A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Peer-To-Peer Networking and Applications Pub Date : 2024-06-03 DOI:10.1007/s12083-024-01735-6
Dingari Kalpana, P. Ajitha
{"title":"A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks","authors":"Dingari Kalpana, P. Ajitha","doi":"10.1007/s12083-024-01735-6","DOIUrl":null,"url":null,"abstract":"<p>Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"37 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01735-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Diverse routing and security protocols are implemented to enhance the efficacy when performing the packet transmission, however, finding the optimal path is highly challenging since it reduces the transmission consistency over the sensor network. Here, the security is enhanced in Wireless Sensor Network (WSN) routing where a new meta-heuristic algorithm and deep learning framework are suggested. The designed WSN model consists of various models like trust model, routing model, clustering model, and energy efficient model. Moreover, in the trust model, malicious node or attack detection is done by “Bidirectional Long-Short Term Memory (Bi-LSTM) with Recurrent Neural Network (RNN)”. By selecting the optimal path, an energy-efficient routing is implemented for secure data transmission. Here, the secure routing is implemented through the hybrid optimization algorithm named Exploration-based Pelican Black Hole Optimization (E-PBHO). The overall performance is enhanced by evaluating the standard performance measures like alive and dead nodes, network lifetime, throughput, and energy consumption. Here, the developed model provides 92% and 93% in terms of accuracy and sensitivity. Thus, the empirical outcome of the suggested model offers superior performance over than the existing approaches.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于无线传感器网络安全路由和恶意节点检测的混合启发式辅助深度学习
为了提高数据包传输的效率,人们采用了多种路由和安全协议,然而,寻找最佳路径却极具挑战性,因为这会降低传感器网络传输的一致性。本文提出了一种新的元启发式算法和深度学习框架,以增强无线传感器网络(WSN)路由的安全性。所设计的 WSN 模型由多种模型组成,如信任模型、路由模型、聚类模型和节能模型。此外,在信任模型中,恶意节点或攻击检测是通过 "双向长短期记忆(Bi-LSTM)与循环神经网络(RNN)"完成的。通过选择最佳路径,实现了安全数据传输的高能效路由选择。在这里,安全路由是通过名为 "基于探索的鹈鹕黑洞优化(E-PBHO)"的混合优化算法实现的。通过评估活节点和死节点、网络寿命、吞吐量和能耗等标准性能指标,提高了整体性能。其中,所开发模型的准确率和灵敏度分别达到 92% 和 93%。因此,建议模型的经验结果比现有方法性能更优越。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Peer-To-Peer Networking and Applications
Peer-To-Peer Networking and Applications COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
8.00
自引率
7.10%
发文量
145
审稿时长
12 months
期刊介绍: The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security. The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain. Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.
期刊最新文献
Are neck pain, disability, and deep neck flexor performance the same for the different types of temporomandibular disorders? Enhancing cloud network security with a trust-based service mechanism using k-anonymity and statistical machine learning approach Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks Homomorphic multi-party computation for Internet of Medical Things BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1