Skip to main content
Log in

An intrusion detection system for wireless sensor networks using deep neural network

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Wireless sensor network comprises of a large number of sensor nodes to acquire and transmit data to the central location. However, due to resource constrained nodes, deployment strategies and communication channel introduce numerous security challenges to the wireless sensor networks. So, it is essential to detect unauthorized access to improve the security features of wireless sensor networks. Network intrusion detection systems provide such services to the network and it becomes inevitable for any communication network. Machine learning (ML) techniques are widely used in intrusion detection systems; however, the performance of ML techniques is not satisfactory while handling imbalanced attacks. To solve this and to improve the performance, this research work proposed an intrusion detection system based on deep neural network (DNN). Cross-correlation process is used to select the optimal features from the dataset and the selected parameters are used as building blocks for deep neural network structure to find intrusions. The experimental results confirmed that the proposed DNN performs better than conventional machine learning models such as support vector machine, decision tree, and random forest and efficiently identifies the attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Code availability

We are used our own data and coding.

References

  • Alaparthy VT, Morgera SD (2018) A multi-level intrusion detection system for wireless sensor networks based on immune theory. IEEE Access 6:47364–47373

    Article  Google Scholar 

  • Borkar GM, Patil LH, Hutke A (2019) A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput Inf Syst 23:120–135

    Google Scholar 

  • Cauteruccio F, Fortino G, Vega MT (2019) Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance. Inf Fusion 52:13–30

    Article  Google Scholar 

  • Filho GPR, Villas LA, Ueyama J (2018) Towards a smarter smart home system for decision-making using wireless sensors and actuators. Comput Netw 135:54–69

    Article  Google Scholar 

  • Gavel S, Raghuvanshi AS, Tiwari S (2020) A novel density estimation based intrusion detection technique with Pearson’s divergence for wireless sensor networks. ISA Trans 111:180–191

    Article  Google Scholar 

  • Han L, Zhou M, Xingbo X (2018) Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf Sci 476:491–504

    Article  Google Scholar 

  • Huanan Z, Suping X, Jiannan W (2021) Security and application of wireless sensor network. Procedia Comput Sci 183:486–492

    Article  Google Scholar 

  • Jacob IJ, Darney PE (2021) Artificial bee colony optimization algorithm for enhancing routing in wireless networks. J Artif Intell 3(01):62–71

    Google Scholar 

  • Jin X, Liang J, Li Z (2017) Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Electr Eng 59:262–273

    Article  Google Scholar 

  • Jinhui X, Yang T, Yao H (2018) Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Comput Sci 131:1188–1195

    Article  Google Scholar 

  • Kalnoor G, Agarkhed J (2018) Detection of intruder using KMP pattern matching technique in wireless sensor networks. Procedia Comput Sci 125:187–193

    Article  Google Scholar 

  • Kumar DP, Amgoth T, Annavarapu CSR (2019) Machine learning algorithms for wireless sensor networks: a survey. Inf Fusion 49:1–25

    Article  Google Scholar 

  • Manoharan JS (2021) A novel user layer cloud security model based on chaotic arnold transformation using fingerprint biometric traits. J Innov Image Process (JIIP) 3(1):36–51

    Article  Google Scholar 

  • Mehmood A, Khanan A, Umar MM, Abdullah S, KhairulAkramZainolAriffin HS (2018) Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks. IEEE Access 6:5688–5694

    Article  Google Scholar 

  • Meng W, Li W, Su C, Zhou J, Lu R (2018) Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access 6:7234–7243

    Article  Google Scholar 

  • Miranda C, Kaddoum G, Bou-Harb E, Garg S, Kaur K (2020) A collaborative security framework for software-defined wireless sensor networks. IEEE Trans Inf Forens Secur 15:2602–2615

    Article  Google Scholar 

  • Mohammed MN, Ahmed MM (2019) Data preparation and reduction technique in intrusion detection systems: ANOVA-PCA. Int J Comput Sci Secur 13(5):167–182

    Google Scholar 

  • Msolli A, Helali A, Maaref H (2018) New security approach in real-time wireless multimedia sensor networks. Comput Electr Eng 72:910–925

    Article  Google Scholar 

  • Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004

    Article  Google Scholar 

  • Rekha KS, SreenivasA TH, Kulkarni D (2018) Remote monitoring and reconfiguration of environment and structural health using wireless sensor networks. Mater Today Proc 5(1):1169–1175

    Article  Google Scholar 

  • Rose T, Kifayat K, Asim M (2020) A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment. J Parallel Distrib Comput 145:124–139

    Article  Google Scholar 

  • Santoro D, Escudero-Andreu G, Vadursi M (2017) A hybrid intrusion detection system for virtual jamming attacks on wireless networks. Measurement 109:79–87

    Article  Google Scholar 

  • Seba A, Nouali-Taboudjemat N, Seba H (2019) A review on security challenges of wireless communications in disaster emergency response and crisis management situations. J Netw Comput Appl 126:150–161

    Article  Google Scholar 

  • Smys S, Vijesh Joe C (2021) Metric routing protocol for detecting untrustworthy nodes for packet transmission. J Inf Technol 3(02):67–76

    Google Scholar 

  • Smys S, Basar A, Wang H (2020) Hybrid intrusion detection system for internet of things (IoT). J ISMAC 2(4):190–199

    Article  Google Scholar 

  • Smys S, Wang H, Basar A (2021) 5G network simulation in smart cities using neural network algorithm. J Artif Intell 3(01):43–52

    Google Scholar 

  • Wang W, Huang H, Li Q, He F, Sha C (2020) Generalized intrusion detection mechanism for empowered intruders in wireless sensor networks. IEEE Access 8:25170–25183

    Article  Google Scholar 

  • Yu J-Y, Lee E, Oh S-R, Seo Y-D, Kim Y-G (2020) A survey on security requirements for WSNs: focusing on the characteristics related to security. IEEE Access 8:45304–45324

    Article  Google Scholar 

Download references

Funding

No funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors are contributed in this work.

Corresponding author

Correspondence to V. Gowdhaman.

Ethics declarations

Conflict of interest

No conflict of interest.

Humans and animals rights

Humans and animals are not involved in this work.

Additional information

Communicated by Joy Iong-Zong Chen.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gowdhaman, V., Dhanapal, R. An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput 26, 13059–13067 (2022). https://doi.org/10.1007/s00500-021-06473-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-021-06473-y

Keywords

Navigation