{"title":"基于优化辅助深度学习的无线传感器网络双层信任评估入侵检测系统","authors":"Ranjeet B. Kagade, Santhosh Jayagopalan","doi":"10.1002/nem.2196","DOIUrl":null,"url":null,"abstract":"<p>Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation\",\"authors\":\"Ranjeet B. Kagade, Santhosh Jayagopalan\",\"doi\":\"10.1002/nem.2196\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.</p>\",\"PeriodicalId\":14154,\"journal\":{\"name\":\"International Journal of Network Management\",\"volume\":\"32 4\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2022-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Network Management\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/nem.2196\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Network Management","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/nem.2196","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation
Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.
期刊介绍:
Modern computer networks and communication systems are increasing in size, scope, and heterogeneity. The promise of a single end-to-end technology has not been realized and likely never will occur. The decreasing cost of bandwidth is increasing the possible applications of computer networks and communication systems to entirely new domains. Problems in integrating heterogeneous wired and wireless technologies, ensuring security and quality of service, and reliably operating large-scale systems including the inclusion of cloud computing have all emerged as important topics. The one constant is the need for network management. Challenges in network management have never been greater than they are today. The International Journal of Network Management is the forum for researchers, developers, and practitioners in network management to present their work to an international audience. The journal is dedicated to the dissemination of information, which will enable improved management, operation, and maintenance of computer networks and communication systems. The journal is peer reviewed and publishes original papers (both theoretical and experimental) by leading researchers, practitioners, and consultants from universities, research laboratories, and companies around the world. Issues with thematic or guest-edited special topics typically occur several times per year. Topic areas for the journal are largely defined by the taxonomy for network and service management developed by IFIP WG6.6, together with IEEE-CNOM, the IRTF-NMRG and the Emanics Network of Excellence.