Abstract
The progress of Wireless Sensor Networks (WSNs) technologies has introduced a greater susceptibility of sensors and networks to being victims of distributed attacks. These attacks include various malicious activities such as intrusions during routing processes, data intercepting and other disruptive actions. In response to this increasing security challenge, numerous models for attack identification have been proposed. These models typically involve the deployment of detection systems that collect sensor data and employ machine learning and artificial intelligence techniques to categorize them. This research introduces a novel method for the analysis and classification of WSN datasets. The primary objective is to develop an anomaly identification approach that enhances sensor network security and operational efficiency with a good degree of accuracy. To achieve this goal, artificial intelligence method based-on stochastic models are used to create a detection system that learns from existing routing data to identify potential malicious network entries. The proposed approach relies on the principles of the Hidden Markov Model (HMM) and the Gaussian Mixture Model (GMM), a part of artificial intelligence stochastic functions, which incorporate predictive assumptions. In addition, dimensionality reduction is used to select the most pertinent routing features for the training of the system. To assess the effectiveness of our proposed approach, we performed experiments using a custom dataset that represents various network scenarios, including both normal and attacked states. The results demonstrate the performance of the model, achieving a classification score of 92. 18% when using a combination of two HMM and three GMM in the classifier. The proposed method attains a 98% precision value and 95% accuracy, better than performances of SVM, NB, DT and RF methods. This highlights the efficacy of our proposed approach compared to existing research.
Similar content being viewed by others
Availability of Data and Material
All data used to demonstrate the method are available on demand.
Code Availability
Not applicable.
References
Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice. John Wiley & Sons.
Winkler, M., Tuchs, K.-D., Hughes, K., & Barclay, G. (2008). Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology, pages 37–45.
Nadeem, A., Hussain, M. A., Owais, O., Salam, A., Iqbal, S., & Ahsan, K. (2015). Application specific study, analysis and classification of body area wireless sensor network applications. Computer Networks, 83, 363–380.
Moundounga, A., Russel, A., Hassan, S. & Satori, K. (2020). An overview of routing techniques in wsns. In 2020 Fourth international conference on intelligent computing in data sciences (ICDS), pages 1–7. IEEE.
Khiati, M., & Djenouri, D. (2018). Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks. Computer Networks, 143, 263–274.
Meesookho, C., Narayanan, S., & Raghavendra, C.S. (2002). Collaborative classification applications in sensor networks. In Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002, pages 370–374. IEEE.
Bao, F., Chen, R., Chang, M. J., & Cho, J.-H. (2011). Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE international conference on communications (ICC), pages 1–6. IEEE.
Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J.-G. (2022). Blockchain based secure routing and trust management in wireless sensor networks. Sensors, 22(2), 411.
Salmi, S., & Oughdir, L. (2022). Cnn-lstm based approach for dos attacks detection in wireless sensor networks. International Journal of Advanced Computer Science and Applications, 13(4).
Ismail, S., & Reza, H. (2022). Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks. In 2022 IEEE world AI IoT congress (AIIoT), pages 283–289. IEEE.
Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). Ai-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.
Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.
Kotecha, J. H., Ramachandran, V., & Sayeed, A. M. (2005). Distributed multitarget classification in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 703–713.
Shailendra Rathore and Jong Hyuk Park. (2018). Semi-supervised learning based distributed attack detection framework for iot. Applied Soft Computing, 72, 79–89.
Aljaafreh, A., & Dong, L. (2010). Ground vehicle classification based on hierarchical hidden markov model and gaussian mixture model using wireless sensor networks. In 2010 IEEE international conference on electro/information technology, pages 1–4. IEEE.
Rossi, P. S., Ciuonzo, D., & Ekman, T. (2015). Hmm-based decision fusion in wireless sensor networks with noncoherent multiple access. IEEE Communications Letters, 19(5), 871–874.
