Skip to main content
Log in

Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In an evolving defense landscape with persistent security threats, enhancing Wireless Sensor Networks (WSN) for border security and advancing Intrusion Detection Systems (IDS) are vital for national defense and data integrity. In this research, we present a structured and innovative Analytical Hierarchy Process (AHP) Multi attribute Decision Making (MADM) Aggregated Multiple Type 3 Fuzzy Logic (IT3FLS) approach for the accurate prediction of the number of k-barriers for fast intrusion detection and prevention within WSN. Four possible features—the rectangular region, the detecting sensors range, the transmission range of the sensors, and the number of sensors for uniform sensor distribution—were used in the training and evaluation of the suggested model. Using Monte Carlo simulation, these traits are retrieved. This methodology outlined in four-stages. In Stage 1, it constructs Multiple IT3FLS through data collected from simulations. Stage 2 rigorously evaluates IT3FLS models using statistical measures, culminating in a performance matrix. Stage 3 integrates this matrix, enhancing understanding via the AHP-MADM to assign weights. In Stage 4, these weights optimize predictions through a weighted aggregation method. The system's results significantly enhance the accuracy of k-barrier predictions in intrusion detection. The model demonstrates its proficiency with a remarkable correlation coefficient (R) of 0.997, a minimal root mean square error (RMSE) of 5.36 and low bias of 1.7. Furthermore, the research assesses the proposed system's performance against multiple benchmark methods, confirming its superior accuracy and computational efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

All necessary data for this study is documented in the manuscript, along with clear instructions on how to access and reproduce it.

References

  1. Mostafaei H, Chowdhury MU, Obaidat MS (2018) Border surveillance with WSN systems in a distributed manner. IEEE Syst J 12(4):3703–3712

    Article  Google Scholar 

  2. Lee S, Jain S, Yuan Y, Zhang Y, Yang H, Liu J, Son YJ (2019) Design and development of a DDDAMS-based border surveillance system via UVs and hybrid simulations. Expert Syst Appl 128:109–123

    Article  Google Scholar 

  3. Komar C, Donmez MY, Ersoy C (2012) Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Comput Commun 35(10):1185–1199

    Article  Google Scholar 

  4. Amutha J, Sharma S, Nagar J (2020) WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Pers Commun 111:1089–1115

    Article  Google Scholar 

  5. Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14

    Article  Google Scholar 

  6. Nurellari E, Licea DB, Ghogho M, Rivero-Angeles ME (2021) On trajectory design for intruder detection in wireless mobile sensor networks. IEEE Trans Signal Inf Process Over Netw 7:236–248

    Article  MathSciNet  Google Scholar 

  7. Nagar J, Chaturvedi SK, Soh S (2022) An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. Clust Comput 25(1):187–202

    Article  Google Scholar 

  8. Nagar J, Chaturvedi SK, Soh S (2022) Wireless Multihop Network Coverage Incorporating Boundary and Shadowing Effects. IETE Tech Rev 39(5):1124–1139

    Article  Google Scholar 

  9. Singh A, Sharma S, Singh J (2021) Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Comput Sci Rev 39:100342

    Article  MathSciNet  Google Scholar 

  10. Amutha J, Sharma S, Sharma SK (2021) Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Comput Sci Rev 40:100376

    Article  MathSciNet  Google Scholar 

  11. Amutha J, Nagar J, Sharma S (2021) A distributed border surveillance (dbs) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Pers Commun 117:2135–2155

    Article  Google Scholar 

  12. Aseeri M, Ahmed M, Shakib M, Ghorbel O, Shaman H (2017) Detection of attacker and location in wireless sensor network as an application for border surveillance. Int J Distrib Sens Netw 13(11):1550147717740072

    Article  Google Scholar 

  13. Benahmed T, Benahmed K (2019) Optimal barrier coverage for critical area surveillance using wireless sensor networks. Int J Commun Syst 32(10):e3955

