Skip to main content
Top
Published in: Optical Memory and Neural Networks 1/2024

01-03-2024

Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector

Author: R. Preethi

Published in: Optical Memory and Neural Networks | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Military tasks constitute the most important and significant applications of Wireless sensor networks (WSNs). In military, Sensor node deployment increases activities, efficient operation, saves loss of life, and protects national sovereignty. Usually, the main difficulties in military missions are energy consumption and security in the network. Another major security issues are hacking or masquerade attack. To overcome the limitations, the proposed method modified DBSCAN with OSPREY optimization Algorithm (OOA) using hybrid classifier Long Short-Term Memory (LSTM) with Extreme Gradient Boosting (XGBOOST) to detect attack types in the WSN military sector for enhancing security. First, nodes are deployed and modified DBSCAN algorithm is used to cluster the nodes to reduce energy consumption. To select the cluster head optimally by using the OSPREY optimization Algorithm (OOA) based on small distance and high energy for transfer data between the base station and nodes. Hybrid LSTM-XGBOOST classifier utilized to learn the parameter and predict the four assault types such as scheduling, flooding, blackhole and grayhole assault. Classification and network metrics including Packet Delivery Ratio (PDR), Throughput, Average Residual Energy (ARE), Packet Loss Ratio (PLR), Accuracy and F1_score are used to evaluate the performance of the model. Performance results show that PDR of 94.12%, 3.2 Mbps throughput at 100 nodes, ARE of 8.94J, PLR of 5.88%, accuracy of 96.14%, and F1_score of 95.04% are achieved. Hence, the designed model for assault prediction types in WSN based on modified DBSCAN clustering with a hybrid classifier yields better results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rajakumaran, G., Venkataraman, N., and Mukkamala, R.R., Denial of service attack prediction using gradient descent algorithm, SN Comput. Sci., 2020, vol. 1, pp. 1–8.CrossRef Rajakumaran, G., Venkataraman, N., and Mukkamala, R.R., Denial of service attack prediction using gradient descent algorithm, SN Comput. Sci., 2020, vol. 1, pp. 1–8.CrossRef
2.
go back to reference Preethi, R. and Anbuselvi, R., Energy Efficient Cluster Based Technique for Resource Allocation in MANET, International Journal of Science and Research (IJSR), 2015, vol. 6, no. 6, pp. 1951–1957. Preethi, R. and Anbuselvi, R., Energy Efficient Cluster Based Technique for Resource Allocation in MANET, International Journal of Science and Research (IJSR), 2015, vol. 6, no. 6, pp. 1951–1957.
3.
go back to reference Preethi, R. and Anbuselvi, R., A Game Theory Approach for Efficient Node Clustering Based on Unstable Ranging Transmission in MANET, International Journal of Engineering & Technology, 2018, vol. 7, no. 2.22, pp. 21–26. Preethi, R. and Anbuselvi, R., A Game Theory Approach for Efficient Node Clustering Based on Unstable Ranging Transmission in MANET, International Journal of Engineering & Technology, 2018, vol. 7, no. 2.22, pp. 21–26.
4.
go back to reference Preethi, R. and Sughasiny, M., Pbgtr: Price based game theory routing for minimum cost routing path in manet. In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 2018, pp. 469–474. Preethi, R. and Sughasiny, M., Pbgtr: Price based game theory routing for minimum cost routing path in manet. In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) IEEE, 2018, pp. 469–474.
5.
go back to reference Preethi, R. and Sughasiny, M., AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile. In Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, 2018, vol. 940, p. 73. Preethi, R. and Sughasiny, M., AKCSS: An Asymmetric Key Cryptography Based on Secret Sharing in Mobile. In Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, 2018, vol. 940, p. 73.
6.
go back to reference Preethi, R. and Sughasiny, M., RBMD: Reward Based Malicious Detection in Mobile Ad hoc Network, International Journal of Scientific & Engineering Research, 2018, vol. 9, no. 9, pp. 2057–2061. Preethi, R. and Sughasiny, M., RBMD: Reward Based Malicious Detection in Mobile Ad hoc Network, International Journal of Scientific & Engineering Research, 2018, vol. 9, no. 9, pp. 2057–2061.
7.
go back to reference Anand, C. and Vasuki, N., Trust based DoS attack detection in wireless sensor networks for reliable data transmission, Wireless Pers. Communs., 2021, vol. 121, no. 4, pp. 2911–2926.CrossRef Anand, C. and Vasuki, N., Trust based DoS attack detection in wireless sensor networks for reliable data transmission, Wireless Pers. Communs., 2021, vol. 121, no. 4, pp. 2911–2926.CrossRef
8.
