Skip to main content
Log in

Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The progress of Wireless Sensor Networks (WSNs) technologies has introduced a greater susceptibility of sensors and networks to being victims of distributed attacks. These attacks include various malicious activities such as intrusions during routing processes, data intercepting and other disruptive actions. In response to this increasing security challenge, numerous models for attack identification have been proposed. These models typically involve the deployment of detection systems that collect sensor data and employ machine learning and artificial intelligence techniques to categorize them. This research introduces a novel method for the analysis and classification of WSN datasets. The primary objective is to develop an anomaly identification approach that enhances sensor network security and operational efficiency with a good degree of accuracy. To achieve this goal, artificial intelligence method based-on stochastic models are used to create a detection system that learns from existing routing data to identify potential malicious network entries. The proposed approach relies on the principles of the Hidden Markov Model (HMM) and the Gaussian Mixture Model (GMM), a part of artificial intelligence stochastic functions, which incorporate predictive assumptions. In addition, dimensionality reduction is used to select the most pertinent routing features for the training of the system. To assess the effectiveness of our proposed approach, we performed experiments using a custom dataset that represents various network scenarios, including both normal and attacked states. The results demonstrate the performance of the model, achieving a classification score of 92. 18% when using a combination of two HMM and three GMM in the classifier. The proposed method attains a 98% precision value and 95% accuracy, better than performances of SVM, NB, DT and RF methods. This highlights the efficacy of our proposed approach compared to existing research.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Availability of Data and Material

All data used to demonstrate the method are available on demand.

Code Availability

Not applicable.

References

  1. Dargie, W., & Poellabauer, C. (2010). Fundamentals of wireless sensor networks: Theory and practice. John Wiley & Sons.

    Book  Google Scholar 

  2. Winkler, M., Tuchs, K.-D., Hughes, K., & Barclay, G. (2008). Theoretical and practical aspects of military wireless sensor networks. Journal of Telecommunications and Information Technology, pages 37–45.

  3. Nadeem, A., Hussain, M. A., Owais, O., Salam, A., Iqbal, S., & Ahsan, K. (2015). Application specific study, analysis and classification of body area wireless sensor network applications. Computer Networks, 83, 363–380.

    Article  Google Scholar 

  4. Moundounga, A., Russel, A., Hassan, S. & Satori, K. (2020). An overview of routing techniques in wsns. In 2020 Fourth international conference on intelligent computing in data sciences (ICDS), pages 1–7. IEEE.

  5. Khiati, M., & Djenouri, D. (2018). Adaptive learning-enforced broadcast policy for solar energy harvesting wireless sensor networks. Computer Networks, 143, 263–274.

    Article  Google Scholar 

  6. Meesookho, C., Narayanan, S., & Raghavendra, C.S. (2002). Collaborative classification applications in sensor networks. In Sensor Array and Multichannel Signal Processing Workshop Proceedings, 2002, pages 370–374. IEEE.

  7. Bao, F., Chen, R., Chang, M. J., & Cho, J.-H. (2011). Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE international conference on communications (ICC), pages 1–6. IEEE.

  8. Awan, S., Javaid, N., Ullah, S., Khan, A. U., Qamar, A. M., & Choi, J.-G. (2022). Blockchain based secure routing and trust management in wireless sensor networks. Sensors, 22(2), 411.

    Article  Google Scholar 

  9. Salmi, S., & Oughdir, L. (2022). Cnn-lstm based approach for dos attacks detection in wireless sensor networks. International Journal of Advanced Computer Science and Applications, 13(4).

  10. Ismail, S., & Reza, H. (2022). Evaluation of naïve bayesian algorithms for cyber-attacks detection in wireless sensor networks. In 2022 IEEE world AI IoT congress (AIIoT), pages 283–289. IEEE.

  11. Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). Ai-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.

    Article  Google Scholar 

  12. Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133–184144.

    Article  Google Scholar 

  13. Kotecha, J. H., Ramachandran, V., & Sayeed, A. M. (2005). Distributed multitarget classification in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 703–713.

    Article  Google Scholar 

  14. Shailendra Rathore and Jong Hyuk Park. (2018). Semi-supervised learning based distributed attack detection framework for iot. Applied Soft Computing, 72, 79–89.

    Article  Google Scholar 

  15. Aljaafreh, A., & Dong, L. (2010). Ground vehicle classification based on hierarchical hidden markov model and gaussian mixture model using wireless sensor networks. In 2010 IEEE international conference on electro/information technology, pages 1–4. IEEE.

  16. Rossi, P. S., Ciuonzo, D., & Ekman, T. (2015). Hmm-based decision fusion in wireless sensor networks with noncoherent multiple access. IEEE Communications Letters, 19(5), 871–874.

    Article  Google Scholar 

  17. Sundar, C., Chitradevi, M., & Geetharamani, G. (2012). Classification of cardiotocogram data using neural network based machine learning technique. International Journal of Computer Applications, 47(14).

