Skip to main content

Intrusion Detection System in Wireless Sensor Networks and Fair Resource Allocation Using Geometric Deep Learning Techniques

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Intrusion detection system has been termed as events which have surpassed the security measures and makes normal data transfer as vulnerable. The context of wireless sensor nodes with reduced traffic volume has been also susceptible leading to scarce resource utilization by attackers. Thus, as the transfer of data takes place, it is inevitable to preserve the resources of sensors from network undoing. This work contributes to processing time of the flow for particular traffic in the presence of attacker does not impact heavily with unfairness of the traversing flow. The process of conserving network flow from source to sink using Graph Neural Networks is being incorporated. It is achieved with shared weight as a function of traffic flow and assigning the adjacency and degree matrix, which help in associating the traffic structures in a hop by hop basis. The proposed work effectively detects the presence of fairness as the traffic flows in multi-hop communication with resilience to varying links. Simulation works with network simulator-2 has been done for the proposed work to ensure fair resource consumption among sensor nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

We used our own data and coding.

References

  1. Butun, I., Morgera, S. D., & Sankar, R. (2013). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials, 16(1), 266–282.

    Article  Google Scholar 

  2. Stein, G., Chen, B., Wu, A. S., & Hua, K. A. (2005, March). Decision tree classifier for network intrusion detection with GA-based feature selection. In Proceedings of the 43rd annual Southeast regional conference-Volume 2 (pp. 136-141).

  3. Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975–7004.

    Article  Google Scholar 

  4. Ring, M., Wunderlich, S., Scheuring, D., Landes, D., & Hotho, A. (2019). A survey of network-based intrusion detection data sets. Computers & Security, 86, 147–167

    Article  Google Scholar 

  5. Sharafaldin, I., Lashkari, A. H., & Ghorbani, A. A. (2018, January). Toward generating a new intrusion detection dataset and intrusion traffic characterization. In ICISSP (pp.108–116).

  6. Gutierrez, J. A., Naeve, M., Callaway, E., Bourgeois, M., Mitter, V., & Heile, B. (2001). IEEE 802.15. 4: a developing standard for low-power low-cost wireless personal area networks. IEEE Network, 15(5), 12–19.

    Article  Google Scholar 

  7. Zhang, R., & Xiao, X. (2019). Intrusion detection in wireless sensor networks with an improved NSA based on space division. Journal of Sensors, 2019. https://doi.org/10.1155/2019/5451263.

  8. Anand, J. V., & Titus, S. (2014, October). Regression based analysis of effective hydrocast in underwater environment. In TENCON 2014-2014 IEEE Region 10 Conference (pp. 1-6). IEEE.

  9. Jiang, S., Zhao, J., & Xu, X. (2020). SLGBM: an intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access, 8, 169548–169558.

    Article  Google Scholar 

  10. Fu, H., Liu, Y., Dong, Z., & Wu, Y. (2020). A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks. Sensors, 20(1), 23.

    Article  Google Scholar 

  11. Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters, 1(2), 68–71

    Article  Google Scholar 

  12. Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779–796

    Article  Google Scholar 

  13. CSE-CIC-IDS2018 Dataset. https://www.unb.ca/cic/datasets/ids-2018.html.

  14. Ferrag, M. A., Maglaras, L., Moschoyiannis, S., & Janicke, H. (2020). Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. Journal of Information Security and Applications, 50, 102419.

    Article  Google Scholar 

  15. Ghugar, U., Pradhan, J., Bhoi, S. K., & Sahoo, R. R. (2019). LB-IDS: Securing wireless sensor network using protocol layer trust-based intrusion detection system. Journal of Computer Networks and Communications, 2019. https://doi.org/10.1155/2019/2054298. Article ID 2054298.

  16. Raymond, D. R., Marchany, R. C., Brownfield, M. I., & Midkiff, S. F. (2008). Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Transactions on Vehicular Technology, 58(1), 367–380.

    Article  Google Scholar 

  17. Adil, M., Almaiah, M. A., Alsayed, O., & Almomani, O. (2020). An anonymous channel categorization scheme of edge nodes to detect Jamming attacks in wireless sensor networks. Sensors, 20(8), 2311.

    Article  Google Scholar 

  18. Mustafa, I., Aslam, S., Qureshi, M. B., Ashraf, N., Aslam, S., Mohsin, S. M., & Mustafa, H. (2020. June). RL-MADP: reinforcement learning-based misdirection attack prevention technique for WSN. In 2020 international wireless communications and mobile computing (IWCMC) (pp. 721–726). IEEE

  19. Mouradian, A., & Blum, I. A. (2014, July). Formal verification of real-time wireless sensor networks protocols: scaling up. In 2014 26th Euromicro conference on real-time systems (pp. 41-50). IEEE.

  20. Schmitt, J., Bondorf, S., & Poe, W. Y. (2017). The sensor network calculus as key to the design of wireless sensor networks with predictable performance. Journal of Sensor and Actuator Networks, 6(3), 21

    Article  Google Scholar 

  21. Nikolaus, P., & Schmitt, J. (2020, March). On the stochastic end-to-end delay analysis in sink trees under independent and dependent arrivals. In International conference on measurement, modelling and evaluation of computing systems (pp. 136-154). Springer, Cham.

  22. Ngai, E. C., Liu, J., & Lyu, M. R. (2006, June). On the intruder detection for sinkhole attack in wireless sensor networks. In 2006 IEEE international conference on communications (Vol. 8, pp. 3383-3389). IEEE.

  23. Smys, S., Bashar, A., & Haoxiang, W. (2021). Taxonomy classification and comparison of routing protocol based on energy efficient rate. Journal of ISMAC, 3(02), 96–110.

    Google Scholar 

  24. Mugunthan, S. R. (2021). Wireless rechargeable sensor network fault modeling and stability analysis. Journal of Soft Computing Paradigm (JSCP), 3(no. 01), 47–54

    Article  Google Scholar 

  25. Chen, J. I., Zong, & Hengjinda, P. (2021). Enhanced dragonfly algorithm based K-medoid clustering model for VANET. Journal of ISMAC, 3(01), 50–59.

    Article  Google Scholar 

Download references

Funding

No funding

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Narasimha Prasad.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and Animal Participants

Humans and animals are not involved in the work.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Narasimha Prasad, S., Senthamil Selvan, K. & Lakshmi Dhevi, B. Intrusion Detection System in Wireless Sensor Networks and Fair Resource Allocation Using Geometric Deep Learning Techniques. Wireless Pers Commun 123, 3401–3412 (2022). https://doi.org/10.1007/s11277-021-09294-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09294-2

Keywords