Abstract
In an evolving defense landscape with persistent security threats, enhancing Wireless Sensor Networks (WSN) for border security and advancing Intrusion Detection Systems (IDS) are vital for national defense and data integrity. In this research, we present a structured and innovative Analytical Hierarchy Process (AHP) Multi attribute Decision Making (MADM) Aggregated Multiple Type 3 Fuzzy Logic (IT3FLS) approach for the accurate prediction of the number of k-barriers for fast intrusion detection and prevention within WSN. Four possible features—the rectangular region, the detecting sensors range, the transmission range of the sensors, and the number of sensors for uniform sensor distribution—were used in the training and evaluation of the suggested model. Using Monte Carlo simulation, these traits are retrieved. This methodology outlined in four-stages. In Stage 1, it constructs Multiple IT3FLS through data collected from simulations. Stage 2 rigorously evaluates IT3FLS models using statistical measures, culminating in a performance matrix. Stage 3 integrates this matrix, enhancing understanding via the AHP-MADM to assign weights. In Stage 4, these weights optimize predictions through a weighted aggregation method. The system's results significantly enhance the accuracy of k-barrier predictions in intrusion detection. The model demonstrates its proficiency with a remarkable correlation coefficient (R) of 0.997, a minimal root mean square error (RMSE) of 5.36 and low bias of 1.7. Furthermore, the research assesses the proposed system's performance against multiple benchmark methods, confirming its superior accuracy and computational efficiency.













Similar content being viewed by others
Data availability
All necessary data for this study is documented in the manuscript, along with clear instructions on how to access and reproduce it.
References
Mostafaei H, Chowdhury MU, Obaidat MS (2018) Border surveillance with WSN systems in a distributed manner. IEEE Syst J 12(4):3703–3712
Lee S, Jain S, Yuan Y, Zhang Y, Yang H, Liu J, Son YJ (2019) Design and development of a DDDAMS-based border surveillance system via UVs and hybrid simulations. Expert Syst Appl 128:109–123
Komar C, Donmez MY, Ersoy C (2012) Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Comput Commun 35(10):1185–1199
Amutha J, Sharma S, Nagar J (2020) WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wireless Pers Commun 111:1089–1115
Kandris D, Nakas C, Vomvas D, Koulouras G (2020) Applications of wireless sensor networks: an up-to-date survey. Appl Syst Innov 3(1):14
Nurellari E, Licea DB, Ghogho M, Rivero-Angeles ME (2021) On trajectory design for intruder detection in wireless mobile sensor networks. IEEE Trans Signal Inf Process Over Netw 7:236–248
Nagar J, Chaturvedi SK, Soh S (2022) An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. Clust Comput 25(1):187–202
Nagar J, Chaturvedi SK, Soh S (2022) Wireless Multihop Network Coverage Incorporating Boundary and Shadowing Effects. IETE Tech Rev 39(5):1124–1139
Singh A, Sharma S, Singh J (2021) Nature-inspired algorithms for wireless sensor networks: A comprehensive survey. Comput Sci Rev 39:100342
Amutha J, Sharma S, Sharma SK (2021) Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. Comput Sci Rev 40:100376
Amutha J, Nagar J, Sharma S (2021) A distributed border surveillance (dbs) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Pers Commun 117:2135–2155
Aseeri M, Ahmed M, Shakib M, Ghorbel O, Shaman H (2017) Detection of attacker and location in wireless sensor network as an application for border surveillance. Int J Distrib Sens Netw 13(11):1550147717740072
Benahmed T, Benahmed K (2019) Optimal barrier coverage for critical area surveillance using wireless sensor networks. Int J Commun Syst 32(10):e3955
Gavel S, Raghuvanshi AS, Tiwari S (2022) Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Syst Appl 189:116089
Wang Y, Fu W, Agrawal DP (2012) Gaussian versus uniform distribution for intrusion detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(2):342–355
Sharma A, Chauhan S (2020) Sensor fusion for distributed detection of mobile intruders in surveillance wireless sensor networks. IEEE Sens J 20(24):15224–15231
Singh R, Singh S (2021) Smart border surveillance system using wireless sensor networks. Int J Syst Assur Eng Manag 13(Suppl 2):880–894
Laouira ML, Abdelli A, Othman JB, Kim H (2019) An efficient WSN based solution for border surveillance. IEEE Trans Sust Comput 6(1):54–65
Sharma S, Nagar J (2020) Intrusion detection in mobile sensor networks: A case study for different intrusion paths. Wireless Pers Commun 115(3):2569–2589
