Skip to main content
Log in

An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Wireless sensor networks are considered as the foundation of the Internet of Things. Inherent problems in wireless sensor networks such as power consumption, lack of flexibility, and disability in development and programming have led to serious challenges in these networks. Software-defined networking (SDN) is flexible with development and programming capabilities that decouple the control and data planes. The combination of wireless sensor networks and software-defined networks has created the idea of software-defined wireless sensor networks (SDWSNs). Security is considered as one of the most fundamental issues in any network. Due to their combinatorial nature, the software-defined wireless sensor networks faced a variety of security challenges for both wireless sensor networks and software-defined networks. This paper proposes a novel architecture with an unsupervised intrusion detection algorithm using a hierarchical approach to improve the security of integrated software-defined wireless sensor networks. In the proposed architecture, the sensors are not fully dependent on the SDWSN controller; instead, they run the appropriate intrusion detection algorithm module locally at the layer. The data analysis results in different zones, produced by clustering based on entropy and cumulative point similarity as criteria, are sent to the SDWSN controller, and decisions are made after the final check of data normality or abnormality. To examine the effectiveness of the proposed architecture and algorithm, the sensors were simulated on Cooja, WSN-DS and NSL-KDD standardized datasets. The results show that the proposed method is able to detect the abnormal traffic up to 97%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Availability of data and materials

Data will be available by request.

Code availability

Contact ahmad.shahab.arkan@gmail.com.

References

  1. Ahmad I, Namal S, Ylianttila M, Gurtov A (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutor 17(4):2317–2346

    Article  Google Scholar 

  2. Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J Sens 2016:1–16

    Article  Google Scholar 

  3. Alves R, Oliveira D, Nez G, Margi CB (2017) It-SDN: improved architecture for SDWSN. In: Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, Belem, Brazil, pp 15–19

  4. Arkan AS, Ahmadi M (2021) Entropy-based anomaly detection using observation points relations in wireless sensor networks. Wirel Pers Commun 119:1783–1798. https://doi.org/10.1007/s11277-021-08306-5

    Article  Google Scholar 

  5. Aranha DF (2013) Relic is an efficient library for cryptography. http://code.google.com/p/relic-toolkit/

  6. Belkhiri H, Messai A, Beylot AL, Haider F (2022) Denial of service attack detection in wireless sensor networks and software defined wireless sensor networks: a brief review. In: International Conference On Big Data and Internet of Things, Springer, pp 100–115

  7. Bhunia SS, Gurusamy M (2017) Dynamic attack detection and mitigation in IoT using SDN. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp 1–6

  8. Bukar UA, Othman M (2022) Architectural design, improvement, and challenges of distributed software-defined wireless sensor networks. Wirel Pers Commun 122(3):2395–2439

    Article  Google Scholar 

  9. Cai Z, Cox AL, Ng T (2010) Maestro: A system for scalable openflow control. Tech. rep

  10. Deb R, Roy S (2022) A comprehensive survey of vulnerability and information security in sdn. Comput Netw 206:108802

    Article  Google Scholar 

  11. Deep S, Zheng X, Jolfaei A, Yu D, Ostovari P, Kashif Bashir A (2022) A survey of security and privacy issues in the internet of things from the layered context. Trans Emerg Telecommun Technol 33(6):e3935

    Google Scholar 

  12. Diwan TD et al (2021) A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection. Turk J Comput Math Edu (TURCOMAT) 12(11):2954–2968

    Google Scholar 

  13. Dunkels A, Eriksson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks

  14. Hamzah MA, Othman SH (2021) A review of support vector machine-based intrusion detection system for wireless sensor network with different kernel functions. Int J Innov Computi 11(1):59–67

    Article  Google Scholar 

  15. Haque IT, Abu-Ghazaleh N (2016) Wireless software defined networking: a survey and taxonomy. IEEE Commun Surv Tutor 18(4):2713–2737

    Article  Google Scholar 

  16. Howitt I, Gutierrez JA (2003) IEEE 802.15. 4 low rate-wireless personal area network coexistence issues. In: 2003 IEEE Wireless Communications and Networking. WCNC, vol 3, pp 1481–1486

  17. Jia Y, Zhong F, Alrawais A, Gong B, Cheng X (2020) Flowguard: an intelligent edge defense mechanism against IoT DDoS attacks. IEEE Internet Things J 7(10):9552–9562

    Article  Google Scholar 

  18. Letswamotse BB, Malekian R, Chen CY, Modieginyane KM (2018) Software defined wireless sensor networks (SDWSN): a review on efficient resources, applications and technologies. J Internet Technol 19(5):1303–1313

