Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks

Published: 01 January 2023 Publication History

Abstract

Wireless Sensor Networks (WSNs) is a promising technology with enormous applications in almost every walk of life. One of the crucial applications of WSNs is intrusion detection and surveillance at border areas and in the defence establishments. The border areas are stretched over hundreds to thousands of miles, hence, it is not possible to patrol the entire border region. As a result, an enemy may enter from any point absence of surveillance and cause the loss of lives or destroy the military establishments. WSNs can be a feasible solution for the problem of intrusion detection and surveillance at the border areas. Detection of an enemy at the border areas and nearby critical areas such as military cantonments is a time-sensitive task as a delay of a few seconds may have disastrous consequences. Therefore, it becomes imperative to design systems that can identify and detect the enemy as soon as it comes within the range of the deployed system. In this paper, we have proposed a deep learning architecture based on a fully connected feed-forward Artificial Neural Network (ANN) for the accurate prediction of the number of k-barriers for fast intrusion detection and prevention. We have trained and evaluated the feed-forward ANN model using four potential features, namely area of the circular region, sensing range of sensors, transmission range of sensors, and number of sensor for Gaussian and uniform sensor distribution. These features are extracted through Monte Carlo simulation. In doing so, we found that the model accurately predicts the number of k-barriers for both Gaussian and uniform sensor distribution with correlation coefficient (R = 0.78) and Root Mean Square Error (RMSE = 41.15) for the former and R = 0.79 and RMSE = 48.36 for the latter. Further, the proposed approach outperforms the other benchmark algorithms in terms of accuracy and computational time complexity.

Graphical abstract

Display Omitted

Highlights

Proposed a deep learning-based architecture to predict the k barriers.
An experimental study to evaluate the performance of the proposed architecture.
Comparative results show the outperform performance concerning other benchmark algorithms.
Presented approach can solve the problem of unnecessary computing time and cost.

