Abstract
Wireless sensor networks (WSNs) form an important layer of technology used in smart cities, intelligent transportation systems, Industry, Energy, Agriculture 4.0, the Internet of Things, and, for example, fog and edge computing. Cybernetic security of such systems is a major issue and efficient methods to improve their security and reliability are sought. Intrusion detection systems (IDSs) automatically detect malicious network traffic, classify cybernetic attacks, and protect systems and their users. Neural networks are used by a variety of intrusion detection systems. Their efficient use in WSNs requires both learning and optimization and very efficient implementation of the detection. In this work, the acceleration of a neural intrusion detection model, developed specifically for wireless sensor networks, is proposed, studied, and evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Al Jallad, K., Aljnidi, M., Desouki, M.S.: Big data analysis and distributed deep learning for next-generation intrusion detection system optimization. J. Big Data 6(1), 88 (2019). https://doi.org/10.1186/s40537-019-0248-6
Almomani, I., Al-Kasasbeh, B., AL-Akhras, M.: WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J. Sens. 2016 (2016). https://doi.org/10.1155/2016/4731953
Barthélemy, J., Verstaevel, N., Forehead, H., Perez, P.: Edge-computing video analytics for real-time traffic monitoring in a smart city. Sensors 19(9), 2048 (2019). https://doi.org/10.3390/s19092048.31052514[pmid]
Batiha, T., Prauzek, M., Krömer, P.: Intrusion detection in wireless sensor networks by an ensemble of artificial neural networks. In: Czarnowski, I., Howlett, R.J., Jain, L.C. (eds.) Intelligent Decision Technologies 2019, pp. 323–333. Springer, Singapore (2020)
Bishop, M.: Computer Security: Art and Science. Addison-Wesley, Boston (2003)
Carlson, K., Nageswaran, J., Dutt, N., Krichmar, J.: An efficient automated parameter tuning framework for spiking neural networks. Front. Neurosci. 8, 10 (2014). https://doi.org/10.3389/fnins.2014.00010
Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. Wiley, Hoboken (2008)
Chollet, F.: Deep Learning with Python, 1st edn. Manning Publ. Co., USA (2017)
Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Annales Des Télécommunications 55(7), 361–378 (2000). https://doi.org/10.1007/BF02994844
Ergezinger, S., Thomsen, E.: An accelerated learning algorithm for multilayer perceptrons: optimization layer by layer. IEEE Trans. Neural Netw. 6(1), 31–42 (1995). https://doi.org/10.1109/72.363452
Fahmy, H.: Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis. Signals and Communication Technology. Springer, Singapore (2016)
Ghosh, A.K., Schwartzbard, A.: A study in using neural networks for anomaly and misuse detection. In: Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, SSYM 1999, p. 12. USENIX Association, Berkeley (1999)
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, vol. 2, p. 10 (2000). https://doi.org/10.1109/HICSS.2000.926982
Kang, M.J., Kang, J.W.: Intrusion detection system using deep neural network for in-vehicle network security. PLoS ONE 11(6), 1–17 (2016). https://doi.org/10.1371/journal.pone.0155781
Kirk, D.: Nvidia CUDA software and GPU parallel computing architecture. In: Proceedings of the 6th international Symposium on Memory Management, ISMM 2007, pp. 103–104. Association for Computing Machinery, New York (2007). https://doi.org/10.1145/1296907.1296909
Liu, H., Lang, B.: Machine learning and deep learning methods for intrusion detection systems: a survey. Appl. Sci. 9(20) (2019). https://doi.org/10.3390/app9204396
Masters, D., Luschi, C.: Revisiting small batch training for deep neural networks (2018)
Min, E., Long, J., Liu, Q., Cui, J., Chen, W.: TR-IDS: anomaly-based intrusion detection through text-convolutional neural network and random forest (2018). https://doi.org/10.1155/2018/4943509
Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. CoRR abs/1802.09089 (2018)
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994). https://doi.org/10.1109/65.283931
Oreku, G., Pazynyuk, T.: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham (2016)
Stallings, W., Brown, L.: Computer Security: Principles and Practice, 4th edn. Pearson, New York (2018). Always learning
Stehlik, M., Matyas, V., Stetsko, A.: Attack detection using evolutionary computation, pp. 99–129. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-47715-2_5
Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the internet of things. Sensors 19(9), 1977 (2019). https://doi.org/10.3390/s19091977.31035611[pmid]
Vanhoucke, V., Senior, A., Mao, M.Z.: Improving the speed of neural networks on CPUs. In: Deep Learning and Unsupervised Feature Learning Workshop. NIPS (2011)
Varghese, J., Muniyal, B.: A comparative analysis of different soft computing techniques for intrusion detection system. In: Thampi, S., Rawat, D., Alcaraz Calero, J., Madria, S., Wang, G. (eds.) Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers, Communications in Computer and Information Science, pp. 563–577. Springer, Germany (2019). https://doi.org/10.1007/978-981-13-5826-5_44
Yu, Y., Ge, Y., Fu-xiang, G.: A neural network approach for misuse and anomaly intrusion detection. Wuhan Univ. J. Nat. Sci. 10(1), 115–118 (2005). https://doi.org/10.1007/BF02828630
Acknowledgements
This work was supported from ERDF in project “A Research Platform focused on Industry 4.0 and Robotics in Ostrava”, reg. no. CZ.02.1.01/0.0/0.0/17_049/ 0008425 and by the grants of the Student Grant System no. SP2020/108 and SP2020/161, VSB - Technical University of Ostrava, Czech Republic.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Batiha, T., Krömer, P. (2021). Accelerated Neural Intrusion Detection for Wireless Sensor Networks. In: Barolli, L., Li, K., Miwa, H. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2020. Advances in Intelligent Systems and Computing, vol 1263. Springer, Cham. https://doi.org/10.1007/978-3-030-57796-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-57796-4_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57795-7
Online ISBN: 978-3-030-57796-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)