Skip to main content
Log in

Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Sensor nodes deployed in a remote location are vulnerable to various attack. An intruder can easily capture and tamper with sensor nodes deployed in a remote location. As a result, intrusion detection is crucial task in the field of wireless sensor network. In this work, we propose an intrusion detection approach for WSN. In our method,we are using Graph Neural Network and Lyapunov optimization. In the training phase, we train graph data using GNN. We are using Lyapunov optimization to adjust weights of the synapses connecting two neurons to an optimum value. Here we used AWID datasets to train and test GNN. Lyapunov optimization is used to compute loss in GNN and adjust weight accordingly to minimize loss. We show test results of our method using performance matrices, namely, Accuracy, Sensitivity, Precision, F1 Score. Comparison with existing work showed that our method gives better detection accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3

Similar content being viewed by others

Data Availability

The AWID2 data analyzed during the current study is available upon request in the AWID repository (https://icsdweb.aegean.gr/awid/download-dataset).

References

  1. Elsaid SA, Albatati NS (2020) An optimized collaborative intrusion detection system for wireless sensor networks. Soft Comput:1–15

  2. Gavel S, Raghuvanshi AS, Tiwari S (2020) A novel density estimation based intrusion detection technique with pearson’s divergence for wireless sensor networks. ISA Trans

  3. Gu J, Lu S (2021) An effective intrusion detection approach using svm with naïve bayes feature embedding. Comput Secur 103:102158

    Article  Google Scholar 

  4. Kaja N, Shaout A, Ma D (2019) An intelligent intrusion detection system. Appl Intell 49(9):3235–3247

    Article  Google Scholar 

  5. Kasongo SM, Sun Y (2020) A deep learning method with wrapper based feature extraction for wireless intrusion detection system. Comput Secur 92:101752

    Article  Google Scholar 

  6. Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:1609.02907

  7. Kolias C, Kambourakis G, Stavrou A, Gritzalis S (2015) Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun Surv & Tutorials 18(1):184–208

    Article  Google Scholar 

  8. Liu Z, Chen C, Yang X, Zhou J, Li X, Song L (2018) Heterogeneous graph neural networks for malicious account detection. In: Proceedings of the 27th ACM international conference on information and knowledge management, pp 2077–2085

  9. Mao Y, Zhang J, Letaief KB (2015) A lyapunov optimization approach for green cellular networks with hybrid energy supplies. IEEE J Sel Areas Commun 33(12):2463–2477

    Article  Google Scholar 

  10. Neely MJ (2010) Stochastic network optimization with application to communication and queueing systems. Synth Lect Commun Netw 3(1):1–211

    Article  MATH  Google Scholar 

  11. Rahman MA, Taufiq Asyhari A, Wen OW, Ajra H, Ahmed Y, Anwar F (2021) Effective combining of feature selection techniques for machine learning-enabled iot intrusion detection. Multimed Tools Appl:1–19

  12. Safaldin M, Otair M, Abualigah L (2020) Improved binary gray wolf optimizer and svm for intrusion detection system in wireless sensor networks. J Ambient Intell Humanized Comput:1–18

  13. Saravana Kumar NM, Deepa S, Marimuthu CN, Eswari T, Lavanya S (2016) Signature based vulnerability detection over wireless sensor network for reliable data transmission. Wirel Pers Commun 87(2):431–442

    Article  Google Scholar 

  14. Shukla AK (2020) Detection of anomaly intrusion utilizing self-adaptive grasshopper optimization algorithm. Neural Comput & Applic:1–21

  15. Wang Y, Sun Y, Liu Z, Sarma SE, Bronstein MM, Solomon JM (2019) Dynamic graph cnn for learning on point clouds. Acm Trans on Graphics (tog) 38(5):1–12

    Article  Google Scholar 

  16. Wazid M, Das AK (2016) An efficient hybrid anomaly detection scheme using k-means clustering for wireless sensor networks. Wirel Pers Commun 90 (4):1971–2000

    Article  Google Scholar 

  17. Yang S, Gao T, Wang J, Deng B, Lansdell B, Linares-Barranco B (2021) Efficient spike-driven learning with dendritic event-based processing. Front Neurosci 15:601109

    Article  Google Scholar 

  18. Yang S, Wang J, Deng B, Azghadi MR, Linares-Barranco B (2021) Neuromorphic context-dependent learning framework with fault-tolerant spike routing. IEEE Trans Neural Netw Learn Syst

  19. Ying R, He R, Chen K, Eksombatchai P, Hamilton WL, Leskovec J (2018) Graph convolutional neural networks for web-scale recommender systems. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 974–983

  20. You J, Bowen L, Rex Y, Pande V, Leskovec J (2018) Graph convolutional policy network for goal-directed molecular graph generation. arXiv:1806.02473

  21. Yu H, Neely MJ (2018) A new backpressure algorithm for joint rate control and routing with vanishing utility optimality gaps and finite queue lengths. IEEE/ACM Trans Networking 26(4):1605–1618

    Article  Google Scholar 

  22. Zheng L, Cai L (2014) A distributed demand response control strategy using lyapunov optimization. IEEE Trans Smart Grid 5(4):2075–2083

    Article  Google Scholar 

  23. Zhou Y, Cheng G, Jiang S, Dai M (2020) Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput Netw 174:107247

    Article  Google Scholar 

  24. Zitnik M, Leskovec J (2017) Predicting multicellular function through multi-layer tissue networks. Bioinforma 33(14):i190–i198

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyajit Biswas.

Ethics declarations

Conflict of Interests

On behalf of all authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Biswas, P., Samanta, T. & Sanyal, J. Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network. Multimed Tools Appl 82, 14123–14134 (2023). https://doi.org/10.1007/s11042-022-13992-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13992-9

Keywords

Navigation