go back to reference Alsulaiman, L. and Al-Ahmadi, S., Performance evaluation of machine learning techniques for DOS detection in wireless sensor network, arXiv preprint arXiv:2104.01963, 2021. Alsulaiman, L. and Al-Ahmadi, S., Performance evaluation of machine learning techniques for DOS detection in wireless sensor network, arXiv preprint arXiv:2104.01963, 2021.
9.
go back to reference Salmi, S. and Oughdir, L., Cnn-lstm based approach for dos attacks detection in wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2022, vol. 13, no. 4. Salmi, S. and Oughdir, L., Cnn-lstm based approach for dos attacks detection in wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2022, vol. 13, no. 4.
10.
go back to reference Hemanand, D., Reddy, G.V., Babu, S.S., Balmuri, K.R., Chitra, T., and Gopalakrishnan, S., An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs), Int. J. Intell. Syst. Appl. Eng., 2022, vol. 10, no. 3, pp. 285–293. Hemanand, D., Reddy, G.V., Babu, S.S., Balmuri, K.R., Chitra, T., and Gopalakrishnan, S., An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs), Int. J. Intell. Syst. Appl. Eng., 2022, vol. 10, no. 3, pp. 285–293.
11.
go back to reference Rezvi, M.A., Moontaha, S., Trisha, K.A., Cynthia, S.T., and Ripon, S., Data mining approach to analyzing intrusion detection of wireless sensor network, Indones. J. Electr. Eng. Comput. Sci., 2021, vol. 21, no. 1, pp. 516–523. Rezvi, M.A., Moontaha, S., Trisha, K.A., Cynthia, S.T., and Ripon, S., Data mining approach to analyzing intrusion detection of wireless sensor network, Indones. J. Electr. Eng. Comput. Sci., 2021, vol. 21, no. 1, pp. 516–523.
12.
go back to reference Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., and Li, L., Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm, Sensors, 2019, vol. 19, no. 1, p. 203.CrossRef Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., and Li, L., Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm, Sensors, 2019, vol. 19, no. 1, p. 203.CrossRef
13.
go back to reference Alruhaily, N.M. and Ibrahim, D.M., A multi-layer machine learning-based intrusion detection system for wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2021, vol. 12, no. 4, pp. 281–288. Alruhaily, N.M. and Ibrahim, D.M., A multi-layer machine learning-based intrusion detection system for wireless sensor networks, Int. J. Adv. Comput. Sci. Appl., 2021, vol. 12, no. 4, pp. 281–288.
14.
go back to reference Srinivas, D., Adaptive density-based localization algorithm using particle swarm optimization and DBSCAN clustering approach, Turk. J. Comput. Math. Educ. (TURCOMAT), 2021, vol. 12, no. 11, pp. 5053–5062. Srinivas, D., Adaptive density-based localization algorithm using particle swarm optimization and DBSCAN clustering approach, Turk. J. Comput. Math. Educ. (TURCOMAT), 2021, vol. 12, no. 11, pp. 5053–5062.
15.
go back to reference Liu, Y. and Wu, Y., Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks, IEEE Access, 2021, vol. 9, pp. 77090–77105.CrossRef Liu, Y. and Wu, Y., Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks, IEEE Access, 2021, vol. 9, pp. 77090–77105.CrossRef
16.
go back to reference Dehghani, M. and Trojovský, P., Osprey optimization algorithm: A new bio-inspired metaheuristic algorithm for solving engineering optimization problems, Front. Mech. Eng., 2023, vol. 8, p. 1126450.CrossRef Dehghani, M. and Trojovský, P., Osprey optimization algorithm: A new bio-inspired metaheuristic algorithm for solving engineering optimization problems, Front. Mech. Eng., 2023, vol. 8, p. 1126450.CrossRef
17.
go back to reference Turkoglu, M., Hanbay, D., and Sengur, A., Multi-model LSTM-based convolutional neural networks for detection of apple diseases and pests, J. Ambient Intell. Humanized Comput., 2019, pp. 1–11. Turkoglu, M., Hanbay, D., and Sengur, A., Multi-model LSTM-based convolutional neural networks for detection of apple diseases and pests, J. Ambient Intell. Humanized Comput., 2019, pp. 1–11.
18.
go back to reference Gouveia, A. and Correia, M., Network intrusion detection with XGBoost, Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 2020, vol. 137. Gouveia, A. and Correia, M., Network intrusion detection with XGBoost, Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), 2020, vol. 137.
19.
go back to reference KIRAN, Kaggle, 2019. https://www.kaggle.com/datasets/kiranmahesh/nslkdd?select=kdd. Accessed October 16, 2023. KIRAN, Kaggle, 2019. https://​www.​kaggle.​com/​datasets/​kiranmahesh/​nslkdd?​select=​kdd.​ Accessed October 16, 2023.
Metadata
Title
Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector
Author
R. Preethi
Publication date
01-03-2024
Publisher
Pleiades Publishing
Published in
Optical Memory and Neural Networks / Issue 1/2024
Print ISSN: 1060-992X
Electronic ISSN: 1934-7898
DOI
https://doi.org/10.3103/S1060992X24010089

Other articles of this Issue 1/2024

Optical Memory and Neural Networks 1/2024 Go to the issue

Premium Partner