Skip to main content
Erschienen in: Wireless Personal Communications 1/2022

31.05.2022

Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network

verfasst von: Tanya Sood, Satyartha Prakash, Sandeep Sharma, Abhilash Singh, Hemant Choubey

Erschienen in: Wireless Personal Communications | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aysal, T. C., & Barner, K. E. (2008). Sensor data cryptography in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 3(2), 273–289.CrossRef Aysal, T. C., & Barner, K. E. (2008). Sensor data cryptography in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 3(2), 273–289.CrossRef
2.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys & Tutorials, 11(2), 52–73.CrossRef
3.
Zurück zum Zitat Kotiyal, V., Singh, A., Sharma, S., Nagar, J., & Lee, C.-C. (2021). Ecs-nl: An enhanced cuckoo search algorithm for node localisation in wireless sensor networks. Sensors, 21(11), 3576.CrossRef Kotiyal, V., Singh, A., Sharma, S., Nagar, J., & Lee, C.-C. (2021). Ecs-nl: An enhanced cuckoo search algorithm for node localisation in wireless sensor networks. Sensors, 21(11), 3576.CrossRef
4.
Zurück zum Zitat Singh, A., Amutha, J., Nagar, J., Sharma, S., & Lee, C.-C. (2022). Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(03), 1070.CrossRef Singh, A., Amutha, J., Nagar, J., Sharma, S., & Lee, C.-C. (2022). Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors, 22(03), 1070.CrossRef
5.
Zurück zum Zitat Singh, J., Chaturvedi, A., Sharma, S., & Singh, A. (2021). A novel model to eliminate the doubly near-far problem in wireless powered communication network. IET Communications, 15, 1539–1547.CrossRef Singh, J., Chaturvedi, A., Sharma, S., & Singh, A. (2021). A novel model to eliminate the doubly near-far problem in wireless powered communication network. IET Communications, 15, 1539–1547.CrossRef
6.
Zurück zum Zitat Sharma, S., Kumar, R., Singh, A., & Singh, J. (2020). Wireless information and power transfer using single and multiple path relays. International Journal of Communication Systems, 33(14), e4464.CrossRef Sharma, S., Kumar, R., Singh, A., & Singh, J. (2020). Wireless information and power transfer using single and multiple path relays. International Journal of Communication Systems, 33(14), e4464.CrossRef
7.
Zurück zum Zitat Amutha, J., Sharma, S., & Nagar, J. (2020). WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111(2), 1089–1115.CrossRef Amutha, J., Sharma, S., & Nagar, J. (2020). WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Personal Communications, 111(2), 1089–1115.CrossRef
8.
Zurück zum Zitat Amutha, J., Nagar, J., & Sharma, S. (2021). A distributed border surveillance (DBS) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Personal Communications, 117(3), 2135–2155.CrossRef Amutha, J., Nagar, J., & Sharma, S. (2021). A distributed border surveillance (DBS) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Personal Communications, 117(3), 2135–2155.CrossRef
9.
Zurück zum Zitat Sharma, S., & Nagar, J. (2020). Intrusion detection in mobile sensor networks: A case study for different intrusion paths. Wireless Personal Communications, 115, 2569–2589.CrossRef Sharma, S., & Nagar, J. (2020). Intrusion detection in mobile sensor networks: A case study for different intrusion paths. Wireless Personal Communications, 115, 2569–2589.CrossRef
10.
Zurück zum Zitat Pandey, S. (2011). Modern network security: Issues and challenges. IJEST, 3, 4351–4356. Pandey, S. (2011). Modern network security: Issues and challenges. IJEST, 3, 4351–4356.
11.
Zurück zum Zitat Roy, A. S., Maitra, B. N., Nath, C. J., Agarwal, D. S., & Nath, E. A. (2012) Ultra encryption standard (ues) version-ii: Symmetric key cryptosystem using generalized modified Vernam cipher method, permutation method, columnar transposition method and ttjsa method. In Proceedings of the international conference on foundations of computer science (FCS) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer 2012. Roy, A. S., Maitra, B. N., Nath, C. J., Agarwal, D. S., & Nath, E. A. (2012) Ultra encryption standard (ues) version-ii: Symmetric key cryptosystem using generalized modified Vernam cipher method, permutation method, columnar transposition method and ttjsa method. In Proceedings of the international conference on foundations of computer science (FCS) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer 2012.
12.
Zurück zum Zitat Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.CrossRef Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159–170.CrossRef
