Skip to main content
Top
Published in: Soft Computing 8/2019

03-12-2018 | Focus

An adaptive neuro-fuzzy logic based jamming detection system in WSN

Authors: K. P. Vijayakumar, K. Pradeep Mohan Kumar, K. Kottilingam, T. Karthick, P. Vijayakumar, P. Ganeshkumar

Published in: Soft Computing | Issue 8/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor network (WSN) is employed in variety of applications ranging from agriculture to military. WSN is vulnerable to various security attacks, in which jamming attacks obstruct and disturb the exchange of information between sensor nodes in WSN by transmitting signals to jam legitimate transmission to cause a denial of service. Hence, it is essential to secure the sensor networks from jamming attacks. In this paper, two approaches: fuzzy inference system (FIS) and adaptive neuro-fuzzy inference system (ANFIS)-based jamming detection system are proposed for detecting the presence of jamming by computing two jamming detection metrics, namely, packet delivery ratio and received signal strength indicator. FIS approach is based on Takagi–Sugeno fuzzy logic which optimizes the jamming detection metrics. ANFIS approach combines fuzzy logic and learning ability of the neural network to optimize the metrics for detecting various types of jamming. The proposed approaches are compared with existing system and themselves. The simulation result shows that the proposed ANFIS approach detects the jamming attacks as high as true detection ratio.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abbasi AA, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30(14–15):2826–2841CrossRef Abbasi AA, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30(14–15):2826–2841CrossRef
go back to reference Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
go back to reference Alrajeh NA, Khan S, Shams B (2013) Intrusion detection systems in wireless sensor networks: a review. Int J Distrib Sens Netw 2013:1–7CrossRef Alrajeh NA, Khan S, Shams B (2013) Intrusion detection systems in wireless sensor networks: a review. Int J Distrib Sens Netw 2013:1–7CrossRef
go back to reference Azad P, Sharma V (2013) Cluster head selection in wireless sensor networks under fuzzy environment. ISRN Sens Netw 2013:1–8CrossRef Azad P, Sharma V (2013) Cluster head selection in wireless sensor networks under fuzzy environment. ISRN Sens Netw 2013:1–8CrossRef
go back to reference Cakiroglu M, Ozcerit AT (2008) Jamming detection mechanisms for wireless sensor networks. In: Proceedings of the 3rd international conference on scalable information systems, pp 4–6, June 2008 Cakiroglu M, Ozcerit AT (2008) Jamming detection mechanisms for wireless sensor networks. In: Proceedings of the 3rd international conference on scalable information systems, pp 4–6, June 2008
go back to reference Chen J-S, Hong Z-W, Wang N-C, Jhuang S-H (2010) Efficient cluster head selection methods for wireless sensor networks. J Netw 5(8):964–970 Chen J-S, Hong Z-W, Wang N-C, Jhuang S-H (2010) Efficient cluster head selection methods for wireless sensor networks. J Netw 5(8):964–970
go back to reference Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of 2nd IEEE workshop on dependability and security in sensor networks and systems, Columbia, pp 13–22 Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of 2nd IEEE workshop on dependability and security in sensor networks and systems, Columbia, pp 13–22
go back to reference Devi R, Jha RK, Gupta A, Jain S, Kumar P (2017) Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network. Int J Electron Commun 74:94–106CrossRef Devi R, Jha RK, Gupta A, Jain S, Kumar P (2017) Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network. Int J Electron Commun 74:94–106CrossRef
go back to reference Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor networks. Sensors 11:4875–4898CrossRef Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor networks. Sensors 11:4875–4898CrossRef
go back to reference Fei H, Jiang M, Celentano L, Xiao Y (2008) Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. Ad Hoc Netw 6(7):986–1012CrossRef Fei H, Jiang M, Celentano L, Xiao Y (2008) Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. Ad Hoc Netw 6(7):986–1012CrossRef
go back to reference Ferdous R, Muthukkumarasamy V, Sithirasenan E (2011) Trust-based cluster head selection algorithm for mobile ad hoc networks. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha, pp 589–596 Ferdous R, Muthukkumarasamy V, Sithirasenan E (2011) Trust-based cluster head selection algorithm for mobile ad hoc networks. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha, pp 589–596
go back to reference Hussain K, Abdullah AH, Iqbal S, Awan KM, Ahsan F (2013) Efficient cluster head selection algorithm for MANET. J Comput Netw Commun 2013:7 Hussain K, Abdullah AH, Iqbal S, Awan KM, Ahsan F (2013) Efficient cluster head selection algorithm for MANET. J Comput Netw Commun 2013:7
go back to reference Kang S, Lee S, Ahn S, An S (2012) Energy efficient topology control based on sociological cluster in wireless sensor networks. KSII Trans Internet Inf Syst 6(1):339–358 Kang S, Lee S, Ahn S, An S (2012) Energy efficient topology control based on sociological cluster in wireless sensor networks. KSII Trans Internet Inf Syst 6(1):339–358
go back to reference Kuila P, Jana PK (2012) Improved load balanced clustering algorithm for wireless sensor networks. Adv Comput Netw Secur 7135:399–404CrossRef Kuila P, Jana PK (2012) Improved load balanced clustering algorithm for wireless sensor networks. Adv Comput Netw Secur 7135:399–404CrossRef
