Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

10.03.2022

Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA

verfasst von: P. P. Devi, B. Jaison

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Network is an isolated set of low cost hardware sensor nodes that supply nodes, memory and processing resources to limit battery life for environmental (or physical) monitoring conditions. WSN is used in unsafe and unforeseen circumstances and thus prone to multiple forms of attack. A replication or clone attack, in which the attacker can instantly grab a network node and get data from the node confiscated, represents a physical threat. Then reprogram to create a node replica. These copies will then be distributed through all networking areas and named true networkers as a replicated node cannot be found. Where centralized clone attack detection methods can be used, the WSN can be either static. In the proposed work, the effective technique for the detection and classification of clone node is presented. Initially, the input data is preprocessed and the preprocessed data is normalized for removing unwanted data. From this, the best features are selected for the classification process. So as to attain the optimal data the preprocessed data is optimized with the use of Modified Particle Swarm Optimization technique (MPSO). The data is then clustered by means of K-means clustering process. The training is done by means of this MPSO and the classifier Modified Artificial Neural Network (MANN). The optimized and trained features are then classified with the utilization of MANN technique to detect and classify the clone attack as normal or malicious. Additionally, the Clone node identification can be done using the Trust Aware Intense Grade Boosting Random Forest Clone Node Identification Algorithm. Finally, the performance analysis is performed and the proposed and the existing techniques are analyzed to demonstrate the efficiency of the scheme.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Khannah Nehemiah, H., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.CrossRef Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Khannah Nehemiah, H., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.CrossRef
2.
Zurück zum Zitat Mukhedkar, M. M., & Kolekar, U. (2019). Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. The Computer Journal, 62(10), 1528–1545.MathSciNetCrossRef Mukhedkar, M. M., & Kolekar, U. (2019). Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. The Computer Journal, 62(10), 1528–1545.MathSciNetCrossRef
3.
Zurück zum Zitat Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.CrossRef Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.CrossRef
4.
Zurück zum Zitat Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. J. W. N. (2019). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. 1–14. Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. J. W. N. (2019). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. 1–14.
5.
Zurück zum Zitat Cauvery, N. J. I. J. O. E., & Engineering, C. (2020). Trust-based secure routing against lethal behavior of nodes in wireless adhoc network. 10. Cauvery, N. J. I. J. O. E., & Engineering, C. (2020). Trust-based secure routing against lethal behavior of nodes in wireless adhoc network. 10.
6.
Zurück zum Zitat Sengathir, J., & Manoharan, R. (2015). Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.CrossRef Sengathir, J., & Manoharan, R. (2015). Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.CrossRef
7.
Zurück zum Zitat Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. (2017). Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digital Communications and Networks, 3(3), 180–187.CrossRef Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. (2017). Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digital Communications and Networks, 3(3), 180–187.CrossRef
8.
Zurück zum Zitat Poongodi, M., & Bose, S. (2015). Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Procedia Computer Science, 50, 244–251.CrossRef Poongodi, M., & Bose, S. (2015). Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Procedia Computer Science, 50, 244–251.CrossRef
9.
Zurück zum Zitat Dhananjayan, G., & Subbiah, J. (2016). T2AR: Trust-aware ad-hoc routing protocol for MANET. Springerplus, 5(1), 995.CrossRef Dhananjayan, G., & Subbiah, J. (2016). T2AR: Trust-aware ad-hoc routing protocol for MANET. Springerplus, 5(1), 995.CrossRef
10.
Zurück zum Zitat Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 2014(1), 161.CrossRef Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 2014(1), 161.CrossRef
11.
Zurück zum Zitat Desnitsky, V. A., Kotenko, I. V., Parashchuk, I. B. (2020). Neural network based classification of attacks on wireless sensor networks. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE, pp. 284–287. Desnitsky, V. A., Kotenko, I. V., Parashchuk, I. B. (2020). Neural network based classification of attacks on wireless sensor networks. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE, pp. 284–287.
12.
Zurück zum Zitat Khanduzi, R., & Sangaiah, A. K. (2019). Tabu search based on exact approach for protecting hubs against jamming attacks. Computers & Electrical Engineering, 79, 106459.CrossRef Khanduzi, R., & Sangaiah, A. K. (2019). Tabu search based on exact approach for protecting hubs against jamming attacks. Computers & Electrical Engineering, 79, 106459.CrossRef
13.
Zurück zum Zitat Lalar, S., Bhushan, S., Surender, M. J. A. A. S. (2020). Hybrid encryption algorithm to detect clone node attack in wireless sensor network. Lalar, S., Bhushan, S., Surender, M. J. A. A. S. (2020). Hybrid encryption algorithm to detect clone node attack in wireless sensor network.
14.
Zurück zum Zitat Chen, R., Bao, F., Chang, M., & Cho, J. H. (2013). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef Chen, R., Bao, F., Chang, M., & Cho, J. H. (2013). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.CrossRef
15.
Zurück zum Zitat Jhaveri, R. H., Patel, N. M., Jinwala, D. C., Ortiz, J. H., & de la Cruz, A. P. (2017). A composite trust model for secure routing in mobile ad-hoc networks. Adhoc Networks, 2, 19–45. Jhaveri, R. H., Patel, N. M., Jinwala, D. C., Ortiz, J. H., & de la Cruz, A. P. (2017). A composite trust model for secure routing in mobile ad-hoc networks. Adhoc Networks, 2, 19–45.
16.
Zurück zum Zitat Dhamodharan, U. S. R. K., Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal, 2015. Dhamodharan, U. S. R. K., Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal, 2015.
17.
Zurück zum Zitat Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST), 3(01), 59–69.CrossRef Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST), 3(01), 59–69.CrossRef
18.
Zurück zum Zitat Chen, J. I. Z., & Lai, K. L. (2021). Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence, 3(02), 101–112. Chen, J. I. Z., & Lai, K. L. (2021). Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence, 3(02), 101–112.
19.
Zurück zum Zitat Baraneetharan, E. (2020). Role of machine learning algorithms intrusion detection in WSNs: A survey. Journal of Information Technology, 2(03), 161–173. Baraneetharan, E. (2020). Role of machine learning algorithms intrusion detection in WSNs: A survey. Journal of Information Technology, 2(03), 161–173.
20.
Zurück zum Zitat Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76. Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76.
21.
Zurück zum Zitat Dhaya, R., & Kanthavel, R. (2020). Edge computing through virtual force for detecting trustworthy values. IRO Journal on Sustainable Wireless Systems, 2(2), 84–91.CrossRef Dhaya, R., & Kanthavel, R. (2020). Edge computing through virtual force for detecting trustworthy values. IRO Journal on Sustainable Wireless Systems, 2(2), 84–91.CrossRef
22.
Zurück zum Zitat Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.CrossRef Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.CrossRef
Metadaten
Titel
Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA
verfasst von
P. P. Devi
B. Jaison
Publikationsdatum
10.03.2022
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-09623-z

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe

Neuer Inhalt