13.
Zurück zum Zitat Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9(20), 4396.CrossRef Liu, H., & Lang, B. (2019). Machine learning and deep learning methods for intrusion detection systems: A survey. Applied Sciences, 9(20), 4396.CrossRef
14.
Zurück zum Zitat Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Communications Surveys & Tutorials, 16(4), 1996–2018.CrossRef Alsheikh, M. A., Lin, S., Niyato, D., & Tan, H.-P. (2014). Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Communications Surveys & Tutorials, 16(4), 1996–2018.CrossRef
15.
Zurück zum Zitat Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895.CrossRef Nancy, P., Muthurajkumar, S., Ganapathy, S., Kumar, S. S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888–895.CrossRef
16.
Zurück zum Zitat Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–16.CrossRef Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communications and Networking, 2013(1), 1–16.CrossRef
17.
Zurück zum Zitat Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713–722.CrossRef Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713–722.CrossRef
18.
Zurück zum Zitat Balamurugan, N., Mohan, S., Adimoolam, M., John, A., Wang, W., et al. (2022). DOA tracking for seamless connectivity in beamformed IoT-based drones. Computer Standards & Interfaces, 79, 103564.CrossRef Balamurugan, N., Mohan, S., Adimoolam, M., John, A., Wang, W., et al. (2022). DOA tracking for seamless connectivity in beamformed IoT-based drones. Computer Standards & Interfaces, 79, 103564.CrossRef
19.
Zurück zum Zitat Kumar, S. S., Palanichamy, Y., Selvi, M., Ganapathy, S., Kannan, A., & Perumal, S. P. (2021). Energy efficient secured k means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Networks, 27, 3873–3894.CrossRef Kumar, S. S., Palanichamy, Y., Selvi, M., Ganapathy, S., Kannan, A., & Perumal, S. P. (2021). Energy efficient secured k means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks. Wireless Networks, 27, 3873–3894.CrossRef
20.
Zurück zum Zitat Singh, A., Sharma, S., & Singh, J. (2021). Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Computer Science Review, 39, 100342.MathSciNetMATHCrossRef Singh, A., Sharma, S., & Singh, J. (2021). Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Computer Science Review, 39, 100342.MathSciNetMATHCrossRef
21.
Zurück zum Zitat Amutha, J., Sharma, S., & Sharma, S. K. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review, 40, 100376.MathSciNetMATHCrossRef Amutha, J., Sharma, S., & Sharma, S. K. (2021). Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Computer Science Review, 40, 100376.MathSciNetMATHCrossRef
22.
Zurück zum Zitat Singh, A., Kotiyal, V., Sharma, S., Nagar, J., & Lee, C.-C. (2020). A machine learning approach to predict the average localization error with applications to wireless sensor networks. IEEE Access, 8, 208253–208263.CrossRef Singh, A., Kotiyal, V., Sharma, S., Nagar, J., & Lee, C.-C. (2020). A machine learning approach to predict the average localization error with applications to wireless sensor networks. IEEE Access, 8, 208253–208263.CrossRef
23.
Zurück zum Zitat Khan, T., Singh, K., Hasan, M. H., Ahmad, K., Reddy, G. T., Mohan, S., & Ahmadian, A. (2021). Eters: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.CrossRef Khan, T., Singh, K., Hasan, M. H., Ahmad, K., Reddy, G. T., Mohan, S., & Ahmadian, A. (2021). Eters: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921–943.CrossRef
24.
Zurück zum Zitat Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.CrossRef Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Nehemiah, H. K., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.CrossRef
25.
Zurück zum Zitat Singh, A., Nagar, J., Sharma, S., & Kotiyal, V. (2021). A gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems With Applications, 172, 114603.CrossRef Singh, A., Nagar, J., Sharma, S., & Kotiyal, V. (2021). A gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems With Applications, 172, 114603.CrossRef
26.
Zurück zum Zitat Vallathan, G., John, A., Thirumalai, C., Mohan, S., Srivastava, G., & Lin, J.C.-W. (2021). Suspicious activity detection using deep learning in secure assisted living IoT environments. The Journal of Supercomputing, 77(4), 3242–3260.CrossRef Vallathan, G., John, A., Thirumalai, C., Mohan, S., Srivastava, G., & Lin, J.C.-W. (2021). Suspicious activity detection using deep learning in secure assisted living IoT environments. The Journal of Supercomputing, 77(4), 3242–3260.CrossRef