    Article  Google Scholar 

  14. Gavel S, Raghuvanshi AS, Tiwari S (2022) Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Syst Appl 189:116089

    Article  Google Scholar 

  15. Wang Y, Fu W, Agrawal DP (2012) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355

    Article  Google Scholar 

  16. Sharma A, Chauhan S (2020) Sensor fusion for distributed detection of mobile intruders in surveillance wireless sensor networks. IEEE Sens J 20(24):15224–15231

    Article  Google Scholar 

  17. Singh R, Singh S (2021) Smart border surveillance system using wireless sensor networks. Int J Syst Assur Eng Manag 13(Suppl 2):880–894

    Google Scholar 

  18. Laouira ML, Abdelli A, Othman JB, Kim H (2019) An efficient WSN based solution for border surveillance. IEEE Trans Sust Comput 6(1):54–65

  19. Sharma S, Nagar J (2020) Intrusion detection in mobile sensor networks: A case study for different intrusion paths. Wireless Pers Commun 115(3):2569–2589

    Article  Google Scholar 

  20. Singh A, Amutha J, Nagar J, Sharma S, Lee CC (2022) Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors 22(3):1070

    Article  Google Scholar 

  21. Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutorials 21(1):686–728

    Article  Google Scholar 

  22. Singh A, Amutha J, Nagar J, Sharma S (2023) A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks. Expert Syst Appl 211:118588

    Article  Google Scholar 

  23. Singh A, Nagar J, Sharma S, Kotiyal V (2021) A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Syst Appl 172:114603

    Article  Google Scholar 

  24. Gheisarnejad M, Mohammadzadeh A, Farsizadeh H, Khooban MH (2021) Stabilization of 5G telecom converter-based deep type-3 fuzzy machine learning control for telecom applications. IEEE Trans Circuits Syst II Express Briefs 69(2):544–548

    Google Scholar 

  25. Mohammadzadeh A, Sabzalian MH, Zhang W (2019) An interval type-3 fuzzy system and a new online fractional-order learning algorithm: theory and practice. IEEE Trans Fuzzy Syst 28(9):1940–1950

    Article  Google Scholar 

  26. Castillo O, Castro JR, Pulido M, Melin P (2022) Interval type-3 fuzzy aggregators for ensembles of neural networks in COVID-19 time series prediction. Eng Appl Artif Intell 114:105110

    Article  Google Scholar 

  27. Tarafdar A, Majumder P, Deb M, Bera UK (2023) Performance-emission optimization in a single cylinder CI-engine with diesel hydrogen dual fuel: a spherical fuzzy MARCOS MCGDM based type-3 fuzzy logic approach. Int J Hydrogen Energy 48(73):28601–28627

  28. Tarafdar A, Majumder P, Deb M, Bera UK (2023) Application of a q-rung orthopair hesitant fuzzy aggregated Type-3 fuzzy logic in the characterization of performance-emission profile of a single cylinder CI-engine operating with hydrogen in dual fuel mode. Energy 269:126751

    Article  Google Scholar 

  29. Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83–98

    Google Scholar 

  30. Liu Y, Eckert C, Yannou-Le Bris G, Petit G (2019) A fuzzy decision tool to evaluate the sustainable performance of suppliers in an agrifood value chain. Comput Ind Eng 127:196–212

    Article  Google Scholar 

  31. Zimmer K, Fröhling M, Breun P, Schultmann F (2017) Assessing social risks of global supply chains: A quantitative analytical approach and its application to supplier selection in the German automotive industry. J Clean Prod 149:96–109

    Article  Google Scholar 

  32. Celik E, Akyuz E (2018) An interval type-2 fuzzy AHP and TOPSIS methods for decision-making problems in maritime transportation engineering: the case of ship loader. Ocean Eng 155:371–381

    Article  Google Scholar 

  33. Calabrese A, Costa R, Levialdi N, Menichini T (2019) Integrating sustainability into strategic decision-making: A fuzzy AHP method for the selection of relevant sustainability issues. Technol Forecast Soc Chang 139:155–168

    Article  Google Scholar 

  34. Lee SW, Mohammadi M, Rashidi S, Rahmani AM, Masdari M, Hosseinzadeh M (2021) Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review. J Netw Comput Appl 187:103111

