Abstract
The security issue is the most significant aspect of Wireless Sensor Network (WSN). As security issues in WSN are increasingly being diversified and premeditated, prevention-based approaches not only afford WSN with sufficient security. However, detection-based methods are necessary for effective collaboration with prevention-based techniques for securing WSN. The development of anomaly detection approaches in WSN is a significant research area, which enables WSN to be much more secure and reliable. Hence, anomaly behavior identification in WSN is a significant challenge for several tasks, like intrusion detection, monitoring applications, and fault diagnosis. In this paper, Taylor Competitive Multi-Verse Optimizer (Taylor CMVO)-based Deep Q network model is devised for effective anomalous behavior detection in WSN. In WSN, the Cluster Head (CH) selection process is significant for the routing process, and it is performed by Particle Swarm Optimization (PSO)-based cellular automata. Moreover, routing is done to transmit data to the sink node using the Particle-Water Wave Optimization (P-WWO) algorithm. The significant features are selected for effective intrusion detection by Canberra distance. The intrusion detection process is done by Deep Q network, and it is trained by developed Taylor CMVO algorithm. The Taylor CMVO approach is designed by combining CMVO with Taylor series. The developed intrusion detection approach outperforms other techniques based on accuracy, sensitivity, and specificity of 96.44%, 98%, and 97.31%, respectively.
Similar content being viewed by others
References
Alamelu Mangai, S., Ravi Sankar, B., Alagarsamy, K.: Taylor series prediction of time series data with error propagated by artificial neural network. Int. J. Comput. Appl. 89(1), 41–47 (2014)
Ambati, L.S., El-Gayar, O.: Human activity recognition: a comparison of machine learning approaches. J. Midwest Assoc. Inf. Syst. 1, 2021 (2021)
Ambati, L.S., El-Gayar, O., Nawar, N.: Design principles for multiple sclerosis mobile self-management applications: a patient-centric perspective. In: Proceedings of AMCIS 2021, (2021)
Anand, S.: Intrusion detection system for wireless mesh networks via improved whale optimization. J. Netw. Commun. Syst. 3(4), 9 (2020)
Androutsos, D., Plataniotiss, K.N., Venetsanopoulos, A.N.: Distance measures for color image retrieval. In: Proceedings IEEE International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), vol. 2, pp. 770–774, October (1998)
Benmessahel, I., Xie, K., Chellal, M.: A new competitive multiverse optimization technique for solving single-objective and multiobjective problems. Eng. Rep. 2(3), e12124 (2020)
Borkar, G.M., Patil, L.H., Dalgade, D., Hutke, A.: A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept. Sustain. Comput.: Inform. Syst. 23, 120–135 (2019)
BoT-IoT dataset taken from, “https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php”, Accessed on May 2021.
