Skip to main content
Erschienen in:

03.06.2024

A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks

verfasst von: Dingari Kalpana, P. Ajitha

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel diskutiert die Bedeutung drahtloser Sensornetzwerke (WSNs) in verschiedenen Anwendungen aufgrund ihrer schnellen Bereitstellung und Stärke. Es beleuchtet die Herausforderungen in den WSNs, wie Energiebeschränkungen und Sicherheitsbedrohungen durch bösartige Knoten. Die Autoren schlagen ein hybrides Deep-Learning-Modell vor, das Bi-LSTM und RNN zur Erkennung bösartiger Knoten und einen heuristischen Ansatz zur Clusterkopfauswahl kombiniert. Dieses Modell zielt darauf ab, die Sicherheit und Energieeffizienz von WSNs zu verbessern. Der Artikel vergleicht die vorgeschlagene Methode auch mit bestehenden Ansätzen und zeigt ihre überlegene Leistung bei der Erkennung bösartiger Knoten und beim energieeffizienten Routing.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Trans Eng Manage 68(1):170–182CrossRef Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Trans Eng Manage 68(1):170–182CrossRef
2.
Zurück zum Zitat Aliady WA, Al-Ahmadi SA (2019) Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks. IEEE Access 7:84132–84141CrossRef Aliady WA, Al-Ahmadi SA (2019) Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks. IEEE Access 7:84132–84141CrossRef
3.
Zurück zum Zitat Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027CrossRef
4.
Zurück zum Zitat Harn L, Hsu C, Ruan O, Zhang M (2016) Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks. IEEE Sens J 16(6):1779–1785CrossRef Harn L, Hsu C, Ruan O, Zhang M (2016) Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks. IEEE Sens J 16(6):1779–1785CrossRef
5.
Zurück zum Zitat Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U (2020) Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 8:163962–163974CrossRef Haseeb K, Almustafa KM, Jan Z, Saba T, Tariq U (2020) Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network. IEEE Access 8:163962–163974CrossRef
6.
Zurück zum Zitat Feng W, Wang F, Dan Xu, Yao Y, Xiaorong Xu, Jiang X, Zhao M (2020) Joint Energy-Saving Scheduling and Secure Routing for Critical Event Reporting in Wireless Sensor Networks. IEEE Access 8:53281–53292CrossRef Feng W, Wang F, Dan Xu, Yao Y, Xiaorong Xu, Jiang X, Zhao M (2020) Joint Energy-Saving Scheduling and Secure Routing for Critical Event Reporting in Wireless Sensor Networks. IEEE Access 8:53281–53292CrossRef
7.
Zurück zum Zitat Han Y, Hu H, Guo Y (2022) Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 10:11538–11550CrossRef Han Y, Hu H, Guo Y (2022) Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 10:11538–11550CrossRef
8.
Zurück zum Zitat Mahmoud MMEA, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153CrossRef Mahmoud MMEA, Lin X, Shen X (2015) Secure and reliable routing protocols for heterogeneous multihop wireless networks. IEEE Trans Parallel Distrib Syst 26(4):1140–1153CrossRef
9.
Zurück zum Zitat Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Net 15(4):422–429CrossRef Ganesh S, Amutha R (2013) Efficient and secure routing protocol for wireless sensor networks through SNR based dynamic clustering mechanisms. J Commun Net 15(4):422–429CrossRef
10.
Zurück zum Zitat Yang L, Lu Y, Liu S, Guo T, Liang Z (2018) A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks. IEEE Access 6:71404–71412CrossRef Yang L, Lu Y, Liu S, Guo T, Liang Z (2018) A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks. IEEE Access 6:71404–71412CrossRef
11.
Zurück zum Zitat Hu H, Han Y, Yao M, Song X (2022) Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. IEEE Access 10:10585–10596CrossRef Hu H, Han Y, Yao M, Song X (2022) Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. IEEE Access 10:10585–10596CrossRef
12.
