Skip to main content
Log in

Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Sensor Network is an isolated set of low cost hardware sensor nodes that supply nodes, memory and processing resources to limit battery life for environmental (or physical) monitoring conditions. WSN is used in unsafe and unforeseen circumstances and thus prone to multiple forms of attack. A replication or clone attack, in which the attacker can instantly grab a network node and get data from the node confiscated, represents a physical threat. Then reprogram to create a node replica. These copies will then be distributed through all networking areas and named true networkers as a replicated node cannot be found. Where centralized clone attack detection methods can be used, the WSN can be either static. In the proposed work, the effective technique for the detection and classification of clone node is presented. Initially, the input data is preprocessed and the preprocessed data is normalized for removing unwanted data. From this, the best features are selected for the classification process. So as to attain the optimal data the preprocessed data is optimized with the use of Modified Particle Swarm Optimization technique (MPSO). The data is then clustered by means of K-means clustering process. The training is done by means of this MPSO and the classifier Modified Artificial Neural Network (MANN). The optimized and trained features are then classified with the utilization of MANN technique to detect and classify the clone attack as normal or malicious. Additionally, the Clone node identification can be done using the Trust Aware Intense Grade Boosting Random Forest Clone Node Identification Algorithm. Finally, the performance analysis is performed and the proposed and the existing techniques are analyzed to demonstrate the efficiency of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data Availability

We used own data and we used own coding.

References

  1. Selvi, M., Thangaramya, K., Ganapathy, S., Kulothungan, K., Khannah Nehemiah, H., & Kannan, A. (2019). An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications, 105(4), 1475–1490.

    Article  Google Scholar 

  2. Mukhedkar, M. M., & Kolekar, U. (2019). Trust-based secure routing in mobile ad hoc network using hybrid optimization algorithm. The Computer Journal, 62(10), 1528–1545.

    Article  MathSciNet  Google Scholar 

  3. Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110(4), 1637–1658.

    Article  Google Scholar 

  4. Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. J. W. N. (2019). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. 1–14.

  5. Cauvery, N. J. I. J. O. E., & Engineering, C. (2020). Trust-based secure routing against lethal behavior of nodes in wireless adhoc network. 10.

  6. Sengathir, J., & Manoharan, R. (2015). Exponential reliability coefficient based reputation mechanism for isolating selfish nodes in MANETs. Egyptian Informatics Journal, 16(2), 231–241.

    Article  Google Scholar 

  7. Alheeti, K. M. A., Gruebler, A., & McDonald-Maier, K. (2017). Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. Digital Communications and Networks, 3(3), 180–187.

    Article  Google Scholar 

  8. Poongodi, M., & Bose, S. (2015). Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Procedia Computer Science, 50, 244–251.

    Article  Google Scholar 

  9. Dhananjayan, G., & Subbiah, J. (2016). T2AR: Trust-aware ad-hoc routing protocol for MANET. Springerplus, 5(1), 995.

    Article  Google Scholar 

  10. Wang, X., Yang, J., Li, Z., & Li, H. (2014). The energy-efficient group key management protocol for strategic mobile scenario of MANETs. EURASIP Journal on Wireless Communications and Networking, 2014(1), 161.

    Article  Google Scholar 

  11. Desnitsky, V. A., Kotenko, I. V., Parashchuk, I. B. (2020). Neural network based classification of attacks on wireless sensor networks. In 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE, pp. 284–287.

  12. Khanduzi, R., & Sangaiah, A. K. (2019). Tabu search based on exact approach for protecting hubs against jamming attacks. Computers & Electrical Engineering, 79, 106459.

    Article  Google Scholar 

  13. Lalar, S., Bhushan, S., Surender, M. J. A. A. S. (2020). Hybrid encryption algorithm to detect clone node attack in wireless sensor network.

  14. Chen, R., Bao, F., Chang, M., & Cho, J. H. (2013). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1200–1210.

    Article  Google Scholar 

  15. Jhaveri, R. H., Patel, N. M., Jinwala, D. C., Ortiz, J. H., & de la Cruz, A. P. (2017). A composite trust model for secure routing in mobile ad-hoc networks. Adhoc Networks, 2, 19–45.

    Google Scholar 

  16. Dhamodharan, U. S. R. K., Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. The Scientific World Journal, 2015.

  17. Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST), 3(01), 59–69.

    Article  Google Scholar 

  18. Chen, J. I. Z., & Lai, K. L. (2021). Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence, 3(02), 101–112.

    Google Scholar 

  19. Baraneetharan, E. (2020). Role of machine learning algorithms intrusion detection in WSNs: A survey. Journal of Information Technology, 2(03), 161–173.

    Google Scholar 

  20. Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology, 3(02), 67–76.

    Google Scholar 

  21. Dhaya, R., & Kanthavel, R. (2020). Edge computing through virtual force for detecting trustworthy values. IRO Journal on Sustainable Wireless Systems, 2(2), 84–91.

    Article  Google Scholar 

  22. Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of Things (IoT). Journal of ISMAC, 2(04), 190–199.

    Article  Google Scholar 

Download references

Funding

We have no funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. P. Devi.

Ethics declarations

Conflict of interest

We have no conflicts of interest to disclose.

Human or Animal Rights

Humans and animals are not involved in this research work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Devi, P.P., Jaison, B. Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA. Wireless Pers Commun 125, 1615–1629 (2022). https://doi.org/10.1007/s11277-022-09623-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09623-z

Keywords

Navigation