    Google Scholar 

  19. Licensee MDPI S Basel (2018) Datasheet, tmote sky. http://www.eecs.harvard.edu/~konrad/projects/shimmer/references/tmote-sky-datasheet.pdf, this article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/)

  20. Masengo Wa Umba S, Abu-Mahfouz AM, Ramotsoela D (2022) Artificial intelligence-driven intrusion detection in software-defined wireless sensor networks: towards secure IoT-enabled healthcare systems. Int J Environ Res Public Health 19(9):5367

    Article  Google Scholar 

  21. Miranda C, Kaddoum G, Bou-Harb E, Garg S, Kaur K (2020) A collaborative security framework for software-defined wireless sensor networks. IEEE Trans Inf Forens Secur 15:2602–2615

    Article  Google Scholar 

  22. Miranda C, Kaddoum G, Bou-Harb E, Garg S, Kaur K (2020) A collaborative security framework for software-defined wireless sensor networks. IEEE Trans Inf Forens Secur 15:2602–2615

    Article  Google Scholar 

  23. Mishra P, Kumar N, Godfrey WW (2022) An evolutionary computing-based energy-efficient solution for IoT-enabled software-defined sensor network architecture. Int J Commun Syst 35(8):e5111

    Article  Google Scholar 

  24. Olivier F, Carlos G, Florent N (2015) SDN based architecture for clustered WSN. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp 342–347

  25. Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H et al (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput Secur 112:102494

    Article  Google Scholar 

  26. Orozco-Santos F, Sempere-Payá V, Albero-Albero T, Silvestre-Blanes J (2021) Enhancing SDN wise with slicing over TSCH. Sensors 21(4):1075

    Article  Google Scholar 

  27. Ravi N, Shalinie SM (2020) Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J 7(4):3559–3570

    Article  Google Scholar 

  28. Raza S, Wallgren L, Voigt T (2013) Svelte: real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674

    Article  Google Scholar 

  29. Razdan S, Gupta H, Seth A (2021) Performance analysis of network intrusion detection systems using j48 and Naive Bayes algorithms. In: 2021 6th International Conference for Convergence in Technology (I2CT), pp 1–7

  30. Salih AA, Abdulazeez AM (2021) Evaluation of classification algorithms for intrusion detection system: a review. J Soft Comput Data Min 2(1):31–40

    Google Scholar 

  31. Sanmartin P, Avila K, Valle S, Gomez J, Jabba D (2021) SBR: a novel architecture of software defined network using the RPL protocol for internet of things. IEEE Access 9:119977–119986

    Article  Google Scholar 

  32. Segura GAN, Chorti A, Margi CB (2022) Centralized and distributed intrusion detection for resource-constrained wireless SDN networks. IEEE Internet Things J 9(10):7746–7758. https://doi.org/10.1109/JIOT.2021.3114270

    Article  Google Scholar 

  33. Simoglou G, Violettas G, Petridou S, Mamatas L (2021) Intrusion detection systems for RPL security: a comparative analysis. Comput Secur 102219

  34. Simplicio Jr MA, Silva MV, Alves RC (2019) Lightweight and escrow-less authenticated key agreement for the internet of things. US Patent App. 16/330,075

  35. Singh G, Khare N (2021) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl 1–11

  36. Tahmasebi S, Rasouli N, Kashefi AH, Rezabeyk E, Faragardi HR (2021) Syncop: an evolutionary multi-objective placement of SDN controllers for optimizing cost and network performance in WSNS. Comput Netw 185:107727

    Article  Google Scholar 

  37. Wenxing L, Xiaofei S (2021) Design of link-quality-prediction-based software-defined wireless sensor networks. arXiv preprint arXiv:2110.08485

  38. Xu F, Ye H, Yang F, Zhao C (2019) Software defined mission-critical wireless sensor network: architecture and edge offloading strategy. IEEE Access 7:10383–10391

    Article  Google Scholar 

  39. Xu W (2021) Benchmark comparison of Javascript frameworks react, vue, angular and svelte

  40. Zheng J, Liu Y, Fan X, Li F (2016) The study of RSSI in wireless sensor networks. In: 2016 2nd International Conference on Artificial Intelligence and Industrial Engineering (AIIE 2016). Atlantis Press, pp 207–209

Download references

Funding

This research has been supported by Razi University.

Author information

Authors and Affiliations

Authors

Contributions

AhmadShahab Arkan implemented the study and wrote the paper. Mahmood Ahmadi proposed the idea and reviewed the paper.

Corresponding author

Correspondence to Mahmood Ahmadi.

Ethics declarations

Conflict of interest

The authors have no conflict of interest.

Ethical Approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arkan, A., Ahmadi, M. An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks. J Supercomput 79, 11844–11870 (2023). https://doi.org/10.1007/s11227-023-05117-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05117-2

Keywords

Navigation