Abstract
Intrusion detection system has been termed as events which have surpassed the security measures and makes normal data transfer as vulnerable. The context of wireless sensor nodes with reduced traffic volume has been also susceptible leading to scarce resource utilization by attackers. Thus, as the transfer of data takes place, it is inevitable to preserve the resources of sensors from network undoing. This work contributes to processing time of the flow for particular traffic in the presence of attacker does not impact heavily with unfairness of the traversing flow. The process of conserving network flow from source to sink using Graph Neural Networks is being incorporated. It is achieved with shared weight as a function of traffic flow and assigning the adjacency and degree matrix, which help in associating the traffic structures in a hop by hop basis. The proposed work effectively detects the presence of fairness as the traffic flows in multi-hop communication with resilience to varying links. Simulation works with network simulator-2 has been done for the proposed work to ensure fair resource consumption among sensor nodes.
Similar content being viewed by others
Data Availability
We used our own data and coding.
References
Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.
Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005, March). Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd annual Southeast regional conference-Volume 2 (pp. 136-141).
Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975–7004.
Ring, M., Wunderlich, S., Scheuring, D., Landes, D., & Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 86, 147–167
Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018, January). Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSP (pp.108–116).
Gutierrez, J. A., Naeve, M., Callaway, E., Bourgeois, M., Mitter, V., & Heile, B. (2001). IEEE 802.15. 4: a developing standard for low-power low-cost wireless personal area networks. IEEE Network, 15(5), 12–19.
Zhang, R., & Xiao, X. (2019). Intrusion detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, 2019. https://doi.org/10.1155/2019/5451263.
Anand, J. V., & Titus, S. (2014, October). Regression based analysis of effective hydrocast in underwater environment. In TENCON 2014-2014 IEEE Region 10 Conference (pp. 1-6). IEEE.
Jiang, S., Zhao, J., & Xu, X. (2020). SLGBM: an intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, 169548–169558.
Fu, H., Liu, Y., Dong, Z., & Wu, Y. (2020). A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks. Sensors, 20(1), 23.
Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68–71
Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779–796
CSE-CIC-IDS2018 Dataset. https://www.unb.ca/cic/datasets/ids-2018.html.
Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.
Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019). LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Journal of Computer Networks and Communications, 2019. https://doi.org/10.1155/2019/2054298. Article ID 2054298.
Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2008). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.
Adil, M., Almaiah, M. A., Alsayed, O., & Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect Jamming attacks in wireless sensor networks. Sensors, 20(8), 2311.
Mustafa, I., Aslam, S., Qureshi, M. B., Ashraf, N., Aslam, S., Mohsin, S. M., & Mustafa, H. (2020. June). RL-MADP: reinforcement learning-based misdirection attack prevention technique for WSN. In 2020 international wireless communications and mobile computing (IWCMC) (pp. 721–726). IEEE
Mouradian, A., & Blum, I. A. (2014, July). Formal verification of real-time wireless sensor networks protocols: scaling up. In 2014 26th Euromicro conference on real-time systems (pp. 41-50). IEEE.
Schmitt, J., Bondorf, S., & Poe, W. Y. (2017). The sensor network calculus as key to the design of wireless sensor networks with predictable performance. Journal of Sensor and Actuator Networks, 6(3), 21
Nikolaus, P., & Schmitt, J. (2020, March). On the stochastic end-to-end delay analysis in sink trees under independent and dependent arrivals. In International conference on measurement, modelling and evaluation of computing systems (pp. 136-154). Springer, Cham.
Ngai, E. C., Liu, J., & Lyu, M. R. (2006, June). On the intruder detection for sinkhole attack in wireless sensor networks. In 2006 IEEE international conference on communications (Vol. 8, pp. 3383-3389). IEEE.
Smys, S., Bashar, A., & Haoxiang, W. (2021). Taxonomy classification and comparison of routing protocol based on energy efficient rate. Journal of ISMAC, 3(02), 96–110.
Mugunthan, S. R. (2021). Wireless rechargeable sensor network fault modeling and stability analysis. Journal of Soft Computing Paradigm (JSCP), 3(no. 01), 47–54
Chen, J. I., Zong, & Hengjinda, P. (2021). Enhanced dragonfly algorithm based K-medoid clustering model for VANET. Journal of ISMAC, 3(01), 50–59.
Funding
No funding
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Human and Animal Participants
Humans and animals are not involved in the work.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Narasimha Prasad, S., Senthamil Selvan, K. & Lakshmi Dhevi, B. Intrusion Detection System in Wireless Sensor Networks and Fair Resource Allocation Using Geometric Deep Learning Techniques. Wireless Pers Commun 123, 3401–3412 (2022). https://doi.org/10.1007/s11277-021-09294-2
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09294-2