27.
Zurück zum Zitat Yadav, A. K., Singh, K., Ahmadian, A., Mohan, S., Shah, S. B. H., & Alnumay, W. S. (2021). Emmm: Energy-efficient mobility management model for context-aware transactions over mobile communication. Sustainable Computing: Informatics and Systems, 30, 100499. Yadav, A. K., Singh, K., Ahmadian, A., Mohan, S., Shah, S. B. H., & Alnumay, W. S. (2021). Emmm: Energy-efficient mobility management model for context-aware transactions over mobile communication. Sustainable Computing: Informatics and Systems, 30, 100499.
28.
Zurück zum Zitat Aksu, D., & Aydin, M. A. (2018). Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms. In 2018 International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT) (pp. 77–80). IEEE. Aksu, D., & Aydin, M. A. (2018). Detecting port scan attempts with comparative analysis of deep learning and support vector machine algorithms. In 2018 International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT) (pp. 77–80). IEEE.
29.
Zurück zum Zitat Wang, Z. (2018). Deep learning-based intrusion detection with adversaries. IEEE Access, 6, 38367–38384.CrossRef Wang, Z. (2018). Deep learning-based intrusion detection with adversaries. IEEE Access, 6, 38367–38384.CrossRef
30.
Zurück zum Zitat Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843–52856.CrossRef Al-Qatf, M., Lasheng, Y., Al-Habib, M., & Al-Sabahi, K. (2018). Deep learning approach combining sparse autoencoder with SVM for network intrusion detection. IEEE Access, 6, 52843–52856.CrossRef
31.
Zurück zum Zitat Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.CrossRef Vinayakumar, R., Alazab, M., Soman, K., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.CrossRef
32.
Zurück zum Zitat Alshinina, R. A., & Elleithy, K. M. (2018). A highly accurate deep learning based approach for developing wireless sensor network middleware. IEEE Access, 6, 29885–29898.CrossRef Alshinina, R. A., & Elleithy, K. M. (2018). A highly accurate deep learning based approach for developing wireless sensor network middleware. IEEE Access, 6, 29885–29898.CrossRef
33.
Zurück zum Zitat Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. In Advances in neural information processing systems (pp. 2672–2680). Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., & Bengio, Y. (2014). Generative adversarial nets. In Advances in neural information processing systems (pp. 2672–2680).
34.
36.
Zurück zum Zitat Sricharan, K., Bala, R., Shreve, M., Ding, H., Saketh, K., & Sun, J. (2017). Semi-supervised conditional gans. arXiv preprint arXiv:1708.05789, 2017. Sricharan, K., Bala, R., Shreve, M., Ding, H., Saketh, K., & Sun, J. (2017). Semi-supervised conditional gans. arXiv preprint arXiv:​1708.​05789, 2017.
37.
Zurück zum Zitat Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., & Peng, J. (2018). Xgboost classifier for DDOS attack detection and analysis in SDN-based cloud. In 2018 IEEE international conference on big data and smart computing (bigcomp) (pp. 251–256). IEEE. Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., & Peng, J. (2018). Xgboost classifier for DDOS attack detection and analysis in SDN-based cloud. In 2018 IEEE international conference on big data and smart computing (bigcomp) (pp. 251–256). IEEE.
38.
Zurück zum Zitat Chen, T., & Guestrin, C. (2016). Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 785–794). Chen, T., & Guestrin, C. (2016). Xgboost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 785–794).
39.
Zurück zum Zitat Dhaliwal, S. S., Nahid, A.-A., & Abbas, R. (2018). Effective intrusion detection system using xgboost. Information, 9(7), 149.CrossRef Dhaliwal, S. S., Nahid, A.-A., & Abbas, R. (2018). Effective intrusion detection system using xgboost. Information, 9(7), 149.CrossRef
42.
Zurück zum Zitat Gadge, J., & Patil, A. A. (2008) Port scan detection. In 2008 16th IEEE international conference on networks (pp. 1–6). IEEE. Gadge, J., & Patil, A. A. (2008) Port scan detection. In 2008 16th IEEE international conference on networks (pp. 1–6). IEEE.
Metadaten
Titel
Intrusion Detection System in Wireless Sensor Network Using Conditional Generative Adversarial Network
verfasst von
Tanya Sood
Satyartha Prakash
Sandeep Sharma
Abhilash Singh
Hemant Choubey
Publikationsdatum
31.05.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09776-x

Weitere Artikel der Ausgabe 1/2022

Wireless Personal Communications 1/2022 Zur Ausgabe

Neuer Inhalt