References

[1]
Abbasi J.S., Bashir F., Qureshi K.N., ul Islam M.N., Jeon G., Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine, Computers and Electrical Engineering 92 (2021).
[2]
Amutha J., Nagar J., Sharma S., A distributed border surveillance (dbs) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments, Wireless Personal Communications 117 (3) (2021) 2135–2155.
[3]
Amutha J., Sharma S., Nagar J., WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues, Wireless Personal Communications 111 (2) (2020) 1089–1115.
[4]
Amutha J., Sharma S., Sharma S.K., Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions, Computer Science Review 40 (2021).
[5]
Arjun D., Indukala P., Menon K.U., PANCHENDRIYA: A multi-sensing framework through wireless sensor networks for advanced border surveillance and human intruder detection, in: 2019 international conference on communication and electronics systems (ICCES), IEEE, 2019, pp. 295–298.
[6]
Aseeri M., Ahmed M., Shakib M., Ghorbel O., Shaman H., Detection of attacker and location in wireless sensor network as an application for border surveillance, International Journal of Distributed Sensor Networks 13 (11) (2017).
[7]
Belle V., Papantonis I., Principles and practice of explainable machine learning, Frontiers in Big Data (2021) 39.
[8]
Benahmed T., Benahmed K., Optimal barrier coverage for critical area surveillance using wireless sensor networks, International Journal of Communication Systems 32 (10) (2019).
[9]
Duch W., Jankowski N., Survey of neural transfer functions, Neural Computing Surveys 2 (1) (1999) 163–212.
[10]
Elias I., Rubio J.d.J., Martinez D.I., Vargas T.M., Garcia V., Mujica-Vargas D., et al., Genetic algorithm with radial basis mapping network for the electricity consumption modeling, Applied Sciences 10 (12) (2020) 4239.
[11]
Folino F., Folino G., Guarascio M., Pisani F.S., Pontieri L., On learning effective ensembles of deep neural networks for intrusion detection, Information Fusion 72 (2021) 48–69.
[12]
Friedman J.H., Greedy function approximation: a gradient boosting machine, The Annals of Statistics (2001) 1189–1232.
[13]
Gavel S., Raghuvanshi A.S., Tiwari S., Maximum correlation based mutual information scheme for intrusion detection in the data networks, Expert Systems with Applications (2021).
[14]
Hagan M.T., Menhaj M.B., Training feedforward networks with the marquardt algorithm, IEEE Transactions on Neural Networks 5 (6) (1994) 989–993.
[15]
Huang H., Gong T., Zhang R., Yang L.-L., Zhang J., Xiao F., Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders, IEEE Transactions on Vehicular Technology 67 (12) (2018) 12109–12123.
[16]
Kandris D., Nakas C., Vomvas D., Koulouras G., Applications of wireless sensor networks: an up-to-date survey, Applied System Innovation 3 (1) (2020) 14.
[17]
Karanja S., Badru R., Development of a low cost wireless sensor network for surveillance along Kenya-Somalia border, 2021, Preprint.
[18]
Karthick R., Prabaharan A.M., Selvaprasanth P., Internet of things based high security border surveillance strategy, Asian Journal of Applied Science and Technology (AJAST) 3 (2019) 94–100.
[19]
Keung G.Y., Li B., Zhang Q., The intrusion detection in mobile sensor network, IEEE/ACM Transactions on Networking 20 (4) (2012) 1152–1161.
[20]
Kotiyal V., Singh A., Sharma S., Nagar J., Lee C.-C., ECS-NL: An enhanced cuckoo search algorithm for node localisation in wireless sensor networks, Sensors 21 (11) (2021) 3576.
[21]
Laranjeira L.A., Rodrigues G.N., Border effect analysis for reliability assurance and continuous connectivity of wireless sensor networks in the presence of sensor failures, IEEE Transactions on Wireless Communication 13 (8) (2014) 4232–4246.
[22]
Lee S.-W., Mohammadi M., Rashidi S., Rahmani A.M., Masdari M., Hosseinzadeh M., et al., Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review, Journal of Network and Computer Applications (2021).
[23]
Lin H., Dai Q., Zheng L., Hong H., Deng W., Wu F., Radial basis function artificial neural network able to accurately predict disinfection by-product levels in tap water: Taking haloacetic acids as a case study, Chemosphere 248 (2020).
[24]
Lundberg S.M., Nair B., Vavilala M.S., Horibe M., Eisses M.J., Adams T., et al., Explainable machine-learning predictions for the prevention of hypoxaemia during surgery, Nature Biomedical Engineering 2 (10) (2018) 749–760.
[25]
Mansor M., Mohd Jamaludin S.Z., Mohd Kasihmuddin M.S., Alzaeemi S.A., Md Basir M.F., Sathasivam S., et al., Systematic Boolean satisfiability programming in radial basis function neural network, Processes 8 (2) (2020) 214.
[26]
Mathew J., Griffin J., Alamaniotis M., Kanarachos S., Fitzpatrick M.E., Prediction of welding residual stresses using machine learning: comparison between neural networks and neuro-fuzzy systems, Applied Soft Computing 70 (2018) 131–146.
[27]
Mishra P., Varadharajan V., Tupakula U., Pilli E.S., A detailed investigation and analysis of using machine learning techniques for intrusion detection, IEEE Communications Surveys & Tutorials 21 (1) (2018) 686–728.