go back to reference Kumar D (2014) Performance analysis of energy efficient clustering protocol for maximizing lifetime of wireless sensor networks. IET Wirel Sens Syst 4(1):9–16 Kumar D (2014) Performance analysis of energy efficient clustering protocol for maximizing lifetime of wireless sensor networks. IET Wirel Sens Syst 4(1):9–16
go back to reference Liu X, Shi J (2012) Clustering routing algorithms in wireless sensor networks: an overview. KSII Trans Internet Inf Syst 6(7):1735–1755 Liu X, Shi J (2012) Clustering routing algorithms in wireless sensor networks: an overview. KSII Trans Internet Inf Syst 6(7):1735–1755
go back to reference Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. In: Proceedings of second IEEE international conference on parallel distributed and grid computing (PDGC), pp 563–567 Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. In: Proceedings of second IEEE international conference on parallel distributed and grid computing (PDGC), pp 563–567
go back to reference Mathur N, Glesk I, Buis A (2016) Comparison of adaptive neuro-fuzzy inference system (ANFIS) and Gaussian processes for machine learning (GPML) algorithms for the prediction of skin temperature in lower limb prostheses. Med Eng Phys 38(10):1083–1089CrossRef Mathur N, Glesk I, Buis A (2016) Comparison of adaptive neuro-fuzzy inference system (ANFIS) and Gaussian processes for machine learning (GPML) algorithms for the prediction of skin temperature in lower limb prostheses. Med Eng Phys 38(10):1083–1089CrossRef
go back to reference Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10(4):3444–3479CrossRef Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10(4):3444–3479CrossRef
go back to reference Mo S, Chen H, Yinglong L (2011) Clustering-based routing for top-k querying in wireless sensor networks. EURASIP J Wirel Commun Netw 2011:73CrossRef Mo S, Chen H, Yinglong L (2011) Clustering-based routing for top-k querying in wireless sensor networks. EURASIP J Wirel Commun Netw 2011:73CrossRef
go back to reference Paramasivan B, Kaliappan M (2014) Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks. Sci World J 2014:1–6CrossRef Paramasivan B, Kaliappan M (2014) Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks. Sci World J 2014:1–6CrossRef
go back to reference Park S-J, Vedantham R, Sivakumar R, Akyildiz IF (2008) GARUDA: achieving effective reliability for downstream communication in wireless sensor networks. IEEE Trans Mob Comput 7(2):214–230CrossRef Park S-J, Vedantham R, Sivakumar R, Akyildiz IF (2008) GARUDA: achieving effective reliability for downstream communication in wireless sensor networks. IEEE Trans Mob Comput 7(2):214–230CrossRef
go back to reference Rajshekhar Chalak A, Misra S, Obaidat MC (2010) A cluster-head selection algorithm for wireless sensor networks. In: 17th IEEE international conference on electronics, circuits, and systems ICECS, pp 130–133 Rajshekhar Chalak A, Misra S, Obaidat MC (2010) A cluster-head selection algorithm for wireless sensor networks. In: 17th IEEE international conference on electronics, circuits, and systems ICECS, pp 130–133
go back to reference Shi E, Perrig A (2004) Designing secure sensor networks. IEEE Wirel Commun 11(6):38–43CrossRef Shi E, Perrig A (2004) Designing secure sensor networks. IEEE Wirel Commun 11(6):38–43CrossRef
go back to reference Siddhabathula K, Dong Q, Liu D, Wright M (2012) Fast jamming detection in sensor networks. In: Proceedings of IEEE international conference on communications, pp 934–938 Siddhabathula K, Dong Q, Liu D, Wright M (2012) Fast jamming detection in sensor networks. In: Proceedings of IEEE international conference on communications, pp 934–938
go back to reference Sikander G, Zafar MH, Raza A, Babar MI, Mahmud SA, Khan GM (2013) A survey of cluster based routing schemes for wireless sensor network. Smart Comput Rev 13(4):261–275 Sikander G, Zafar MH, Raza A, Babar MI, Mahmud SA, Khan GM (2013) A survey of cluster based routing schemes for wireless sensor network. Smart Comput Rev 13(4):261–275
go back to reference Singh SP, Sharma SC (2015) A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput Sci 45:687–695CrossRef Singh SP, Sharma SC (2015) A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput Sci 45:687–695CrossRef
go back to reference Vijayakumar KP, Ganeshkumar P, Anandaraj M (2015) A novel jamming detection technique in wireless sensor networks. KSII Trans Internet Inf Syst 9(10):4223–4249 Vijayakumar KP, Ganeshkumar P, Anandaraj M (2015) A novel jamming detection technique in wireless sensor networks. KSII Trans Internet Inf Syst 9(10):4223–4249
go back to reference Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the sixth ACM international symposium on mobile ad hoc networking and computing, pp 46–57, Nov 2005 Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the sixth ACM international symposium on mobile ad hoc networking and computing, pp 46–57, Nov 2005
go back to reference Yadav RK, Kumar V, Kumar R (2015) A discrete particle swarm optimization based clustering algorithm for wireless sensor networks. Adv Intell Syst Comput 338:137–144 Yadav RK, Kumar V, Kumar R (2015) A discrete particle swarm optimization based clustering algorithm for wireless sensor networks. Adv Intell Syst Comput 338:137–144
Metadata
Title
An adaptive neuro-fuzzy logic based jamming detection system in WSN
Authors
K. P. Vijayakumar
K. Pradeep Mohan Kumar
K. Kottilingam
T. Karthick
P. Vijayakumar
P. Ganeshkumar
Publication date
03-12-2018
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 8/2019
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-018-3636-5

Other articles of this Issue 8/2019

Soft Computing 8/2019 Go to the issue

Premium Partner