Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation

IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS International Journal of Network Management Pub Date : 2022-02-01 DOI:10.1002/nem.2196
Ranjeet B. Kagade, Santhosh Jayagopalan
{"title":"Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation","authors":"Ranjeet B. Kagade,&nbsp;Santhosh Jayagopalan","doi":"10.1002/nem.2196","DOIUrl":null,"url":null,"abstract":"<p>Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2196","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 4

Abstract

Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于优化辅助深度学习的无线传感器网络双层信任评估入侵检测系统
目前,由于传输介质的开放性,无线传感器网络受到各种攻击,如DoS攻击、篡改攻击、天坑攻击等。因此,需要一个有效的系统来识别无线传感器网络中的入侵。本文旨在通过深度学习模型建立一种新的入侵检测系统。首先,在传感器节点中选择最优簇头(CH),并优先选择能量较高的传感器节点作为簇头。在本文中,不仅考虑能量参数,而且考虑延迟和距离等约束条件,对簇头的选择进行最优评估。为了进行优化选择,本文提出了一种新的方法——自改进海狮优化模型。根据所提出的策略,基于考虑内容信任、诚实信任和交互信任的多维两层分层信任模型对CH和节点的信任进行评估。最后,通过优化的神经网络(NN)进行基于深度学习的入侵检测,其中的训练由所提出的SI-SLnO算法通过最优权值调整过程完成。最后,通过对众多现有技术的评价来检验所开发方法的优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Network Management
International Journal of Network Management COMPUTER SCIENCE, INFORMATION SYSTEMS-TELECOMMUNICATIONS
CiteScore
5.10
自引率
6.70%
发文量
25
审稿时长
>12 weeks
期刊介绍: Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.
期刊最新文献
Issue Information Intent-Based Network Configuration Using Large Language Models Issue Information Security, Privacy, and Trust Management on Decentralized Systems and Networks A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1