Skip to main content
Log in

Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector

  • Published:
Optical Memory and Neural Networks Aims and scope Submit manuscript

Abstract

Military tasks constitute the most important and significant applications of Wireless sensor networks (WSNs). In military, Sensor node deployment increases activities, efficient operation, saves loss of life, and protects national sovereignty. Usually, the main difficulties in military missions are energy consumption and security in the network. Another major security issues are hacking or masquerade attack. To overcome the limitations, the proposed method modified DBSCAN with OSPREY optimization Algorithm (OOA) using hybrid classifier Long Short-Term Memory (LSTM) with Extreme Gradient Boosting (XGBOOST) to detect attack types in the WSN military sector for enhancing security. First, nodes are deployed and modified DBSCAN algorithm is used to cluster the nodes to reduce energy consumption. To select the cluster head optimally by using the OSPREY optimization Algorithm (OOA) based on small distance and high energy for transfer data between the base station and nodes. Hybrid LSTM-XGBOOST classifier utilized to learn the parameter and predict the four assault types such as scheduling, flooding, blackhole and grayhole assault. Classification and network metrics including Packet Delivery Ratio (PDR), Throughput, Average Residual Energy (ARE), Packet Loss Ratio (PLR), Accuracy and F1_score are used to evaluate the performance of the model. Performance results show that PDR of 94.12%, 3.2 Mbps throughput at 100 nodes, ARE of 8.94J, PLR of 5.88%, accuracy of 96.14%, and F1_score of 95.04% are achieved. Hence, the designed model for assault prediction types in WSN based on modified DBSCAN clustering with a hybrid classifier yields better results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.
Fig. 9.
Fig. 10.
Fig. 11.
Fig. 12.
Fig. 13.
Fig. 14.
Fig. 15.
Fig. 16.
Fig. 17.
Fig. 18.
Fig. 19.
Fig. 20.
Fig. 21.

Similar content being viewed by others

REFERENCES

  1. Rajakumaran, G., Venkataraman, N., and Mukkamala, R.R., Denial of service attack prediction using gradient descent algorithm, SN Comput. Sci., 2020, vol. 1, pp. 1–8.

    Article  Google Scholar 

  2. Preethi, R. and Anbuselvi, R., Energy Efficient Cluster Based Technique for Resource Allocation in MANET, International Journal of Science and Research (IJSR), 2015, vol. 6, no. 6, pp. 1951–1957.

  3. Preethi, R. and Anbuselvi, R., A Game Theory Approach for Efficient Node Clustering Based on Unstable Ranging Transmission in MANET, International Journal of Engineering & Technology, 2018, vol. 7, no. 2.22, pp. 21–26.

  4. Preethi, R. and Sughasiny, M., Pbgtr: Price based game theory routing for minimum cost routing path in manet. In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 2018, pp. 469–474.

  5. Preethi, R. and Sughasiny, M., AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile. In Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, 2018, vol. 940, p. 73.

  6. Preethi, R. and Sughasiny, M., RBMD: Reward Based Malicious Detection in Mobile Ad hoc Network, International Journal of Scientific & Engineering Research, 2018, vol. 9, no. 9, pp. 2057–2061.

  7. Anand, C. and Vasuki, N., Trust based DoS attack detection in wireless sensor networks for reliable data transmission, Wireless Pers. Communs., 2021, vol. 121, no. 4, pp. 2911–2926.

    Article  Google Scholar 

  8. Alsulaiman, L. and Al-Ahmadi, S., Performance evaluation of machine learning techniques for DOS detection in wireless sensor network, arXiv preprint arXiv:2104.01963, 2021.

  9. Salmi, S. and Oughdir, L., Cnn-lstm based approach for dos attacks detection in wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2022, vol. 13, no. 4.

  10. Hemanand, D., Reddy, G.V., Babu, S.S., Balmuri, K.R., Chitra, T., and Gopalakrishnan, S., An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs), Int. J. Intell. Syst. Appl. Eng., 2022, vol. 10, no. 3, pp. 285–293.

    Google Scholar 

  11. Rezvi, M.A., Moontaha, S., Trisha, K.A., Cynthia, S.T., and Ripon, S., Data mining approach to analyzing intrusion detection of wireless sensor network, Indones. J. Electr. Eng. Comput. Sci., 2021, vol. 21, no. 1, pp. 516–523.

    Google Scholar 

  12. Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., and Li, L., Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm, Sensors, 2019, vol. 19, no. 1, p. 203.

    Article  Google Scholar 

  13. Alruhaily, N.M. and Ibrahim, D.M., A multi-layer machine learning-based intrusion detection system for wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2021, vol. 12, no. 4, pp. 281–288.

    Google Scholar 

  14. Srinivas, D., Adaptive density-based localization algorithm using particle swarm optimization and DBSCAN clustering approach, Turk. J. Comput. Math. Educ. (TURCOMAT), 2021, vol. 12, no. 11, pp. 5053–5062.

    Google Scholar 

  15. Liu, Y. and Wu, Y., Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks, IEEE Access, 2021, vol. 9, pp. 77090–77105.

    Article  Google Scholar 

  16. Dehghani, M. and Trojovský, P., Osprey optimization algorithm: A new bio-inspired metaheuristic algorithm for solving engineering optimization problems, Front. Mech. Eng., 2023, vol. 8, p. 1126450.

    Article  Google Scholar 

  17. Turkoglu, M., Hanbay, D., and Sengur, A., Multi-model LSTM-based convolutional neural networks for detection of apple diseases and pests, J. Ambient Intell. Humanized Comput., 2019, pp. 1–11.

  18. Gouveia, A. and Correia, M., Network intrusion detection with XGBoost, Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 2020, vol. 137.

    Google Scholar 

  19. KIRAN, Kaggle, 2019. https://www.kaggle.com/datasets/kiranmahesh/nslkdd?select=kdd. Accessed October 16, 2023.

Download references

Funding

This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.

Author information

Authors and Affiliations

Authors

Contributions

The author claims the major contribution of the paper including formulation, analysis and editing and provides guidance to verify the analysis result and manuscript editing.

Corresponding author

Correspondence to R. Preethi.

Ethics declarations

CONFLICT OF INTEREST

The author of this work declares that he has no conflicts of interest.

CODE AVAILABILITY

Not applicable.

Additional information

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Preethi, R. Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector. Opt. Mem. Neural Networks 33, 53–71 (2024). https://doi.org/10.3103/S1060992X24010089

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S1060992X24010089

Keywords:

Navigation