Abstract
One of the essential elements of the cyber-physical system is the wireless sensor network (WSN), which is a multi-hop, self-organizing wireless network made up of numerous stationary or moving sensors. It collaborates, collects, processes and transmits the information of objects sensed in the geographic area enclosed by the network, and transmits this data to the network user. Several common WSN attacks exist, including Blackhole, Gray hole, Flooding, and Scheduling, which can quickly harm the WSN system. Owing to sensor node’s constrained resources, extensive redundancy, and strong correlation of network data, the intrusion detection schemes for WSN have low detection rate, high rates of false alarms, and substantial calculation overhead. To overwhelm these issues, an Enhanced Elman Spike Neural Network fostered Intrusion detection framework (IDS-WSN-EESNN) is proposed in this manuscript. First, the Balancing Composite Motion Optimization Algorithm (BCMOA) is employed to lessen the data dimension and computational overhead in original traffic data’s feature space. Then, EESNN is applied to identify different network attacks. WSN-DS dataset based the experimental results prove that the proposed IDS-WSN-EESNN approach attains 30.42%, 28.24%, 23.03% and 32.63% higher accuracy, 95.02%, 91.52%, 92.67% and 92.9% lower error rate and 25.13%, 21.75%, 27.54% and 23.08% lower computation time compared with the existing methods.
Similar content being viewed by others
Data availability
Data sharing does not apply to this article as no new data has been created or analyzed in this study.
Code availability
Not Applicable.
References
Singh G, Khare N (2022) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl 44(7):659–669
Gite P, Chouhan K, Krishna KM, Nayak CK, Soni M, Shrivastava A (2021) ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4. 5 and CART classifiers. Mater Today: Proc
Yadav A, Kumar A (2022) Intrusion Detection and Prevention Using RNN in WSN. In Inventive Computation and Information Technologies. Springer, Singapore, pp. 531–539
Maheswari M, Karthika RA (2021) A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Pers Commun 118(2):1535–1557
Krishnan R, Krishnan RS, Robinson YH, Julie EG, Long HV, Sangeetha A, Subramanian M, Kumar R (2022) An intrusion detection and prevention protocol for internet of things based wireless sensor networks. Wirel Pers Commun 124(4):3461–3483
Singh A, Nagar J, Sharma S, Kotiyal V (2021) A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Syst Appl 172:114603
Zhang T, Han D, Marino MD, Wang L, Li KC (2021) An evolutionary-based approach for low-complexity intrusion detection in wireless sensor networks. Wirel Pers Commun 1–24
Ahmad Z, Shahid Khan A, WaiShiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150
Shajin FH, Rajesh P, Raja MR (2022) An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits Syst Signal Process 1–24
Rajesh P, Shajin FH, Kannayeram G (2022) A novel intelligent technique for energy management in smart home using internet of things. Appl Soft Comput 128:109442
Shajin FH, Rajesh P, Nagoji Rao VK (2022) Efficient framework for brain tumour classification using hierarchical deep learning neural network classifier. Comput Methods Biomech Biomed Eng: Imaging Visualization 1–8
Rajesh P, Shajin FH, Kumaran GK (2022) An efficient IWOLRS control technique of brushless DC motor for torque ripple minimization. Appl Sci Eng Progress 15(3):5514–5514
Mittal M, Iwendi C, Khan S, RehmanJaved A (2021) Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol 32(6):e3997
Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wireless Netw 28(2):721–744
Khot PS, Naik U (2022) Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. International J Intell Robot Appl 6(2):306–322
Kagade RB, Santhosh J (2020) State context and hierarchical trust management in WSN for intrusion detection. InTechno-Societal 2021. Springer, Cham, pp. 103–116
Karthic S, Manoj Kumar S, Senthil Prakash PN (2022) Grey wolf based feature reduction for intrusion detection in WSN using LSTM. Int J Inform Technol 1–6
Subbiah S, Anbananthen KSM, Thangaraj S, Kannan S, Chelliah D (2022) Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm. J Commun Netw 24(2):264–273
Kalnoor G, Gowri Shankar S (2022) A Model-Based System for Intrusion Detection Using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network. In Information and Communication Technology for Competitive Strategies (ICTCS 2020). Springer, Singapore, pp. 43–53
Karthic S, Kumar SM (2022) Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Process Lett 1–21
Sood T, Prakash S, Sharma S, Singh A, Choubey H (2022) Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wirel Pers Commun 126(1):911–931
Zhiqiang L, Mohiuddin G, Jiangbin Z, Asim M, Sifei W (2022) Intrusion detection in wireless sensor network using enhanced empirical based component analysis. Futur Gener Comput Syst 135:181–193
Gowdhaman V, Dhanapal R (2022) An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput 26(23):13059–13067
Zhao R, Yin J, Xue Z, Gui G, Adebisi B, Ohtsuki T, Sari H (2021) An efficient intrusion detection method based on dynamic autoencoder. IEEE Wireless Commun Lett 10(8):1707–1711
Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput 12(2):1559–1576
Jiang S, Zhao J, Xu X (2020) SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548–169558
Zhang W, Han D, Li KC, Massetto FI (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput 24(16):12361–12374
Liu C, Gong J, Zhu J, Zhang J, Yan Y (2020) Correlation filter with motion detection for robust tracking of shape-deformed targets. IEEE Access 8:89161–89170
Le-Duc T, Nguyen QH, Nguyen-Xuan H (2020) Balancing composite motion optimization. Inf Sci 520:250–270
Al-Jamali NAS, Al-Raweshidy HS (2020) Modified Elman spike neural network for identification and control of dynamic system. IEEE Access 8:61246–61254
Author information
Authors and Affiliations
Contributions
Mr. R. Sarath Kumar (Corresponding Author)—Conceptualization Methodology, Original draft preparation
Dr. P. Sampath- Supervision
Dr. M. Ramkumar- Supervision
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants performed by any of the authors.
Consent to participate
Not Applicable
Consent for publication
Not Applicable
Competing interests
The authors declare no competing interests.
Disclosure of potential conflicts of interest
Authors declare that they have no conflict of interest.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sarath Kumar, R., Sampath, P. & Ramkumar, M. Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network. Peer-to-Peer Netw. Appl. 16, 1819–1833 (2023). https://doi.org/10.1007/s12083-023-01492-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01492-y