Skip to main content
Log in

Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN

  • Regular Paper
  • Published:
International Journal of Intelligent Robotics and Applications Aims and scope Submit manuscript

Abstract

The security issue is the most significant aspect of Wireless Sensor Network (WSN). As security issues in WSN are increasingly being diversified and premeditated, prevention-based approaches not only afford WSN with sufficient security. However, detection-based methods are necessary for effective collaboration with prevention-based techniques for securing WSN. The development of anomaly detection approaches in WSN is a significant research area, which enables WSN to be much more secure and reliable. Hence, anomaly behavior identification in WSN is a significant challenge for several tasks, like intrusion detection, monitoring applications, and fault diagnosis. In this paper, Taylor Competitive Multi-Verse Optimizer (Taylor CMVO)-based Deep Q network model is devised for effective anomalous behavior detection in WSN. In WSN, the Cluster Head (CH) selection process is significant for the routing process, and it is performed by Particle Swarm Optimization (PSO)-based cellular automata. Moreover, routing is done to transmit data to the sink node using the Particle-Water Wave Optimization (P-WWO) algorithm. The significant features are selected for effective intrusion detection by Canberra distance. The intrusion detection process is done by Deep Q network, and it is trained by developed Taylor CMVO algorithm. The Taylor CMVO approach is designed by combining CMVO with Taylor series. The developed intrusion detection approach outperforms other techniques based on accuracy, sensitivity, and specificity of 96.44%, 98%, and 97.31%, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Alamelu Mangai, S., Ravi Sankar, B., Alagarsamy, K.: Taylor series prediction of time series data with error propagated by artificial neural network. Int. J. Comput. Appl. 89(1), 41–47 (2014)

    Google Scholar 

  • Ambati, L.S., El-Gayar, O.: Human activity recognition: a comparison of machine learning approaches. J. Midwest Assoc. Inf. Syst. 1, 2021 (2021)

    Google Scholar 

  • Ambati, L.S., El-Gayar, O., Nawar, N.: Design principles for multiple sclerosis mobile self-management applications: a patient-centric perspective. In: Proceedings of AMCIS 2021, (2021)

  • Anand, S.: Intrusion detection system for wireless mesh networks via improved whale optimization. J. Netw. Commun. Syst. 3(4), 9 (2020)

    MathSciNet  Google Scholar 

  • Androutsos, D., Plataniotiss, K.N., Venetsanopoulos, A.N.: Distance measures for color image retrieval. In: Proceedings IEEE International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), vol. 2, pp. 770–774, October (1998)

  • Benmessahel, I., Xie, K., Chellal, M.: A new competitive multiverse optimization technique for solving single-objective and multiobjective problems. Eng. Rep. 2(3), e12124 (2020)

    Google Scholar 

  • Borkar, G.M., Patil, L.H., Dalgade, D., Hutke, A.: A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept. Sustain. Comput.: Inform. Syst. 23, 120–135 (2019)

    Google Scholar 

  • BoT-IoT dataset taken from, “https://www.unsw.adfa.edu.au/unsw-canberra-cyber/cybersecurity/ADFA-NB15-Datasets/bot_iot.php”, Accessed on May 2021.

  • Byun, H., Yu, J.: Cellular-automaton-based node scheduling control for wireless sensor networks. IEEE Trans. Veh. Technol. 63(8), 3892–3899 (2014)

    Article  Google Scholar 

  • Cao, Y., Wang, N., Sun, Z., Cruickshank, H.: A reliable and efficient encounter-based routing framework for delay/disruption tolerant networks. IEEE Sens. J. 15(7), 4004–4018 (2015)

    Article  Google Scholar 

  • Cao, Y., Wang, T., Kaiwartya, O., Min, G., Ahmad, N., Abdullah, A.H.: An EV charging management system concerning drivers’ trip duration and mobility uncertainty. IEEE Trans. Syst. Man Cybern: Syst. 48(4), 596–607 (2016)

    Article  Google Scholar 

  • Chen, Z., He, M., Liang, W., Chen, K.: Trust-aware and low energy consumption security topology protocol of wireless sensor network. J. Sensors 2015, 1 (2015)

    Google Scholar 

  • Dhanvijay, R., Pande, M. and Wajurakar, S.: Energy optimization in wireless sensor networks using trust-aware routing algorithm, 61, 23–140 (2019)

  • Han, L., Zhou, M., Jia, W., Dalil, Z., Xu, X.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2019)

    Article  Google Scholar 

  • Haque, S.A., Rahman, M., Aziz, S.M.: Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15(4), 8764–8786 (2015)

    Article  Google Scholar 

  • Kaiwartya, O., Abdullah, A.H., Cao, Y., Altameem, A., Prasad, M., Lin, C.T., Liu, X.: Internet of vehicles: motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, 5356–5373 (2016)

    Article  Google Scholar 

  • Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., Kannan, A.: QoS aware trust based routing algorithm for wireless sensor networks. Wireless Pers. Commun. 110(4), 1637–1658 (2020)