    Article  Google Scholar 

  35. Singh A, Amutha J, Nagar J, Sharma S, Lee CC (2022) AutoML-ID: Automated machine learning model for intrusion detection using wireless sensor network. Sci Rep 12(1):9074

    Article  Google Scholar 

  36. Sood T, Prakash S, Sharma S, Singh A, Choubey H (2022) Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Pers Commun 126(1):911–931

    Article  Google Scholar 

  37. Sohi SM, Seifert JP, Ganji F (2021) RNNIDS: Enhancing network intrusion detection systems through deep learning. Comput Secur 102:102151

    Article  Google Scholar 

  38. Nagarajan J, Mansourian P, Shahid MA, Jaekel A, Saini I, Zhang N, Kneppers M (2023) Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Netw Appl 16(5):2153–2185

    Article  Google Scholar 

  39. Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5:21954–21961

    Article  Google Scholar 

  40. Pektaş A, Acarman T (2019) A deep learning method to detect network intrusion through flow-based features. Int J Network Manage 29(3):e2050

    Article  Google Scholar 

  41. Abbasi JS, Bashir F, Qureshi KN, ul Islam MN, Jeon G (2021) Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine. Comput Electr Eng 92:107094

    Article  Google Scholar 

  42. Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. Ieee Access 7:41525–41550

    Article  Google Scholar 

  43. Folino F, Folino G, Guarascio M, Pisani FS, Pontieri L (2021) On learning effective ensembles of deep neural networks for intrusion detection. Inf Fusion 72:48–69

    Article  Google Scholar 

  44. Sarath Kumar R, Sampath P, Ramkumar M (2023) Enhanced elman spike neural network fostered intrusion detection framework for securing wireless sensor network. Peer-to-Peer Networking and Applications 16(4):1819–1833

  45. Umarani C, Kannan S (2020) Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. Peer-to-Peer Netw Appl 13:752–761

    Article  Google Scholar 

  46. Saraereh OA, Ali A, Al-Tarawneh L, Khan I (2021) A robust approach for barrier-reinforcing in wireless sensor networks. J Parallel Distrib Comput 149:186–192

    Article  Google Scholar 

  47. Nagar J, Sharma S (2018) k-Barrier coverage-based intrusion detection for wireless sensor networks. In: Bokhari M, Agrawal N, Saini D (eds) Cyber security. Advances in intelligent systems and computing, vol 729. Springer, Singapore, pp. 373–385. https://doi.org/10.1007/978-981-10-8536-9_36

  48. Singh A, Nagar J, Amutha J, Sharma S (2023) P2CA-GAM-ID: Coupling of probabilistic principal components analysis with generalised additive model to predict the k− barriers for intrusion detection. Eng Appl Artif Intell 126:107137

    Article  Google Scholar 

  49. Nabipour N, Qasem SN, Jermsittiparsert K (2020) Type-3 fuzzy voltage management in PV/hydrogen fuel cell/battery hybrid systems. Int J Hydrogen Energy 45(56):32478–32492

    Article  Google Scholar 

  50. Liu Z, Mohammadzadeh A, Turabieh H, Mafarja M, Band SS, Mosavi A (2021) A new online learned interval type-3 fuzzy control system for solar energy management systems. IEEE Access 9:10498–10508

    Article  Google Scholar 

  51. Mosavi A, Qasem SN, Shokri M, Band SS, Mohammadzadeh A (2020) Fractional-order fuzzy control approach for photovoltaic/battery systems under unknown dynamics, variable irradiation and temperature. Electronics 9(9):1455

    Article  Google Scholar 

  52. Elhaki O, Shojaei K, Mohammadzadeh A, Rathinasamy S (2023) Robust amplitude-limited interval type-3 neuro-fuzzy controller for robot manipulators with prescribed performance by output feedback. Neural Comput Appl 35(12):9115–9130

    Google Scholar 

  53. Tarafdar A, Majumder P, Bera UK (2023) Prediction of air quality index in Kolkata city using an advanced learned interval type-3 fuzzy logic system. In: 2023 IEEE 8th Int Conf for Convergence in Technol (I2CT), IEEE, pp 1–7. https://doi.org/10.1007/978-981-10-8536-9_36

