Detection of Threats in Wireless Sensor Network Based on Optics Clustering With DE-BiLSTM Classifier

PDF (1254KB), PP.14-30

Views: 0 Downloads: 0

Author(s)

R. Preethi 1,*

1. Bishop Heber College, Tiruchirappalli - 620017, TN, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2024.03.02

Received: 3 Jan. 2024 / Revised: 31 Jan. 2024 / Accepted: 20 Mar. 2024 / Published: 8 Jun. 2024

Index Terms

WSN, OPTICS, DE-BiLSTM, SB, Cluster Head

Abstract

An intelligent distributed network system is the Wireless Sensor Network (WSN), which is a strategy required to address security threats as well as energy consumption that has a direct impact on a network’s lifetime. Thus, attempting to identify malicious attacks with a low consumption of data transmission makes a lot of sense. The high energy consumption of nodes due to the transmission of data shortens the lifetime of the network. To overcome these issues, the proposed method is based on the Ordering Points to Identify Cluster Structure (OPTICS) with Bi-directional Long Short Term Memory using Differential evolution (DE-BiLSTM) classifier to detect the threats in WSN for smart building. Initial deployment of the sensor nodes (SN) and formation of the cluster nodes (CN) by employing the OPTICS density-based clustering approach that partitions clusters with different densities. In order to transport data to the base station, the cluster head (CH) nodes are chosen from the CN according to their more energy as well as shorter distance. Then, in order to forecast the threats, the size of the batch and hidden layers are set using the differential evolution method (DE) and the classification of the data is performed using BiLSTM to detect as attack or non-attack. Performance for predicting an attack is measured by network and classification parameters such as Packet Delivery Ratio (PDR), Average Residual Energy (ARE), Throughput, Accuracy and Precision. The results of the performance obtained are 91.78% for PDR, 8.56J for ARE, 2.52mbps for throughput with 100 nodes, then 93.78% for accuracy and 93.04% for precision. Thus, the designed detection of threats in WSN based on OPTICS clustering with DE-BILSTM classifier performs better for malicious attack prediction with low energy consumption sensor nodes. 

Cite This Paper

R. Preethi, "Detection of Threats in Wireless Sensor Network Based on Optics Clustering With DE-BiLSTM Classifier", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.14, No.3, pp. 14-30, 2024. DOI:10.5815/ijwmt.2024.03.02

Reference

[1]S. Karthick, “TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks,” International Journal of Intelligent Engineering and Systems. vol. 11, no. 2, pp. 76-84, 2018.
[2]R. Preethi and R. Anbuselvi, “Energy Efficient Cluster Based Technique for Resource Allocation in MANET,” 2017.
[3]R. Preethi and R. Anbuselvi, “A Game Theory Approach for Efficient Node Clustering Based on Unstable Ranging Transmission in MANET,” International Journal of Engineering and Technology(UAE). 7. 21-26. 10.14419/ijet.v7i2.22.11802, 2018.
[4]I. G. A. Poornima and B. Paramasivan, “Anomaly detection in wireless sensor network using machine learning algorithm,” Computer communications. vol. 151, pp. 331-337, 2020.
[5]L. Han, M. Zhou, W. Jia, Z. Dalil and X. Xu, “Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model,” Information sciences. vol. 476, pp. 491-504, 2019.
[6]W. Zhang, D. Han, K. C. Li and F. I. Massetto, “Wireless sensor network intrusion detection system based on MK-ELM,” Soft Computing, vol. 24, pp. 12361-12374, 2020.
[7]A. Singh, V. Kotiyal, S. Sharma, J. Nagar and C. C. Lee, “A machine learning approach to predict the average localization error with applications to wireless sensor networks,” IEEE Access. vol. 8, pp. 208253-208263, 2020.
[8]X. Tan, S. Su, Z. Huang, X. Guo, Z. Zuo, X. Sun and L. Li, “Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm,” Sensors. vol. 19, no. 1, pp. 203, 2019.
[9]R. H. Dong, H. H. Yan and Q. Y. Zhang, “An Intrusion Detection Model for Wireless Sensor Network Based on Information Gain Ratio and Bagging Algorithm,” Int. J. Netw. Secur., vol. 22, no. 2, pp. 218-230, 2020.
[10]P. Biswas and T. Samanta, “Anomaly detection using ensemble random forest in wireless sensor network,” International Journal of Information Technology. vol. 13, no. 5, pp. 2043-2052, 2021.
[11]S. Ifzarne, H. Tabbaa, I. Hafidi and N. Lamghari, “Anomaly detection using machine learning techniques in wireless sensor networks,” In Journal of Physics: Conference Series. vol. 1743, no. 1, 2021, pp. 012021. IOP Publishing.
[12]M. Alqahtani, A. Gumaei, H. Mathkour and M. Maher Ben Ismail, “A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks,” Sensors. vol. 19, no. 20, pp. 4383, 2019.
[13]D. Hemanand, G. V. Reddy, S. S. Babu, K. R. Balmuri, T. Chitra and S. Gopalakrishnan, “An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs),” International Journal of Intelligent Systems and Applications in Engineering. vol. 10, no. 3, pp.  285-293, 2022.
[14]Jiang, S., Zhao, J., & Xu, X. (2020). SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, 169548-169558.
[15]Dao, T. K., Nguyen, T. T., Pan, J. S., Qiao, Y., & Lai, Q. A. (2020). Identification failure data for cluster heads aggregation in WSN based on improving classification of SVM. IEEE Access, 8, 61070-61084.
[16]Alqahtani, M., Gumaei, A., Mathkour, H., & Maher Ben Ismail, M. (2019). A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors, 19(20), 4383.
[17]Subramani, N., Mohan, P., Alotaibi, Y., Alghamdi, S., & Khalaf, O. I. (2022). An efficient metaheuristic-based clustering with routing protocol for underwater wireless sensor networks. Sensors, 22(2), 415.
[18]Wang, J., Gao, Y., Liu, W., Sangaiah, A. K., & Kim, H. J. (2019). An improved routing schema with special clustering using PSO algorithm for heterogeneous wireless sensor network. Sensors, 19(3), 671.
[19]X. Zhu, S. Nie, C. Wang, X. Xi, J. Wang, D. Li and H. Zhou, “A noise removal algorithm based on OPTICS for photon-counting LiDAR data,” IEEE Geoscience and Remote Sensing Letters. vol. 18, no. 8, pp. 1471-1475, 2020.
[20]H. Crisóstomo de Castro Filho, O. Abílio de Carvalho Júnior, O. L. Ferreira de Carvalho, P. Pozzobon de R. Bem, “dos Santos de Moura, A. Olino de Albuquerque and R. A. Trancoso Gomes, Rice crop detection using LSTM, Bi-LSTM, and machine learning models from Sentinel-1 time series,” Remote Sensing. vol. 12, no. 16, pp. 2655, 2020.
[21]Z. Zhang, S. Ding and W. Jia, “A hybrid optimization algorithm based on cuckoo search and differential evolution for solving constrained engineering problems,” Engineering Applications of Artificial Intelligence. vol. 85, pp. 254-268, 2019.
[22]Kiran, (2019) Kaggle: [https://www.kaggle.com/datasets/kiranmahesh/nslkdd?select=kdd].Acessed on 16-10-2023.