Zurück zum Zitat Ahutu OR, El-Ocla H (2020) Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks. IEEE Access 8:63270–63282CrossRef Ahutu OR, El-Ocla H (2020) Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks. IEEE Access 8:63270–63282CrossRef
13.
Zurück zum Zitat Tang D, Li T, Ren J, Wu J (2015) Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans Parallel Distrib Syst 26(4):960–973CrossRef Tang D, Li T, Ren J, Wu J (2015) Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans Parallel Distrib Syst 26(4):960–973CrossRef
14.
Zurück zum Zitat Liu A, Zheng Z, Zhang C, Chen Z, Shen X (2012) Secure and Energy-Efficient Disjoint Multipath Routing for WSNs. IEEE Trans Veh Technol 61(7):3255–3265CrossRef Liu A, Zheng Z, Zhang C, Chen Z, Shen X (2012) Secure and Energy-Efficient Disjoint Multipath Routing for WSNs. IEEE Trans Veh Technol 61(7):3255–3265CrossRef
15.
Zurück zum Zitat Wang N, Li J (2019) Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks. IEEE Access 7:19303–19311CrossRef Wang N, Li J (2019) Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks. IEEE Access 7:19303–19311CrossRef
16.
Zurück zum Zitat Gope P, Lee J, Quek TQS (2017) Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sens J 17(2):498–503CrossRef Gope P, Lee J, Quek TQS (2017) Resilience of DoS Attacks in Designing Anonymous User Authentication Protocol for Wireless Sensor Networks. IEEE Sens J 17(2):498–503CrossRef
17.
Zurück zum Zitat Alghamdi TA (2018) Secure and Energy Efficient Path Optimization Technique in Wireless Sensor Networks Using DH Method. IEEE Access 6:53576–53582CrossRef Alghamdi TA (2018) Secure and Energy Efficient Path Optimization Technique in Wireless Sensor Networks Using DH Method. IEEE Access 6:53576–53582CrossRef
18.
Zurück zum Zitat Yang H, Zhang X, Cheng F (2021) A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. Mobile Networks and Applications 26:1564–1573CrossRef Yang H, Zhang X, Cheng F (2021) A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks. Mobile Networks and Applications 26:1564–1573CrossRef
19.
Zurück zum Zitat Gomathi S, Gopala Krishnan C (2020) Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol. Wirel Pers Commun 113:1775–1790CrossRef Gomathi S, Gopala Krishnan C (2020) Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol. Wirel Pers Commun 113:1775–1790CrossRef
20.
Zurück zum Zitat Anitha R, Tapas Bapu BR, Kuppusamy PG, Partheeban N, Sasikumar (2022) AN FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs. Wirel Pers Commun Anitha R, Tapas Bapu BR, Kuppusamy PG, Partheeban N, Sasikumar (2022) AN FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs. Wirel Pers Commun
21.
Zurück zum Zitat Prithi S, Sumathi S (2020) LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network. Ad Hoc Networks 97 Prithi S, Sumathi S (2020) LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network. Ad Hoc Networks 97 
22.
Zurück zum Zitat Khot PS, Naik U (2022) Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. Int J Intell Robot Appl 6:306–322CrossRef Khot PS, Naik U (2022) Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. Int J Intell Robot Appl 6:306–322CrossRef
23.
Zurück zum Zitat Shende DK, Sonavane SS (2020) CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks 26:4011–4029CrossRef Shende DK, Sonavane SS (2020) CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications. Wireless Networks 26:4011–4029CrossRef
24.
Zurück zum Zitat Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497CrossRef Thangaramya K, Kulothungan K, Indira Gandhi S, Selvi M, Santhosh Kumar SVN, Arputharaj K (2020) Intelligent fuzzy rule-based approach with outlier detection for secured routing in WSN. Soft Comput 24:16483–16497CrossRef
25.
Zurück zum Zitat Bhatt R, Maheshwary P, Shukla P, Shukla P, Shrivastava M, Changlani S (2020) Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput Commun 149:134–145CrossRef Bhatt R, Maheshwary P, Shukla P, Shukla P, Shrivastava M, Changlani S (2020) Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Comput Commun 149:134–145CrossRef
26.
