Malicious Node Detection in Wireless Sensor Networks Using Neural Networks
Keywords:
Neural Networks (NN), Wireless Sensor Network WSN, malicious node, throughput, power consumption, delayAbstract
Throughout the past decade, wireless sensor networks (WSNs) have become a focus of observation in the wireless and mobile computing research community. The WSN has many uses, and applications from inside (starting from measuring temperature, pressure, humidity, and similar application inside the home) to outside (extension on the tactical battleground). Due to the distributed nature and spread in distant region, these networks are prone to many security attacks, which in turn negatively influences performances of these networks. Therefore, securing wireless sensor networks against these threats is becoming more and more important. A malicious node within the network is one of these threats. In this study, a procedure for detecting a malicious node in the network using the NS-2 simulator is presented. The proposed method uses Artificial Neural Network (ANN), built using MATLAB, for the purpose of prediction. Training, validation and testing have been performed on a dataset containing throughput, power consumption and time delay as inputs of the used ANN. Experimental results show the efficiency of the proposed method in security threats detection.
References
J. A. Stankovic, “Wireless sensor networks,” Computer, vol. 41, no. 10, pp. 92–95, 2008. https://doi.org/10.1109/MC.2008.441.
IntechOpen, “Wireless sensor networks,” [Online]. Available at: https://www.intechopen.com/chapters/76818.
Wiley Online Library, “Special issue: Wireless sensor networks,” [Online]. Available at: https://onlinelibrary.wiley.com/doi/toc/10.1155/9071.si.204518.
J. Sen, “Security in wireless sensor networks,” Wireless Sensor Networks: Current Status and Future Trends, vol. 407, pp. 407–408, 2012. https://doi.org/10.1201/b13092-21.
J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002.
L. Darwish, M. Nassr, F. Ghosna, H. M. Fardoun, D. K. Voronkova, and M. Anbar, “Malicious node detection in wireless sensor networks: Comparative study,” Proceedings of the 2023 5th Int. Youth Conf. Radio Electronics, Electrical and Power Engineering (REEPE), 2023, pp. 1–5, https://doi.org/10.1109/REEPE57272.2023.10086790.
Y. Zhang and W. Cai, “The key technology of wireless sensor network and its application in the internet of things,” Journal of Sensors, vol. 2022, 1817781, 2022. https://doi.org/10.1155/2022/1817781.
M Babu, M Ramkumar, M Shenbagapriya, “Detection of malicious nodes in wireless sensor network,” ICTACT Journal on Communication Technology, vol. 10, issue 4, pp. 2067-2072, 2019.
G. M. N. Veerabadrappa and P. M. Booma, “ESDAM-efficient and secure data aggregation against malicious nodes in IoT environment,” Int. J. Innovative Technol. Exploring Eng. (IJITEE), vol. 9, no. 2, pp. 2278–3075, 2019. https://doi.org/10.35940/ijitee.B6713.129219.
L. Alzubaidi, J. Zhang, A. J. Humaidi et al., “Review of deep learning: concepts, CNN architectures, challenges, applications, future directions,” J. Big Data, vol. 8, no. 53, 2021. https://doi.org/10.1186/s40537-021-00444-8.
Z. Zhang, Y. Yang, W. Yang, F. Wu, P. Li, and X. Xiong, “Detection and location of malicious nodes based on homomorphic fingerprinting in wireless sensor networks,” Security and Communication Networks, vol. 2021, 9082570, 12 pages, 2021. https://doi.org/10.1155/2021/9082570.
G. Zheng, B. Gong, and Y. Zhang, “Dynamic network security mechanism based on trust management in wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 6667100, 10 pages, 2021. https://doi.org/10.1155/2021/6667100.
H. S. Saini, R. Sayal, and S. S. Rawat, Innovations in Computer Science and Engineering, Springer Singapore, 2021.
P. Singhal and A. Yadav, “Congestion detection in wireless sensor network using neural network,” Proceedings of the International Conference on Convergence for Technology, Apr. 2014, pp. 1–4. https://doi.org/10.1109/I2CT.2014.7092259.
M. H. Beale, M. T. Hagan, and H. B. Demuth, “Neural network toolbox user’s guide”, MathWorks, vol. 2, pp. 77–81, 2010.
S. H. Haji and A. M. Abdulazeez, “Comparison of optimization techniques based on gradient descent algorithm: A review,” PalArch’s Journal of Archaeology of Egypt/Egyptology, vol. 18, no. 4, pp. 2715–2743, 2021.
M. Kumar, P. Mukherjee, K. Verma, S. Verma, and D. B. Rawat, “Improved deep convolutional neural network based malicious node detection and energy-efficient data transmission in wireless sensor networks,” IEEE Trans. Network Sci. Eng., vol. 9, no. 5, pp. 3272–3281, 2021. https://doi.org/10.1109/TNSE.2021.3098011.
IGI Global, “A novel secure routing protocol in MANET,” [Online]. Available at: https://www.igi-global.com/dictionary/a-novel-secure-routing-protocol-in-manet/33926.
W. R. Pires, T. H. de Paula Figueiredo, H. C. Wong, and A. A. F. Loureiro, “Malicious node detection in wireless sensor networks,” Proceedings of the 18th Int. Parallel and Distributed Processing Symposium, Apr. 2004, p. 24. https://doi.org/10.1109/IPDPS.2004.1302934.
R. Vijayarajeswari, A. Rajivkannan, and J. Santhosh, “Survey of malicious node detection in wireless sensor networks,” Int. J. Emerging Technol. Innovative Eng., vol. 2, no. 6, pp. 335-338, 2016. https://doi.org/10.5958/2249-7315.2016.01177.1.
P. Anu, S. Vimala, “Optimization of open shortest path first routing,” European Journal of Molecular & Clinical Medicine, vol. 7, no. 11, pp. 94-99, 2020.
LinkedIn, “How can you identify the optimal number of nodes in ANN?” [Online]. Available at: https://www.linkedin.com/advice/1/how-can-you-identify-optimal-number-nodes-ann-v6iwf.
S. D. Kadu and V. S. Deshpande, “Handling throughput in wireless sensor network,” Proceedings of the 2012 IEEE Int. Conf. Computational Intelligence and Computing Research, Dec. 2012, pp. 1–4. https://doi.org/10.1109/ICCIC.2012.6510281.
S. D. Kadu and V. S. Deshpande, “Characterization of throughput in wireless sensor network for MAC and routing protocol,” Proceedings of the 2013 Int. Conf. Cloud & Ubiquitous Computing & Emerging Technologies, Nov. 2013, pp. 108–111. https://doi.org/10.1109/CUBE.2013.55.
K. Gulati, R. S. K. Boddu, D. Kapila, S. L. Bangare, N. Chandnani, and G. Saravanan, “A review paper on wireless sensor network techniques in Internet of Things (IoT),” Materials Today: Proceedings, vol. 51, pp. 161–165, 2022. https://doi.org/10.1016/j.matpr.2021.05.067.
H. A. A. Al-Asadi, R. Hasan, M. Nassr, and M. Anbar, “Power consumption in wireless sensor network: A machine learning approach,” Computing, Performance and Communication Systems, vol. 6, no. 1, pp. 24–37, 2022.
B. Rajasekaran and C. Arun, “Detection of malicious nodes in wireless sensor networks based on features using neural network computing approach,” Int. J. Recent Technol. Eng., vol. 7, no. 4, pp. 188–192, 2018.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.