Singh A, Amutha J, Nagar J, Sharma S, Lee CC (2022) Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors 22(3):1070
Mishra P, Varadharajan V, Tupakula U, Pilli ES (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun Surv Tutorials 21(1):686–728
Singh A, Amutha J, Nagar J, Sharma S (2023) A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks. Expert Syst Appl 211:118588
Singh A, Nagar J, Sharma S, Kotiyal V (2021) A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Syst Appl 172:114603
Gheisarnejad M, Mohammadzadeh A, Farsizadeh H, Khooban MH (2021) Stabilization of 5G telecom converter-based deep type-3 fuzzy machine learning control for telecom applications. IEEE Trans Circuits Syst II Express Briefs 69(2):544–548
Mohammadzadeh A, Sabzalian MH, Zhang W (2019) An interval type-3 fuzzy system and a new online fractional-order learning algorithm: theory and practice. IEEE Trans Fuzzy Syst 28(9):1940–1950
Castillo O, Castro JR, Pulido M, Melin P (2022) Interval type-3 fuzzy aggregators for ensembles of neural networks in COVID-19 time series prediction. Eng Appl Artif Intell 114:105110
Tarafdar A, Majumder P, Deb M, Bera UK (2023) Performance-emission optimization in a single cylinder CI-engine with diesel hydrogen dual fuel: a spherical fuzzy MARCOS MCGDM based type-3 fuzzy logic approach. Int J Hydrogen Energy 48(73):28601–28627
Tarafdar A, Majumder P, Deb M, Bera UK (2023) Application of a q-rung orthopair hesitant fuzzy aggregated Type-3 fuzzy logic in the characterization of performance-emission profile of a single cylinder CI-engine operating with hydrogen in dual fuel mode. Energy 269:126751
Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83–98
Liu Y, Eckert C, Yannou-Le Bris G, Petit G (2019) A fuzzy decision tool to evaluate the sustainable performance of suppliers in an agrifood value chain. Comput Ind Eng 127:196–212
Zimmer K, Fröhling M, Breun P, Schultmann F (2017) Assessing social risks of global supply chains: A quantitative analytical approach and its application to supplier selection in the German automotive industry. J Clean Prod 149:96–109
Celik E, Akyuz E (2018) An interval type-2 fuzzy AHP and TOPSIS methods for decision-making problems in maritime transportation engineering: the case of ship loader. Ocean Eng 155:371–381
Calabrese A, Costa R, Levialdi N, Menichini T (2019) Integrating sustainability into strategic decision-making: A fuzzy AHP method for the selection of relevant sustainability issues. Technol Forecast Soc Chang 139:155–168
Lee SW, Mohammadi M, Rashidi S, Rahmani AM, Masdari M, Hosseinzadeh M (2021) Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review. J Netw Comput Appl 187:103111
Singh A, Amutha J, Nagar J, Sharma S, Lee CC (2022) AutoML-ID: Automated machine learning model for intrusion detection using wireless sensor network. Sci Rep 12(1):9074
Sood T, Prakash S, Sharma S, Singh A, Choubey H (2022) Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Pers Commun 126(1):911–931
Sohi SM, Seifert JP, Ganji F (2021) RNNIDS: Enhancing network intrusion detection systems through deep learning. Comput Secur 102:102151
Nagarajan J, Mansourian P, Shahid MA, Jaekel A, Saini I, Zhang N, Kneppers M (2023) Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. Peer-to-Peer Netw Appl 16(5):2153–2185
Yin C, Zhu Y, Fei J, He X (2017) A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5:21954–21961
Pektaş A, Acarman T (2019) A deep learning method to detect network intrusion through flow-based features. Int J Network Manage 29(3):e2050
Abbasi JS, Bashir F, Qureshi KN, ul Islam MN, Jeon G (2021) Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine. Comput Electr Eng 92:107094
Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. Ieee Access 7:41525–41550
Folino F, Folino G, Guarascio M, Pisani FS, Pontieri L (2021) On learning effective ensembles of deep neural networks for intrusion detection. Inf Fusion 72:48–69
Sarath Kumar R, Sampath P, Ramkumar M (2023) Enhanced elman spike neural network fostered intrusion detection framework for securing wireless sensor network. Peer-to-Peer Networking and Applications 16(4):1819–1833
Umarani C, Kannan S (2020) Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. Peer-to-Peer Netw Appl 13:752–761
Saraereh OA, Ali A, Al-Tarawneh L, Khan I (2021) A robust approach for barrier-reinforcing in wireless sensor networks. J Parallel Distrib Comput 149:186–192
Nagar J, Sharma S (2018) k-Barrier coverage-based intrusion detection for wireless sensor networks. In: Bokhari M, Agrawal N, Saini D (eds) Cyber security. Advances in intelligent systems and computing, vol 729. Springer, Singapore, pp. 373–385. https://doi.org/10.1007/978-981-10-8536-9_36