Zurück zum Zitat Kalburgi SS, Manimozhi M (2022) Taylor-spotted hyena optimization algorithm for reliable and energy-efficient cluster head selection based secure data routing and failure tolerance in WSN. Multimed Tools Appl 81:15815–15839CrossRef Kalburgi SS, Manimozhi M (2022) Taylor-spotted hyena optimization algorithm for reliable and energy-efficient cluster head selection based secure data routing and failure tolerance in WSN. Multimed Tools Appl 81:15815–15839CrossRef
27.
Zurück zum Zitat Khot PS, Naik U (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wirel Pers Commun 119:2405–2429CrossRef Khot PS, Naik U (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wirel Pers Commun 119:2405–2429CrossRef
28.
Zurück zum Zitat Das R, Dwivedi M (2023) Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. J Reliab Intell Environ Das R, Dwivedi M (2023) Cluster head selection and malicious node detection using large-scale energy-aware trust optimization algorithm for HWSN. J Reliab Intell Environ
29.
Zurück zum Zitat Pradeep Sadashiv Khot & Udaykumar Naik (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wireless Pers Commun 119:2405–2429CrossRef Pradeep Sadashiv Khot & Udaykumar Naik (2021) Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wireless Pers Commun 119:2405–2429CrossRef
30.
Zurück zum Zitat Sharma R, Vashisht V, Singh U (2020) eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommun Syst 74:253–268CrossRef Sharma R, Vashisht V, Singh U (2020) eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommun Syst 74:253–268CrossRef
31.
Zurück zum Zitat Kumar M, Mukherjee P, Verma K, Verma S, Rawat DB (2022) Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Transactions on Network Science and Engineering 9(5):3272–3281CrossRef Kumar M, Mukherjee P, Verma K, Verma S, Rawat DB (2022) Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Transactions on Network Science and Engineering 9(5):3272–3281CrossRef
32.
Zurück zum Zitat Morsi AM, Barakat TM (2020) Ahmed Ali Nashaat, “An Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks,.” International Journal of Computer Networks & Communications (IJCNC) 12(1):12 Morsi AM, Barakat TM (2020) Ahmed Ali Nashaat, “An Efficient and Secure Malicious Node Detection Model for Wireless Sensor Networks,.” International Journal of Computer Networks & Communications (IJCNC) 12(1):12
33.
Zurück zum Zitat Pal P, Tripathi S, Kumar C (2022) Single Probe Imitation of Multi-Depth Capacitive Soil Moisture Sensor Using Bidirectional Recurrent Neural Network. IEEE Trans Instrum Meas 71:1–11CrossRef Pal P, Tripathi S, Kumar C (2022) Single Probe Imitation of Multi-Depth Capacitive Soil Moisture Sensor Using Bidirectional Recurrent Neural Network. IEEE Trans Instrum Meas 71:1–11CrossRef
34.
Zurück zum Zitat Sumathi AC, Javadpour A, Pinto P, Sangaiah AK, Zhang W, Mahmoodi Khaniabadi S (2022) NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN). Int J Mach Learn Cybern 13:2869–2889CrossRef Sumathi AC, Javadpour A, Pinto P, Sangaiah AK, Zhang W, Mahmoodi Khaniabadi S (2022) NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN). Int J Mach Learn Cybern 13:2869–2889CrossRef
35.
Zurück zum Zitat Li Y, Yu N, Zhang W, Zhao W, You X, Daneshmand M (2011) Enhancing the performance of LEACH protocol in wireless sensor networks. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 223–228 Li Y, Yu N, Zhang W, Zhao W, You X, Daneshmand M (2011) Enhancing the performance of LEACH protocol in wireless sensor networks. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 223–228
36.
Zurück zum Zitat Trojovský P, Dehghani M (2022) Pelican Optimization Algorithm: A Novel Nature-Inspired Algorithm for Engineering Applications. Sensors 22(855) Trojovský P, Dehghani M (2022) Pelican Optimization Algorithm: A Novel Nature-Inspired Algorithm for Engineering Applications. Sensors 22(855)
37.
