Skip to main content
Erschienen in: Wireless Personal Communications 1/2020

22.04.2020

Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network

verfasst von: Somnath Sinha, Aditi Paul

Erschienen in: Wireless Personal Communications | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Malicious attacks like denial-of-service massively affect the network activities of wireless sensor network. These attacks exploit network layer vulnerabilities and affect all the layers of the network. Anomaly based intrusion detection system (AIDS) are designed for monitoring such unpredictable attacks but it generates high false positive. In the proposed study we design robust and efficient AIDS which use fuzzy and neural network (NN) based tools. The proposed system can be implemented in each node as it is lightweight and does not consume much overhead. Also it can independently monitor the local nodes behaviour and identify whether a node is trust, distrust or enemy. The use of a trained NN filters the false alarms generated due to fuzzy logic applied in the first step thus enhancing the system accuracy. We evaluate the system’s performance in NS2.35 and result shows a 100% true positive with 0% false positive.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lakshmi, H. N., Anand, S., & Sinha, S. (2019). Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8(5), 1792–1796. Lakshmi, H. N., Anand, S., & Sinha, S. (2019). Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8(5), 1792–1796.
2.
Zurück zum Zitat Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2014). DoS and DDoS attacks: Defense, detection and traceback mechanisms—A survey. Global Journal Computer Science & Technology, 14(7), 1–19. Prasad, K. M., Reddy, A. R. M., & Rao, K. V. (2014). DoS and DDoS attacks: Defense, detection and traceback mechanisms—A survey. Global Journal Computer Science & Technology, 14(7), 1–19.
3.
Zurück zum Zitat Zargar, S. T., Jyoti, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communication Survey & Tutorials, 15(4), 2046–2069.CrossRef Zargar, S. T., Jyoti, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communication Survey & Tutorials, 15(4), 2046–2069.CrossRef
4.
Zurück zum Zitat Sonar, K., & Upadhyay, H. (2014). Asurvey: DDoS attack on internet of things. International Journal of Engineering Research and Development, 10(11), 58–63. Sonar, K., & Upadhyay, H. (2014). Asurvey: DDoS attack on internet of things. International Journal of Engineering Research and Development, 10(11), 58–63.
5.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM. Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless sensor networks. In Proceedings of the 3rd ACM workshop on security of ad hoc and sensor networks. ACM.
6.
Zurück zum Zitat Paul, A., & Sinha, S. (2017). Performance analysis of received signal power-based sybil detection in MANET using spline curve. International Journal of Mobile Network Design and Innovation, 7(3/4), 222–232.CrossRef Paul, A., & Sinha, S. (2017). Performance analysis of received signal power-based sybil detection in MANET using spline curve. International Journal of Mobile Network Design and Innovation, 7(3/4), 222–232.CrossRef
7.
Zurück zum Zitat Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multi hop data delivery in wireless sensor networks. International Journal of Security and Networks, 1(3/4), 167–178.CrossRef Deng, J., Han, R., & Mishra, S. (2006). Limiting DoS attacks during multi hop data delivery in wireless sensor networks. International Journal of Security and Networks, 1(3/4), 167–178.CrossRef
8.
Zurück zum Zitat Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on information processing in sensor networks, IPSN’04 (New York, NY, USA). ACM. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis and defenses. In Proceedings of the 3rd international symposium on information processing in sensor networks, IPSN’04 (New York, NY, USA). ACM.
9.
Zurück zum Zitat Sun, B., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communication, 14(5), 56–63.CrossRef Sun, B., et al. (2007). Intrusion detection techniques in mobile ad hoc and wireless sensor networks. IEEE Wireless Communication, 14(5), 56–63.CrossRef
10.
Zurück zum Zitat Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. In Y. Xiao (Ed.), Security in distributed, grid, and pervasive computing (Chapter 17). Boca Raton: Auerbach Publications, CRC Press. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: A survey. In Y. Xiao (Ed.), Security in distributed, grid, and pervasive computing (Chapter 17). Boca Raton: Auerbach Publications, CRC Press.
11.
Zurück zum Zitat Kizza, J. M. (2017). System intrusion detection and prevention: Guide to computer network security. Computer Communications and Networks. Berlin: Springer.CrossRef Kizza, J. M. (2017). System intrusion detection and prevention: Guide to computer network security. Computer Communications and Networks. Berlin: Springer.CrossRef
13.
Zurück zum Zitat Abduvaliyev, A., Pathan, A. S. K., Jianying, Z., Roman, R., & Wai-Choong, W. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15(3), 1223–1237.CrossRef Abduvaliyev, A., Pathan, A. S. K., Jianying, Z., Roman, R., & Wai-Choong, W. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 15(3), 1223–1237.CrossRef
14.
Zurück zum Zitat Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.CrossRef
15.
Zurück zum Zitat Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42–57.CrossRef Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, M. (2013). A survey of intrusion detection techniques in Cloud. Journal of Network and Computer Applications, 36(1), 42–57.CrossRef
16.
Zurück zum Zitat Gupta, A., Pandey, O., Shukla, M., Dadhich, A., Mathur, S., & Ingle, A. (2013). Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks. In Computational intelligence and computing research (ICCIC), IEEE international conference (pp. 1–7). Gupta, A., Pandey, O., Shukla, M., Dadhich, A., Mathur, S., & Ingle, A. (2013). Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks. In Computational intelligence and computing research (ICCIC), IEEE international conference (pp. 1–7).
17.
Zurück zum Zitat Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Application, 121(9), 1–9.CrossRef Pongle, P., & Chavan, G. (2015). Real time intrusion and wormhole attack detection in Internet of Things. International Journal of Computer Application, 121(9), 1–9.CrossRef
18.
Zurück zum Zitat Pastrana, S., Mitrokotsa, A., Orfila, A., & Peris-Lopez, P. (2012). Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems, 36, 217–225.CrossRef Pastrana, S., Mitrokotsa, A., Orfila, A., & Peris-Lopez, P. (2012). Evaluation of classification algorithms for intrusion detection in MANETs. Knowledge-Based Systems, 36, 217–225.CrossRef
20.
Zurück zum Zitat Mehmood, A., Mukherjee, M., & Ahmed, S. A. (2018). NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing, 74(10), 5156.CrossRef Mehmood, A., Mukherjee, M., & Ahmed, S. A. (2018). NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. The Journal of Supercomputing, 74(10), 5156.CrossRef
21.
Zurück zum Zitat Ioannou, C., Vassiliou, V., & Sergiou, C. (2017). An intrusion detection system for wireless sensor networks. In 24th international conference on telecommunications (ICT) (pp. 3–5). Ioannou, C., Vassiliou, V., & Sergiou, C. (2017). An intrusion detection system for wireless sensor networks. In 24th international conference on telecommunications (ICT) (pp. 3–5).
Metadaten
Titel
Neuro-Fuzzy Based Intrusion Detection System for Wireless Sensor Network
verfasst von
Somnath Sinha
Aditi Paul
Publikationsdatum
22.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2020
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07395-y

Weitere Artikel der Ausgabe 1/2020

Wireless Personal Communications 1/2020 Zur Ausgabe

Neuer Inhalt