Skip to main content
Log in

Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

One of the essential elements of the cyber-physical system is the wireless sensor network (WSN), which is a multi-hop, self-organizing wireless network made up of numerous stationary or moving sensors. It collaborates, collects, processes and transmits the information of objects sensed in the geographic area enclosed by the network, and transmits this data to the network user. Several common WSN attacks exist, including Blackhole, Gray hole, Flooding, and Scheduling, which can quickly harm the WSN system. Owing to sensor node’s constrained resources, extensive redundancy, and strong correlation of network data, the intrusion detection schemes for WSN have low detection rate, high rates of false alarms, and substantial calculation overhead. To overwhelm these issues, an Enhanced Elman Spike Neural Network fostered Intrusion detection framework (IDS-WSN-EESNN) is proposed in this manuscript. First, the Balancing Composite Motion Optimization Algorithm (BCMOA) is employed to lessen the data dimension and computational overhead in original traffic data’s feature space. Then, EESNN is applied to identify different network attacks. WSN-DS dataset based the experimental results prove that the proposed IDS-WSN-EESNN approach attains 30.42%, 28.24%, 23.03% and 32.63% higher accuracy, 95.02%, 91.52%, 92.67% and 92.9% lower error rate and 25.13%, 21.75%, 27.54% and 23.08% lower computation time compared with the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

Data sharing does not apply to this article as no new data has been created or analyzed in this study.

Code availability

Not Applicable.

References

  1. Singh G, Khare N (2022) A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl 44(7):659–669

    Google Scholar 

  2. Gite P, Chouhan K, Krishna KM, Nayak CK, Soni M, Shrivastava A (2021) ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4. 5 and CART classifiers. Mater Today: Proc

  3. Yadav A, Kumar A (2022) Intrusion Detection and Prevention Using RNN in WSN. In Inventive Computation and Information Technologies. Springer, Singapore, pp. 531–539

  4. Maheswari M, Karthika RA (2021) A novel QoS based secure unequal clustering protocol with intrusion detection system in wireless sensor networks. Wireless Pers Commun 118(2):1535–1557

    Article  Google Scholar 

  5. Krishnan R, Krishnan RS, Robinson YH, Julie EG, Long HV, Sangeetha A, Subramanian M, Kumar R (2022) An intrusion detection and prevention protocol for internet of things based wireless sensor networks. Wirel Pers Commun 124(4):3461–3483

  6. Singh A, Nagar J, Sharma S, Kotiyal V (2021) A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Syst Appl 172:114603

    Article  Google Scholar 

  7. Zhang T, Han D, Marino MD, Wang L, Li KC (2021) An evolutionary-based approach for low-complexity intrusion detection in wireless sensor networks. Wirel Pers Commun 1–24

  8. Ahmad Z, Shahid Khan A, WaiShiang C, Abdullah J, Ahmad F (2021) Network intrusion detection system: a systematic study of machine learning and deep learning approaches. Trans Emerg Telecommun Technol 32(1):e4150

    Google Scholar 

  9. Shajin FH, Rajesh P, Raja MR (2022) An efficient VLSI architecture for fast motion estimation exploiting zero motion prejudgment technique and a new quadrant-based search algorithm in HEVC. Circuits Syst Signal Process 1–24

  10. Rajesh P, Shajin FH, Kannayeram G (2022) A novel intelligent technique for energy management in smart home using internet of things. Appl Soft Comput 128:109442

    Article  Google Scholar 

  11. Shajin FH, Rajesh P, Nagoji Rao VK (2022) Efficient framework for brain tumour classification using hierarchical deep learning neural network classifier. Comput Methods Biomech Biomed Eng: Imaging Visualization 1–8

  12. Rajesh P, Shajin FH, Kumaran GK (2022) An efficient IWOLRS control technique of brushless DC motor for torque ripple minimization. Appl Sci Eng Progress 15(3):5514–5514

    Google Scholar 

  13. Mittal M, Iwendi C, Khan S, RehmanJaved A (2021) Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system. Trans Emerg Telecommun Technol 32(6):e3997

