Abstract
Wireless Sensor Network is an isolated set of low cost hardware sensor nodes that supply nodes, memory and processing resources to limit battery life for environmental (or physical) monitoring conditions. WSN is used in unsafe and unforeseen circumstances and thus prone to multiple forms of attack. A replication or clone attack, in which the attacker can instantly grab a network node and get data from the node confiscated, represents a physical threat. Then reprogram to create a node replica. These copies will then be distributed through all networking areas and named true networkers as a replicated node cannot be found. Where centralized clone attack detection methods can be used, the WSN can be either static. In the proposed work, the effective technique for the detection and classification of clone node is presented. Initially, the input data is preprocessed and the preprocessed data is normalized for removing unwanted data. From this, the best features are selected for the classification process. So as to attain the optimal data the preprocessed data is optimized with the use of Modified Particle Swarm Optimization technique (MPSO). The data is then clustered by means of K-means clustering process. The training is done by means of this MPSO and the classifier Modified Artificial Neural Network (MANN). The optimized and trained features are then classified with the utilization of MANN technique to detect and classify the clone attack as normal or malicious. Additionally, the Clone node identification can be done using the Trust Aware Intense Grade Boosting Random Forest Clone Node Identification Algorithm. Finally, the performance analysis is performed and the proposed and the existing techniques are analyzed to demonstrate the efficiency of the scheme.
Similar content being viewed by others
Data Availability
We used own data and we used own coding.
References
Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Khannah Nehemiah, H., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.
Mukhedkar, M. M., & Kolekar, U. (2019). Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. The Computer Journal, 62(10), 1528–1545.
Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.
Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. J. W. N. (2019). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. 1–14.
Cauvery, N. J. I. J. O. E., & Engineering, C. (2020). Trust-based secure routing against lethal behavior of nodes in wireless adhoc network. 10.
Sengathir, J., & Manoharan, R. (2015). Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.
Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. (2017). Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digital Communications and Networks, 3(3), 180–187.
Poongodi, M., & Bose, S. (2015). Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Procedia Computer Science, 50, 244–251.
Dhananjayan, G., & Subbiah, J. (2016). T2AR: Trust-aware ad-hoc routing protocol for MANET. Springerplus, 5(1), 995.
Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 2014(1), 161.
Desnitsky, V. A., Kotenko, I. V., Parashchuk, I. B. (2020). Neural network based classification of attacks on wireless sensor networks. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE, pp. 284–287.
Khanduzi, R., & Sangaiah, A. K. (2019). Tabu search based on exact approach for protecting hubs against jamming attacks. Computers & Electrical Engineering, 79, 106459.
Lalar, S., Bhushan, S., Surender, M. J. A. A. S. (2020). Hybrid encryption algorithm to detect clone node attack in wireless sensor network.
Chen, R., Bao, F., Chang, M., & Cho, J. H. (2013). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.
Jhaveri, R. H., Patel, N. M., Jinwala, D. C., Ortiz, J. H., & de la Cruz, A. P. (2017). A composite trust model for secure routing in mobile ad-hoc networks. Adhoc Networks, 2, 19–45.
Dhamodharan, U. S. R. K., Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal, 2015.
Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST), 3(01), 59–69.
Chen, J. I. Z., & Lai, K. L. (2021). Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence, 3(02), 101–112.
Baraneetharan, E. (2020). Role of machine learning algorithms intrusion detection in WSNs: A survey. Journal of Information Technology, 2(03), 161–173.
Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76.
Dhaya, R., & Kanthavel, R. (2020). Edge computing through virtual force for detecting trustworthy values. IRO Journal on Sustainable Wireless Systems, 2(2), 84–91.
Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.
Funding
We have no funding.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We have no conflicts of interest to disclose.
Human or Animal Rights
Humans and animals are not involved in this research work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Devi, P.P., Jaison, B. Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA. Wireless Pers Commun 125, 1615–1629 (2022). https://doi.org/10.1007/s11277-022-09623-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09623-z