利用优化的基于自关注的临时变分自编码器生成对抗网络增强无线传感器网络的网络安全性

IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computer Standards & Interfaces Pub Date : 2023-10-30 DOI:10.1016/j.csi.2023.103802
B. Meenakshi , D. Karunkuzhali
{"title":"利用优化的基于自关注的临时变分自编码器生成对抗网络增强无线传感器网络的网络安全性","authors":"B. Meenakshi ,&nbsp;D. Karunkuzhali","doi":"10.1016/j.csi.2023.103802","DOIUrl":null,"url":null,"abstract":"<div><p>Wireless sensor network (WSN) is a multi-hop and self-organizing wireless network consists of fixed or moving sensors, this is one of the key components of the cyber physical system. It jointly senses, gathers, analyses, and transfer the data of detected objects in the network's service area before sending this data to the network's owner. The attacks like, Black hole, Gray hole, Flooding, scheduling are the usual WSN attacks that could quickly harm the system. A significant level of redundancy, network data's higher correlation, intrusion detection schemes for wireless sensor networks also have the drawbacks of poor identification rate, high computation overhead, and higher false alarm rate.</p></div><div><h3>Methods</h3><p>Initially, the data's are taken from WSN-DS. In pre-processing, it confiscates the data redundancy and missing value restore sunder Color Wiener filtering (CWF). In feature selection, the optimal features are selected using tasmanian devil optimization (TDO) algorithm. Based on the optimum features, the intruders in WSN data are categorized into normal and anomalous data utilizing SAPVAGAN. Hence, honey badger algorithm (HBA) is proposed to optimize the SAPVAGAN, which detects the WSN intrusion accurately.</p></div><div><h3>Results</h3><p>The proposed technique is performed in Python utilizing the WSN-DS dataset. Here, the performance measures, like recall, precision, f-measure, specificity, accuracy, RoC, computation time is evaluated. The proposed method provides 23.56%, 12.64%, and 15.63% higher accuracy, 23.14%, 16.78% and 20.04% lower computational time analyzed to the existing models, such as Intrusion Detection System in wireless sensor network using light GBM method (ECS-WSN-SLGBM), Intrusion Detection Scheme in wireless sensor network utilizing recurrent neural network (ECS-WSN-RNN) and Intrusion Detection Scheme for Wireless Sensor Networks utilizing whale optimized gate recurrent unit (ECS-WSN-WOGRU) respectively.</p></div><div><h3>Conclusion</h3><p>It combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks. By leveraging self-attention, the model captures important features and relationships in the WSN data. The provisional allows the model to adapt to changing network dynamics. The component generates realistic sensor data and accurately identifies malicious inputs. Overall, this innovative approach improves security and adaptability in WSNs.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":4.1000,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network\",\"authors\":\"B. Meenakshi ,&nbsp;D. Karunkuzhali\",\"doi\":\"10.1016/j.csi.2023.103802\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Wireless sensor network (WSN) is a multi-hop and self-organizing wireless network consists of fixed or moving sensors, this is one of the key components of the cyber physical system. It jointly senses, gathers, analyses, and transfer the data of detected objects in the network's service area before sending this data to the network's owner. The attacks like, Black hole, Gray hole, Flooding, scheduling are the usual WSN attacks that could quickly harm the system. A significant level of redundancy, network data's higher correlation, intrusion detection schemes for wireless sensor networks also have the drawbacks of poor identification rate, high computation overhead, and higher false alarm rate.</p></div><div><h3>Methods</h3><p>Initially, the data's are taken from WSN-DS. In pre-processing, it confiscates the data redundancy and missing value restore sunder Color Wiener filtering (CWF). In feature selection, the optimal features are selected using tasmanian devil optimization (TDO) algorithm. Based on the optimum features, the intruders in WSN data are categorized into normal and anomalous data utilizing SAPVAGAN. Hence, honey badger algorithm (HBA) is proposed to optimize the SAPVAGAN, which detects the WSN intrusion accurately.</p></div><div><h3>Results</h3><p>The proposed technique is performed in Python utilizing the WSN-DS dataset. Here, the performance measures, like recall, precision, f-measure, specificity, accuracy, RoC, computation time is evaluated. The proposed method provides 23.56%, 12.64%, and 15.63% higher accuracy, 23.14%, 16.78% and 20.04% lower computational time analyzed to the existing models, such as Intrusion Detection System in wireless sensor network using light GBM method (ECS-WSN-SLGBM), Intrusion Detection Scheme in wireless sensor network utilizing recurrent neural network (ECS-WSN-RNN) and Intrusion Detection Scheme for Wireless Sensor Networks utilizing whale optimized gate recurrent unit (ECS-WSN-WOGRU) respectively.</p></div><div><h3>Conclusion</h3><p>It combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks. By leveraging self-attention, the model captures important features and relationships in the WSN data. The provisional allows the model to adapt to changing network dynamics. The component generates realistic sensor data and accurately identifies malicious inputs. Overall, this innovative approach improves security and adaptability in WSNs.</p></div>\",\"PeriodicalId\":50635,\"journal\":{\"name\":\"Computer Standards & Interfaces\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2023-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Standards & Interfaces\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0920548923000831\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Standards & Interfaces","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0920548923000831","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

