SHAKE-ESDRL-based energy efficient intrusion detection and hashing system

IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Annals of Telecommunications Pub Date : 2023-05-31 DOI:10.1007/s12243-023-00963-w
Geo Francis E, S. Sheeja
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E,&nbsp;S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":null,"url":null,"abstract":"<div><p>Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"381 - 396"},"PeriodicalIF":1.8000,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Annals of Telecommunications","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s12243-023-00963-w","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.

Abstract Image

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于 SHAKE-ESDRL 的高能效入侵检测和散列系统
随着无线传感器网络(WSN)及其应用的激增,主动入侵及其安全威胁取得了显著进展,这些威胁干扰了无线传感器网络(WSN)的正常运行。在 WSN 中,这就要求入侵检测系统(IDS)能以更高的检测精度检测出此类攻击。使用基于 SDK-LSHB 的 SHAKE-ESDRL 算法为 IDS 设计一个有效的模型,以提高准确率并减少训练时间和响应时间,是这项工作的目标。首先,对数据集进行重复删除、缺失数据删除和数据传输等处理。从处理过的数据中,通过将提取的属性作为基于熵的广义判别分析(E-GDA)方法的输入,减少了属性的数量。之后,基于 LogSwish 的深度强化学习算法(LS-DRLA)方法利用减少的属性进行入侵检测(ID)。在此过程中,通过使用 SHAKE 256 算法,对属于被攻击类别标签的属性进行哈希处理并存储在哈希表中。接下来,为了用训练有素的 IDS 测试实时数据,需要对 WSN 节点进行初始化。为此,利用超和距离(SD-K-Means)算法,以基于线性缩放的蜜獾优化算法(LS-HBOA)方法选出的簇头(CH)为中心,对传感器节点(SN)进行聚类。最后,利用基于真实世界的数据集对所提出的算法进行评估,并使用统计指标对结果进行比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Annals of Telecommunications
Annals of Telecommunications 工程技术-电信学
CiteScore
5.20
自引率
5.30%
发文量
37
审稿时长
4.5 months
期刊介绍: Annals of Telecommunications is an international journal publishing original peer-reviewed papers in the field of telecommunications. It covers all the essential branches of modern telecommunications, ranging from digital communications to communication networks and the internet, to software, protocols and services, uses and economics. This large spectrum of topics accounts for the rapid convergence through telecommunications of the underlying technologies in computers, communications, content management towards the emergence of the information and knowledge society. As a consequence, the Journal provides a medium for exchanging research results and technological achievements accomplished by the European and international scientific community from academia and industry.
期刊最新文献
Editorial of 6GNet 2023 special issue On the (in)efficiency of fuzzing network protocols Investigation of LDPC codes with interleaving for 5G wireless networks Opportunistic data gathering in IoT networks using an energy-efficient data aggregation mechanism Joint MEC selection and wireless resource allocation in 5G RAN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1