  54. Tarafdar A, Majumder P, Bera UK (2023) An Advanced Learned Type-3 Fuzzy Logic-Based Hybrid System to Optimize Inventory Cost for a New Business Policy. Proc Natl Acad Sci, India, Sect A 93(4):711–727

    Article  MathSciNet  Google Scholar 

  55. Taghieh A, Mohammadzadeh A, Zhang C, Rathinasamy S, Bekiros S (2023) A novel adaptive interval type-3 neuro-fuzzy robust controller for nonlinear complex dynamical systems with inherent uncertainties. Nonlinear Dyn 111(1):411–425

    Article  Google Scholar 

  56. Kikuchi T, Fukuda T, Yabuki N (2023) Development of a synthetic dataset generation method for deep learning of real urban landscapes using a 3D model of a non-existing realistic city. Adv Eng Inform 58:102154

  57. Khalid Z, Durrani S, Guo J (2013) A tractable framework for exact probability of node isolation and minimum node degree distribution in finite multihop networks. IEEE Trans Veh Technol 63(6):2836–2847

    Article  Google Scholar 

  58. Nagar J, Chaturvedi SK, Soh S (2020) An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. J Netw Comput Appl 149:102466

    Article  Google Scholar 

  59. Zou Y, Chakrabarty K (2004) Sensor deployment and target localization in distributed sensor networks. ACM Trans Embed Comput Syst (TECS) 3(1):61–91

    Article  Google Scholar 

  60. Satty TL (1980) The Analytic Hierarchy Process. McGraw-Hill, New York, NY, USA

    Google Scholar 

  61. Benardos PG, Vosniakos GC (2007) Optimizing feedforward artificial neural network architecture. Eng Appl Artif Intell 20(3):365–382

    Article  Google Scholar 

  62. Specht DF (1991) A general regression neural network. IEEE Trans Neural Networks 2(6):568–576

    Article  Google Scholar 

  63. Rasmussen CE (2004) Gaussian processes in machine learning. In: Bousquet O, von Luxburg U, Rätsch G (eds) Advanced lectures on machine learning. ML 2003. Lecture notes in computer science, vol. 3176. Springer, Berlin, Heidelberg, pp 63–71. https://doi.org/10.1007/978-3-540-28650-9_4

  64. Quinonero-Candela J, Rasmussen CE (2005) A unifying view of sparse approximate Gaussian process regression. J Mach Learn Res 6:1939–1959

    MathSciNet  Google Scholar 

  65. Breiman L (2001) Random Forests. Mach Learn 45:5–32. https://doi.org/10.1023/A:1010933404324

    Article  Google Scholar 

  66. Debnath R, Majumder P, Tarafdar A, Bhattacharya B, Bera UK (2024) Artificial intelligence based supply chain management strategy during COVID-19 situation. In: Supply chain forum: an international journal, pp 1–20. https://doi.org/10.1080/16258312.2024.2303307

Download references

Funding

There is no funding for this work.

Author information

Authors and Affiliations

Authors

Contributions

Anirban Tarafdar Conceptualization, Methodology, Software, Formal analysis, Writing—Original Draft.

Azharuddin Shaikh Software, Conceptualization, Writing and Editing.

Pinki Majumder Conceptualization, Validation, Methodology, Project administration.

Alak MajumderFormal analysis, Simulation,

Bidyut K. Bhattacharyya Validation, Resources, Supervision.

Uttam Kumar Bera Validation, Resources, Visualization, Supervision.

Corresponding author

Correspondence to Anirban Tarafdar.

Ethics declarations

Ethical and informed consent

Ethical and informed consent were not required for this study as it does not involve the use of data from human participants.

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tarafdar, A., Sheikh, A., Majumder, P. et al. Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system. Peer-to-Peer Netw. Appl. (2024). https://doi.org/10.1007/s12083-024-01688-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01688-w

Keywords

Navigation