Byun, H., Yu, J.: Cellular-automaton-based node scheduling control for wireless sensor networks. IEEE Trans. Veh. Technol. 63(8), 3892–3899 (2014)
Cao, Y., Wang, N., Sun, Z., Cruickshank, H.: A reliable and efficient encounter-based routing framework for delay/disruption tolerant networks. IEEE Sens. J. 15(7), 4004–4018 (2015)
Cao, Y., Wang, T., Kaiwartya, O., Min, G., Ahmad, N., Abdullah, A.H.: An EV charging management system concerning drivers’ trip duration and mobility uncertainty. IEEE Trans. Syst. Man Cybern: Syst. 48(4), 596–607 (2016)
Chen, Z., He, M., Liang, W., Chen, K.: Trust-aware and low energy consumption security topology protocol of wireless sensor network. J. Sensors 2015, 1 (2015)
Dhanvijay, R., Pande, M. and Wajurakar, S.: Energy optimization in wireless sensor networks using trust-aware routing algorithm, 61, 23–140 (2019)
Han, L., Zhou, M., Jia, W., Dalil, Z., Xu, X.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2019)
Haque, S.A., Rahman, M., Aziz, S.M.: Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15(4), 8764–8786 (2015)
Kaiwartya, O., Abdullah, A.H., Cao, Y., Altameem, A., Prasad, M., Lin, C.T., Liu, X.: Internet of vehicles: motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, 5356–5373 (2016)
Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., Kannan, A.: QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers. Commun. 110(4), 1637–1658 (2020)
Kumar, N., Kim, J.: ELACCA: efficient learning automata based cell clustering algorithm for wireless sensor networks. Wireless Pers. Commun. 73(4), 1495–1512 (2013)
Moh’d Alia, O.: Dynamic relocation of mobile base station in wireless sensor networks using a cluster-based harmony search algorithm. Inf. Sci. 385, 76–95 (2017)
Mythili, V., Suresh, A., Devasagayam, M.M., Dhanasekaran, R.: SEAT-DSR: spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cogn. Syst. Res. 58, 143–155 (2019)
Palaniappan, S., Chellan, K.: Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP J. Wireless Commun. Netw. 2015(1), 13 (2015)
Pena, E.H., Carvalho, L.F., Barbon, S., Jr., Rodrigues, J.J., Proença, M.L., Jr.: Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment. Inf. Sci. 420, 313–328 (2017)
Rathee, M., Kumar, S., Gandomi, A.H., Dilip, K., Balusamy, B. and Patan, R.: Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. In: IEEE Transactions on Engineering Management (2019)
Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 12(2), 1559–1576 (2021)
Shi, Q., Qin, L., Ding, Y., Xie, B., Zheng, J., Song, L.: information-aware secure routing in wireless sensor networks. Sensors 20(1), 165 (2020)
Stephen, R.K., Sekar, A.C., Dinakaran, K.: Sectional transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. Clust. Comput. 22(2), 3759–3770 (2019)
Tang, D., Jiang, T. and Ren, J.: Secure and energy aware routing (sear) in wireless sensor networks. In: IEEE Global Telecommunications Conference GLOBECOM, pp. 1–5 (2010)
Vasudeva, A., Sood, M.: Survey on sybil attack defense mechanisms in wireless ad hoc networks. J. Netw. Comput. Appl. 120, 78–118 (2018)
Veeraiah, N., Krishna, B.T.: Intrusion detection based on piecewise fuzzy c-means clustering and fuzzy naive bayes rule. Multimed. Res. 1(1), 27–32 (2018)
Wang, B., Chen, X., Chang, W.: A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob. Comput. 13, 164–180 (2014)
Wang, Y., Li, D., Dong, N.: Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Netw. 7(3), 129–135 (2018)
Wang, Y., Liu, H., Zheng, W., Xia, Y., Li, Y., Chen, P., Guo, K., Xie, H.: Multi-objective workflow scheduling with Deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7, 39974–39982 (2019)
Yadav, A.K., Tripathi, S.: QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4), 897–909 (2017)
Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)
Yu, Q., Jibin, L., Jiang, L.: An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(1), 9653230 (2016)
Zhan, Z.H., Zhang, J., Li, Y., Chung, H.S.H.: Adaptive particle swarm optimization. IEEE Trans. Syst. Man Cybern. Part B (cybern.) 39(6), 1362–1381 (2009)
Zhang, F., Wang, X., Li, P., Zhang, L.: An energy aware cellular learning automata based routing algorithm for opportunistic networks. Int. J. Grid Distrib. Comput. 9(2), 255–272 (2016)
Zhang, W., Han, D., Li, K.C., Massetto, F.I.: Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput. 24, 1–14 (2020)
Zheng, Y.J.: Water wave optimization: a new nature-inspired metaheuristic. Comput. Oper. Res. 55, 1–11 (2015)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khot, P.S., Naik, U. Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. Int J Intell Robot Appl 6, 306–322 (2022). https://doi.org/10.1007/s41315-022-00225-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41315-022-00225-3