Payam, & Ghaffari, Ali. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.

    Article  Google Scholar 

  25. Mosavvar, Hadi, & Ghaffari, Ali. (2018). Detecting faulty nodes in wireless sensor networks using Harmony Search Algorithm. Wireless Personal Communications, 103, 2927–2945.

    Article  Google Scholar 

Download references

Funding

N/A

Author information

Authors and Affiliations

Authors

Contributions

To this study, the authors contributed equally. The final manuscript is read and approved by all authors.

Corresponding author

Correspondence to P. V. Pravija Raj.

Ethics declarations

Conflicts of interest

Regarding the publishing of this work, the authors affirm that there are no conflicts of interest

Ethical Approval

N/A

Code availability:

N/A

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khedr, A.M., Raj, P.V.P. & Rani, S.S. Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Wireless Pers Commun 134, 361–382 (2024). https://doi.org/10.1007/s11277-024-10913-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10913-x

Keywords

Navigation