    Google Scholar 

  14. Otair M, Ibrahim OT, Abualigah L, Altalhi M, Sumari P (2022) An enhanced grey wolf optimizer based particle swarm optimizer for intrusion detection system in wireless sensor networks. Wireless Netw 28(2):721–744

    Article  Google Scholar 

  15. Khot PS, Naik U (2022) Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. International J Intell Robot Appl 6(2):306–322

  16. Kagade RB, Santhosh J (2020) State context and hierarchical trust management in WSN for intrusion detection. InTechno-Societal 2021. Springer, Cham, pp. 103–116

  17. Karthic S, Manoj Kumar S, Senthil Prakash PN (2022) Grey wolf based feature reduction for intrusion detection in WSN using LSTM. Int J Inform Technol 1–6

  18. Subbiah S, Anbananthen KSM, Thangaraj S, Kannan S, Chelliah D (2022) Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm. J Commun Netw 24(2):264–273

    Article  Google Scholar 

  19. Kalnoor G, Gowri Shankar S (2022) A Model-Based System for Intrusion Detection Using Novel Technique-Hidden Markov Bayesian in Wireless Sensor Network. In Information and Communication Technology for Competitive Strategies (ICTCS 2020). Springer, Singapore, pp. 43–53

  20. Karthic S, Kumar SM (2022) Hybrid optimized deep neural network with enhanced conditional random field based intrusion detection on wireless sensor network. Neural Process Lett 1–21

  21. Sood T, Prakash S, Sharma S, Singh A, Choubey H (2022) Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wirel Pers Commun 126(1):911–931

  22. Zhiqiang L, Mohiuddin G, Jiangbin Z, Asim M, Sifei W (2022) Intrusion detection in wireless sensor network using enhanced empirical based component analysis. Futur Gener Comput Syst 135:181–193

    Article  Google Scholar 

  23. Gowdhaman V, Dhanapal R (2022) An intrusion detection system for wireless sensor networks using deep neural network. Soft Comput 26(23):13059–13067

    Article  Google Scholar 

  24. Zhao R, Yin J, Xue Z, Gui G, Adebisi B, Ohtsuki T, Sari H (2021) An efficient intrusion detection method based on dynamic autoencoder. IEEE Wireless Commun Lett 10(8):1707–1711

    Article  Google Scholar 

  25. Safaldin M, Otair M, Abualigah L (2021) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput 12(2):1559–1576

    Article  Google Scholar 

  26. Jiang S, Zhao J, Xu X (2020) SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 8:169548–169558

    Article  Google Scholar 

  27. Zhang W, Han D, Li KC, Massetto FI (2020) Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput 24(16):12361–12374

    Article  Google Scholar 

  28. Liu C, Gong J, Zhu J, Zhang J, Yan Y (2020) Correlation filter with motion detection for robust tracking of shape-deformed targets. IEEE Access 8:89161–89170

    Article  Google Scholar 

  29. Le-Duc T, Nguyen QH, Nguyen-Xuan H (2020) Balancing composite motion optimization. Inf Sci 520:250–270

    Article  MathSciNet  Google Scholar 

  30. Al-Jamali NAS, Al-Raweshidy HS (2020) Modified Elman spike neural network for identification and control of dynamic system. IEEE Access 8:61246–61254

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Mr. R. Sarath Kumar (Corresponding Author)—Conceptualization Methodology, Original draft preparation

Dr. P. Sampath- Supervision

Dr. M. Ramkumar- Supervision

Corresponding author

Correspondence to R. Sarath Kumar.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants performed by any of the authors.

Consent to participate

Not Applicable

Consent for publication

Not Applicable

Competing interests

The authors declare no competing interests.

Disclosure of potential conflicts of interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sarath Kumar, R., Sampath, P. & Ramkumar, M. Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network. Peer-to-Peer Netw. Appl. 16, 1819–1833 (2023). https://doi.org/10.1007/s12083-023-01492-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01492-y

Keywords

Navigation