Sundar, C., Chitradevi, M., & Geetharamani, G. (2012). Classification of cardiotocogram data using neural network based machine learning technique. International Journal of Computer Applications, 47(14).
Coelho, J. P., Pinho, T. M., & Boaventura-Cunha, J. (2019). Hidden Markov models: Theory and implementation using MATLAB®. CRC Press.
Almomani, I., Al-Kasasbeh, B., & Al-Akhras, M. (2016). Wsn-ds: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016.
Park, T., Cho, D., Kim, H., et al. (2018). An effective classification for dos attacks in wireless sensor networks. In 2018 Tenth international conference on ubiquitous and future networks (ICUFN), pages 689–692. IEEE.
Budianu, C., Ben-David, S., & Tong, L. (2006). Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Transactions on Signal Processing, 54(5), 1703–1715.
Wang, Q., Hassanein, H., & Takahara, G. (2004). Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In Workshops on mobile and wireless networking/high performance scientific, engineering computing/network design and architecture/optical networks control and management/Ad hoc and sensor networks/Compil, pages 456–463. IEEE.
Mini, R. A. F., Loureiro, A. A. F., & Nath, B. (2004). The distinctive design characteristic of a wireless sensor network: the energy map. Computer Communications, 27(10), 935–945.
Gupta, P, & Kumar, P. R. (1999). Critical power for asymptotic connectivity in wireless networks. In Stochastic analysis, control, optimization and applications, pages 547–566. Springer.
Huang, X., Acero, A., & Hon, H.-W. (2001). and Raj Reddy. Spoken language processing: A guide to theory, algorithm, and system development. Prentice hall PTR.
Hu, P., Zhou, Z., Liu, Q., & Li, F. (2007). The hmm-based modeling for the energy level prediction in wireless sensor networks. In 2007 2nd IEEE conference on industrial electronics and applications, pages 2253–2258. IEEE.
Nazli Tekin and Vehbi Cagri Gungor. (2020). Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Networks, 103, 102164.
Saihi, M., Zouinkhi, A., Boussaid, B., Abdelkarim, M. N., & Andrieux, G. (2018). Hidden gaussian markov model for distributed fault detection in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(6), 1788–1798.
Kim, Y., Jeong, S., Kim, D., & López, T. S. (2009). An efficient scheme of target classification and information fusion in wireless sensor networks. Personal and Ubiquitous Computing, 13(7), 499–508.
Dymarski, P. (2011). Hidden Markov models: Theory and applications. BoD–Books on Demand.
Emperuman, M., & Chandrasekaran, S. (2020). Hybrid continuous density hmm-based ensemble neural networks for sensor fault detection and classification in wireless sensor network. Sensors, 20(3), 745.
Calafate, C. T., Manzoni, P., Cano, J.-C., & Malumbres, M. P. (2009). Markovian-based traffic modeling for mobile ad hoc networks. Computer Networks, 53(14), 2586–2600.
Ghadban, N., Honeine, P., Francis, C., Mourad-Chehade, F., & Farah, J. (2014). Strategies for principal component analysis in wireless sensor networks. In 2014 IEEE 8th sensor array and multichannel signal processing workshop (SAM), pages 233–236.
Kassambara, A. (2017). Practical guide to principal component methods in R. Sthda.
Issariyakul, T., & Hossain, E. (2009). Introduction to network simulator 2 (ns2). In Introduction to network simulator NS2, pages 1–18. Springer.
Rassam, M. A., Zainal, A., & Maarof, M. A. (2015). Principal component analysis-based data reduction model for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1–2), 85–101.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
The authors have contributed equally.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix 1: Samples Dataset Illustration
Appendix 2: Routing Features Contributions
In Table 13, the the second column gives the proportion of the information (variance) expected by each vector. The first eigenvalue contain 52.39% of the variation.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Affane M., A.R., Satori, H., Boutazart, Y. et al. Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models. Wireless Pers Commun 135, 1965–1992 (2024). https://doi.org/10.1007/s11277-024-10999-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-10999-3