Zurück zum Zitat Hatamlou A (2013) Black hole: A new heuristic optimization approach for data clustering. Inf Sci 222:175–184MathSciNetCrossRef Hatamlou A (2013) Black hole: A new heuristic optimization approach for data clustering. Inf Sci 222:175–184MathSciNetCrossRef
38.
Zurück zum Zitat Jawad HM et al (2020) Accurate Empirical Path-Loss Model Based on Particle Swarm Optimization for Wireless Sensor Networks in Smart Agriculture. IEEE Sens J 20(1):552–561CrossRef Jawad HM et al (2020) Accurate Empirical Path-Loss Model Based on Particle Swarm Optimization for Wireless Sensor Networks in Smart Agriculture. IEEE Sens J 20(1):552–561CrossRef
39.
Zurück zum Zitat Daneshvar SMMH, Mohajer PAA, Mazinani SM (2019) Energy-Efficient Routing in WSN: A Centralized Cluster-Based Approach via Grey Wolf Optimizer. IEEE Access 7:170019–170031CrossRef Daneshvar SMMH, Mohajer PAA, Mazinani SM (2019) Energy-Efficient Routing in WSN: A Centralized Cluster-Based Approach via Grey Wolf Optimizer. IEEE Access 7:170019–170031CrossRef
40.
Zurück zum Zitat Sarode P, Reshmi TR, Pattabiraman V (2021) Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN. Wirel Pers Commun 116:513–538CrossRef Sarode P, Reshmi TR, Pattabiraman V (2021) Combination of Fitness-Mated Lion Algorithm with Neural Network for Optimal Query Ordering Data Aggregation Model in WSN. Wirel Pers Commun 116:513–538CrossRef
41.
Zurück zum Zitat Ramesh S, Yaashuwanth C, Prathibanandhi K, Basha AR, Jayasankar T (2021) An optimized deep neural network based DoS attack detection in wireless video sensor network. J Ambient Intell Humaniz Comput Ramesh S, Yaashuwanth C, Prathibanandhi K, Basha AR, Jayasankar T (2021) An optimized deep neural network based DoS attack detection in wireless video sensor network. J Ambient Intell Humaniz Comput
42.
Zurück zum Zitat Wang C, Fu Y (2020) Ship Trajectory Prediction Based on Attention in Bidirectional Recurrent Neural Networks. 2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT) 529–533 Wang C, Fu Y (2020) Ship Trajectory Prediction Based on Attention in Bidirectional Recurrent Neural Networks. 2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT) 529–533
43.
Zurück zum Zitat Srinivasan V, Raj VH, Thirumalraj A, Nagarathinam K (2024) Detection of Data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO Feature selection. Frontier Srinivasan V, Raj VH, Thirumalraj A, Nagarathinam K (2024) Detection of Data imbalance in MANET network based on ADSY-AEAMBi-LSTM with DBO Feature selection. Frontier 
44.
Zurück zum Zitat Rajasoundaran S, Santhosh Kumar SVN, Selvi M, Thangaramya K, Arputharaj K (2024) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Networks 30:209–231CrossRef Rajasoundaran S, Santhosh Kumar SVN, Selvi M, Thangaramya K, Arputharaj K (2024) Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Networks 30:209–231CrossRef
45.
Zurück zum Zitat Wang Z, Zeng K, Wang J, Li D (2024) FAGnet: Family-aware-based android malware analysis using graph neural network. Knowl-Based Syst 289:111531CrossRef Wang Z, Zeng K, Wang J, Li D (2024) FAGnet: Family-aware-based android malware analysis using graph neural network. Knowl-Based Syst 289:111531CrossRef
Metadaten
Titel
A hybrid heuristic-assisted deep learning for secured routing and malicious node detection in wireless sensor networks
verfasst von
Dingari Kalpana
P. Ajitha
Publikationsdatum
03.06.2024
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2024
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-024-01735-6