    Article  Google Scholar 

  • Kumar, N., Kim, J.: ELACCA: efficient learning automata based cell clustering algorithm for wireless sensor networks. Wireless Pers. Commun. 73(4), 1495–1512 (2013)

    Article  Google Scholar 

  • Moh’d Alia, O.: Dynamic relocation of mobile base station in wireless sensor networks using a cluster-based harmony search algorithm. Inf. Sci. 385, 76–95 (2017)

    Article  Google Scholar 

  • Mythili, V., Suresh, A., Devasagayam, M.M., Dhanasekaran, R.: SEAT-DSR: spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cogn. Syst. Res. 58, 143–155 (2019)

    Article  Google Scholar 

  • Palaniappan, S., Chellan, K.: Energy-efficient stable routing using QoS monitoring agents in MANET. EURASIP J. Wireless Commun. Netw. 2015(1), 13 (2015)

    Article  Google Scholar 

  • Pena, E.H., Carvalho, L.F., Barbon, S., Jr., Rodrigues, J.J., Proença, M.L., Jr.: Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment. Inf. Sci. 420, 313–328 (2017)

    Article  Google Scholar 

  • Rathee, M., Kumar, S., Gandomi, A.H., Dilip, K., Balusamy, B. and Patan, R.: Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. In: IEEE Transactions on Engineering Management (2019)

  • Safaldin, M., Otair, M., Abualigah, L.: Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 12(2), 1559–1576 (2021)

    Article  Google Scholar 

  • Shi, Q., Qin, L., Ding, Y., Xie, B., Zheng, J., Song, L.: information-aware secure routing in wireless sensor networks. Sensors 20(1), 165 (2020)

    Article  Google Scholar 

  • Stephen, R.K., Sekar, A.C., Dinakaran, K.: Sectional transmission analysis approach for improved reliable transmission and secure routing in wireless sensor networks. Clust. Comput. 22(2), 3759–3770 (2019)

    Article  Google Scholar 

  • Tang, D., Jiang, T. and Ren, J.: Secure and energy aware routing (sear) in wireless sensor networks. In: IEEE Global Telecommunications Conference GLOBECOM, pp. 1–5 (2010)

  • Vasudeva, A., Sood, M.: Survey on sybil attack defense mechanisms in wireless ad hoc networks. J. Netw. Comput. Appl. 120, 78–118 (2018)

    Article  Google Scholar 

  • Veeraiah, N., Krishna, B.T.: Intrusion detection based on piecewise fuzzy c-means clustering and fuzzy naive bayes rule. Multimed. Res. 1(1), 27–32 (2018)

    Google Scholar 

  • Wang, B., Chen, X., Chang, W.: A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob. Comput. 13, 164–180 (2014)

    Article  Google Scholar 

  • Wang, Y., Li, D., Dong, N.: Cellular automata malware propagation model for WSN based on multi-player evolutionary game. IET Netw. 7(3), 129–135 (2018)

    Article  Google Scholar 

  • Wang, Y., Liu, H., Zheng, W., Xia, Y., Li, Y., Chen, P., Guo, K., Xie, H.: Multi-objective workflow scheduling with Deep-Q-network-based multi-agent reinforcement learning. IEEE Access 7, 39974–39982 (2019)

    Article  Google Scholar 

  • Yadav, A.K., Tripathi, S.: QMRPRNS: design of QoS multicast routing protocol using reliable node selection scheme for MANETs. Peer-to-Peer Netw Appl 10(4), 897–909 (2017)

    Article  Google Scholar 

  • Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)

    Article  Google Scholar 

  • Yu, Q., Jibin, L., Jiang, L.: An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(1), 9653230 (2016)

    Article  Google Scholar 

  • Zhan, Z.H., Zhang, J., Li, Y., Chung, H.S.H.: Adaptive particle swarm optimization. IEEE Trans. Syst. Man Cybern. Part B (cybern.) 39(6), 1362–1381 (2009)

    Article  Google Scholar 

  • Zhang, F., Wang, X., Li, P., Zhang, L.: An energy aware cellular learning automata based routing algorithm for opportunistic networks. Int. J. Grid Distrib. Comput. 9(2), 255–272 (2016)

    Article  Google Scholar 

  • Zhang, W., Han, D., Li, K.C., Massetto, F.I.: Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput. 24, 1–14 (2020)

    Article  Google Scholar 

  • Zheng, Y.J.: Water wave optimization: a new nature-inspired metaheuristic. Comput. Oper. Res. 55, 1–11 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeep Sadashiv Khot.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khot, P.S., Naik, U. Taylor CMVO: Taylor Competitive Multi-Verse Optimizer for intrusion detection and cellular automata-based secure routing in WSN. Int J Intell Robot Appl 6, 306–322 (2022). https://doi.org/10.1007/s41315-022-00225-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41315-022-00225-3

Keywords

Navigation