  18. Coelho, J. P., Pinho, T. M., & Boaventura-Cunha, J. (2019). Hidden Markov models: Theory and implementation using MATLAB®. CRC Press.

    Book  Google Scholar 

  19. Almomani, I., Al-Kasasbeh, B., & Al-Akhras, M. (2016). Wsn-ds: A dataset for intrusion detection systems in wireless sensor networks. Journal of Sensors, 2016.

  20. Park, T., Cho, D., Kim, H., et al. (2018). An effective classification for dos attacks in wireless sensor networks. In 2018 Tenth international conference on ubiquitous and future networks (ICUFN), pages 689–692. IEEE.

  21. Budianu, C., Ben-David, S., & Tong, L. (2006). Estimation of the number of operating sensors in large-scale sensor networks with mobile access. IEEE Transactions on Signal Processing, 54(5), 1703–1715.

    Article  Google Scholar 

  22. Wang, Q., Hassanein, H., & Takahara, G. (2004). Stochastic modeling of distributed, dynamic, randomized clustering protocols for wireless sensor networks. In Workshops on mobile and wireless networking/high performance scientific, engineering computing/network design and architecture/optical networks control and management/Ad hoc and sensor networks/Compil, pages 456–463. IEEE.

  23. Mini, R. A. F., Loureiro, A. A. F., & Nath, B. (2004). The distinctive design characteristic of a wireless sensor network: the energy map. Computer Communications, 27(10), 935–945.

    Article  Google Scholar 

  24. Gupta, P, & Kumar, P. R. (1999). Critical power for asymptotic connectivity in wireless networks. In Stochastic analysis, control, optimization and applications, pages 547–566. Springer.

  25. Huang, X., Acero, A., & Hon, H.-W. (2001). and Raj Reddy. Spoken language processing: A guide to theory, algorithm, and system development. Prentice hall PTR.

  26. Hu, P., Zhou, Z., Liu, Q., & Li, F. (2007). The hmm-based modeling for the energy level prediction in wireless sensor networks. In 2007 2nd IEEE conference on industrial electronics and applications, pages 2253–2258. IEEE.

  27. Nazli Tekin and Vehbi Cagri Gungor. (2020). Analysis of compressive sensing and energy harvesting for wireless multimedia sensor networks. Ad Hoc Networks, 103, 102164.

    Article  Google Scholar 

  28. Saihi, M., Zouinkhi, A., Boussaid, B., Abdelkarim, M. N., & Andrieux, G. (2018). Hidden gaussian markov model for distributed fault detection in wireless sensor networks. Transactions of the Institute of Measurement and Control, 40(6), 1788–1798.

    Article  Google Scholar 

  29. Kim, Y., Jeong, S., Kim, D., & López, T. S. (2009). An efficient scheme of target classification and information fusion in wireless sensor networks. Personal and Ubiquitous Computing, 13(7), 499–508.

    Article  Google Scholar 

  30. Dymarski, P. (2011). Hidden Markov models: Theory and applications. BoD–Books on Demand.

  31. Emperuman, M., & Chandrasekaran, S. (2020). Hybrid continuous density hmm-based ensemble neural networks for sensor fault detection and classification in wireless sensor network. Sensors, 20(3), 745.

    Article  Google Scholar 

  32. Calafate, C. T., Manzoni, P., Cano, J.-C., & Malumbres, M. P. (2009). Markovian-based traffic modeling for mobile ad hoc networks. Computer Networks, 53(14), 2586–2600.

    Article  Google Scholar 

  33. Ghadban, N., Honeine, P., Francis, C., Mourad-Chehade, F., & Farah, J. (2014). Strategies for principal component analysis in wireless sensor networks. In 2014 IEEE 8th sensor array and multichannel signal processing workshop (SAM), pages 233–236.

  34. Kassambara, A. (2017). Practical guide to principal component methods in R. Sthda.

  35. Issariyakul, T., & Hossain, E. (2009). Introduction to network simulator 2 (ns2). In Introduction to network simulator NS2, pages 1–18. Springer.

  36. Rassam, M. A., Zainal, A., & Maarof, M. A. (2015). Principal component analysis-based data reduction model for wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1–2), 85–101.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

The authors have contributed equally.

Corresponding author

Correspondence to Hassan Satori.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix 1: Samples Dataset Illustration

Fig. 12
figure 12

Illustration of routing dataset. In a the sample dataset without malicious nodes. In b Sample Dataset Containing Blackhole Nodes

Appendix 2: Routing Features Contributions

Table 13 Number of the Principal Components to be Considered

In Table 13, the the second column gives the proportion of the information (variance) expected by each vector. The first eigenvalue contain 52.39% of the variation.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Affane M., A.R., Satori, H., Boutazart, Y. et al. Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models. Wireless Pers Commun 135, 1965–1992 (2024). https://doi.org/10.1007/s11277-024-10999-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-10999-3

Keywords

Navigation