无线传感器网络(WSN)是由固定或移动传感器组成的多跳自组织无线网络,是网络物理系统的关键组成部分之一。它在将这些数据发送给网络所有者之前,共同感知、收集、分析和传输网络服务区域中检测到的对象的数据。黑洞、灰洞、洪水、调度等攻击是常见的WSN攻击,可以迅速破坏系统。无线传感器网络的入侵检测方案由于冗余程度高、网络数据相关性高,同时也存在识别率差、计算开销大、虚警率高等缺点。方法首先从WSN-DS中获取数据。在预处理中,利用彩色维纳滤波(CWF)消除了数据冗余和缺失值恢复。在特征选择方面,采用塔斯马尼亚魔鬼优化算法(TDO)选择最优特征。基于最优特征,利用SAPVAGAN将WSN数据中的入侵者分为正常数据和异常数据。为此,提出蜂蜜獾算法(honey badger algorithm, HBA)对SAPVAGAN进行优化,使其能够准确检测WSN入侵。结果利用WSN-DS数据集在Python中执行了所提出的技术。在这里,性能指标,如召回率,精度,f-measure,特异性,准确性,RoC,计算时间进行评估。与现有的基于轻GBM方法的无线传感器网络入侵检测系统(ECS-WSN-SLGBM)、基于递归神经网络的无线传感器网络入侵检测方案(ECS-WSN-RNN)和基于whale优化门递归单元的无线传感器网络入侵检测方案(ECS-WSN-WOGRU)模型相比,本文方法的准确率分别提高23.56%、12.64%和15.63%,计算时间分别缩短23.14%、16.78%和20.04%。结论该方法结合了自关注、临时学习和生成对抗网络等先进技术。通过利用自关注,该模型捕获了WSN数据中的重要特征和关系。临时允许模型适应不断变化的网络动态。该组件生成真实的传感器数据,并准确识别恶意输入。总的来说,这种创新的方法提高了无线传感器网络的安全性和适应性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

Wireless sensor network (WSN) is a multi-hop and self-organizing wireless network consists of fixed or moving sensors, this is one of the key components of the cyber physical system. It jointly senses, gathers, analyses, and transfer the data of detected objects in the network's service area before sending this data to the network's owner. The attacks like, Black hole, Gray hole, Flooding, scheduling are the usual WSN attacks that could quickly harm the system. A significant level of redundancy, network data's higher correlation, intrusion detection schemes for wireless sensor networks also have the drawbacks of poor identification rate, high computation overhead, and higher false alarm rate.

Methods

Initially, the data's are taken from WSN-DS. In pre-processing, it confiscates the data redundancy and missing value restore sunder Color Wiener filtering (CWF). In feature selection, the optimal features are selected using tasmanian devil optimization (TDO) algorithm. Based on the optimum features, the intruders in WSN data are categorized into normal and anomalous data utilizing SAPVAGAN. Hence, honey badger algorithm (HBA) is proposed to optimize the SAPVAGAN, which detects the WSN intrusion accurately.

Results

The proposed technique is performed in Python utilizing the WSN-DS dataset. Here, the performance measures, like recall, precision, f-measure, specificity, accuracy, RoC, computation time is evaluated. The proposed method provides 23.56%, 12.64%, and 15.63% higher accuracy, 23.14%, 16.78% and 20.04% lower computational time analyzed to the existing models, such as Intrusion Detection System in wireless sensor network using light GBM method (ECS-WSN-SLGBM), Intrusion Detection Scheme in wireless sensor network utilizing recurrent neural network (ECS-WSN-RNN) and Intrusion Detection Scheme for Wireless Sensor Networks utilizing whale optimized gate recurrent unit (ECS-WSN-WOGRU) respectively.

Conclusion

It combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks. By leveraging self-attention, the model captures important features and relationships in the WSN data. The provisional allows the model to adapt to changing network dynamics. The component generates realistic sensor data and accurately identifies malicious inputs. Overall, this innovative approach improves security and adaptability in WSNs.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computer Standards & Interfaces
Computer Standards & Interfaces 工程技术-计算机:软件工程
CiteScore
11.90
自引率
16.00%
发文量
67
审稿时长
6 months
期刊介绍: The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking. Computer Standards & Interfaces is an international journal dealing specifically with these topics. The journal • Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels • Publishes critical comments on standards and standards activities • Disseminates user''s experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods • Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts • Stimulates relevant research by providing a specialised refereed medium.
期刊最新文献
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud Integrating deep learning and data fusion for advanced keystroke dynamics authentication A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1