Singh A, Nagar J, Amutha J, Sharma S (2023) P2CA-GAM-ID: Coupling of probabilistic principal components analysis with generalised additive model to predict the k− barriers for intrusion detection. Eng Appl Artif Intell 126:107137
Nabipour N, Qasem SN, Jermsittiparsert K (2020) Type-3 fuzzy voltage management in PV/hydrogen fuel cell/battery hybrid systems. Int J Hydrogen Energy 45(56):32478–32492
Liu Z, Mohammadzadeh A, Turabieh H, Mafarja M, Band SS, Mosavi A (2021) A new online learned interval type-3 fuzzy control system for solar energy management systems. IEEE Access 9:10498–10508
Mosavi A, Qasem SN, Shokri M, Band SS, Mohammadzadeh A (2020) Fractional-order fuzzy control approach for photovoltaic/battery systems under unknown dynamics, variable irradiation and temperature. Electronics 9(9):1455
Elhaki O, Shojaei K, Mohammadzadeh A, Rathinasamy S (2023) Robust amplitude-limited interval type-3 neuro-fuzzy controller for robot manipulators with prescribed performance by output feedback. Neural Comput Appl 35(12):9115–9130
Tarafdar A, Majumder P, Bera UK (2023) Prediction of air quality index in Kolkata city using an advanced learned interval type-3 fuzzy logic system. In: 2023 IEEE 8th Int Conf for Convergence in Technol (I2CT), IEEE, pp 1–7. https://doi.org/10.1007/978-981-10-8536-9_36
Tarafdar A, Majumder P, Bera UK (2023) An Advanced Learned Type-3 Fuzzy Logic-Based Hybrid System to Optimize Inventory Cost for a New Business Policy. Proc Natl Acad Sci, India, Sect A 93(4):711–727
Taghieh A, Mohammadzadeh A, Zhang C, Rathinasamy S, Bekiros S (2023) A novel adaptive interval type-3 neuro-fuzzy robust controller for nonlinear complex dynamical systems with inherent uncertainties. Nonlinear Dyn 111(1):411–425
Kikuchi T, Fukuda T, Yabuki N (2023) Development of a synthetic dataset generation method for deep learning of real urban landscapes using a 3D model of a non-existing realistic city. Adv Eng Inform 58:102154
Khalid Z, Durrani S, Guo J (2013) A tractable framework for exact probability of node isolation and minimum node degree distribution in finite multihop networks. IEEE Trans Veh Technol 63(6):2836–2847
Nagar J, Chaturvedi SK, Soh S (2020) An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. J Netw Comput Appl 149:102466
Zou Y, Chakrabarty K (2004) Sensor deployment and target localization in distributed sensor networks. ACM Trans Embed Comput Syst (TECS) 3(1):61–91
Satty TL (1980) The Analytic Hierarchy Process. McGraw-Hill, New York, NY, USA
Benardos PG, Vosniakos GC (2007) Optimizing feedforward artificial neural network architecture. Eng Appl Artif Intell 20(3):365–382
Specht DF (1991) A general regression neural network. IEEE Trans Neural Networks 2(6):568–576
Rasmussen CE (2004) Gaussian processes in machine learning. In: Bousquet O, von Luxburg U, Rätsch G (eds) Advanced lectures on machine learning. ML 2003. Lecture notes in computer science, vol. 3176. Springer, Berlin, Heidelberg, pp 63–71. https://doi.org/10.1007/978-3-540-28650-9_4
Quinonero-Candela J, Rasmussen CE (2005) A unifying view of sparse approximate Gaussian process regression. J Mach Learn Res 6:1939–1959
Breiman L (2001) Random Forests. Mach Learn 45:5–32. https://doi.org/10.1023/A:1010933404324
Debnath R, Majumder P, Tarafdar A, Bhattacharya B, Bera UK (2024) Artificial intelligence based supply chain management strategy during COVID-19 situation. In: Supply chain forum: an international journal, pp 1–20. https://doi.org/10.1080/16258312.2024.2303307
Funding
There is no funding for this work.
Author information
Authors and Affiliations
Contributions
Anirban Tarafdar Conceptualization, Methodology, Software, Formal analysis, Writing—Original Draft.
Azharuddin Shaikh Software, Conceptualization, Writing and Editing.
Pinki Majumder Conceptualization, Validation, Methodology, Project administration.
Alak MajumderFormal analysis, Simulation,
Bidyut K. Bhattacharyya Validation, Resources, Supervision.
Uttam Kumar Bera Validation, Resources, Visualization, Supervision.
Corresponding author
Ethics declarations
Ethical and informed consent
Ethical and informed consent were not required for this study as it does not involve the use of data from human participants.
Competing interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Tarafdar, A., Sheikh, A., Majumder, P. et al. Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system. Peer-to-Peer Netw. Appl. 17, 1732–1749 (2024). https://doi.org/10.1007/s12083-024-01688-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01688-w