[28]
Moldovan A., Caţaron A., Andonie R., Learning in feedforward neural networks accelerated by transfer entropy, Entropy 22 (1) (2020) 102.
[29]
Mostafaei H., Chowdhury M.U., Obaidat M.S., Border surveillance with WSN systems in a distributed manner, IEEE Systems Journal 12 (4) (2018) 3703–3712.
[30]
Nagar J., Chaturvedi S.K., Soh S., An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region, Journal of Network and Computer Applications 149 (2020).
[31]
Nagar J., Sharma S., K-barrier coverage-based intrusion detection for wireless sensor networks, in: Cyber security, Springer, 2018, pp. 373–385.
[32]
Nancy P., Muthurajkumar S., Ganapathy S., Kumar S.S., Selvi M., Arputharaj K., Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks, IET Communications 14 (5) (2020) 888–895.
[33]
Novickis R., Justs D.J., Ozols K., Greitāns M., An approach of feed-forward neural network throughput-optimized implementation in FPGA, Electronics 9 (12) (2020) 2193.
[34]
Pektaş A., Acarman T., A deep learning method to detect network intrusion through flow-based features, International Journal of Network Management 29 (3) (2019).
[35]
Roscher R., Bohn B., Duarte M.F., Garcke J., Explainable machine learning for scientific insights and discoveries, IEEE Access 8 (2020) 42200–42216.
[36]
Safaldin M., Otair M., Abualigah L., Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing 12 (2) (2021) 1559–1576.
[37]
Saraereh O.A., Ali A., Al-Tarawneh L., Khan I., A robust approach for barrier-reinforcing in wireless sensor networks, Journal of Parallel and Distributed Computing 149 (2021) 186–192.
[38]
Sharma A., Chauhan S., Sensor fusion for distributed detection of mobile intruders in surveillance wireless sensor networks, IEEE Sensors Journal 20 (24) (2020) 15224–15231.
[39]
Sharma S., Nagar J., Intrusion detection in mobile sensor networks: A case study for different intrusion paths, Wireless Personal Communications (2020) 1–21.
[40]
Si P., Ma J., Tao F., Fu Z., Shu L., Energy-efficient barrier coverage with probabilistic sensors in wireless sensor networks, IEEE Sensors Journal 20 (10) (2020) 5624–5633.
[41]
Singh A., Amutha J., Nagar J., Sharma S., Lee C.-C., AutoML-ID: automated machine learning model for intrusion detection using wireless sensor network, Scientific Reports 12 (1) (2022) 1–14.
[42]
Singh A., Amutha J., Nagar J., Sharma S., Lee C.-C., Lt-fs-id: Log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network, Sensors 22 (3) (2022) 1070.
[43]
Singh A., Gaurav K., Rai A.K., Beg Z., Machine learning to estimate surface roughness from satellite images, Remote Sensing 13 (19) (2021) 3794.
[44]
Singh A., Kotiyal V., Sharma S., Nagar J., Lee C.-C., A machine learning approach to predict the average localization error with applications to wireless sensor networks, IEEE Access 8 (2020) 208253–208263.
[45]
Singh A., Nagar J., Sharma S., Kotiyal V., A Gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks, Expert Systems with Applications 172 (2021).
[46]
Singh A., Sharma S., Singh J., Nature-inspired algorithms for wireless sensor networks: A comprehensive survey, Computer Science Review 39 (2021).
[47]
Singh A., Sharma S., Singh J., Kumar R., Mathematical modelling for reducing the sensing of redundant information in WSNs based on biologically inspired techniques, Journal of Intelligent & Fuzzy Systems 37 (5) (2019) 6829–6839.
[48]
Sohi S.M., Seifert J.-P., Ganji F., RNNIDS: Enhancing network intrusion detection systems through deep learning, Computers & Security 102 (2021).
[49]
Sood T., Prakash S., Sharma S., Singh A., Choubey H., Intrusion detection system in wireless sensor network using conditional generative adversarial network, Wireless Personal Communications (2022) 1–21.
[50]
Torres-Barrán A., Alonso A., Dorronsoro J.R., Regression tree ensembles for wind energy and solar radiation prediction, Neurocomputing 326 (2019) 151–160.
[51]
Vinayakumar R., Alazab M., Soman K., Poornachandran P., Al-Nemrat A., Venkatraman S., Deep learning approach for intelligent intrusion detection system, IEEE Access 7 (2019) 41525–41550.
[52]
Wang D., Xie B., Agrawal D.P., Coverage and lifetime optimization of wireless sensor networks with gaussian distribution, IEEE Transactions on Mobile Computing 7 (12) (2008) 1444–1458.
[53]
Yin C., Zhu Y., Fei J., He X., A deep learning approach for intrusion detection using recurrent neural networks, IEEE Access 5 (2017) 21954–21961.
[54]
Zhang D., Zhang N., Ye N., Fang J., Han X., Hybrid learning algorithm of radial basis function networks for reliability analysis, IEEE Transactions on Reliability (2020).

Cited By

View all
  • (2024)Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasetsExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.121493237:PBOnline publication date: 1-Feb-2024
  • (2024)A survey on graph neural networks for intrusion detection systemsComputers and Security10.1016/j.cose.2024.103821141:COnline publication date: 1-Jun-2024
  • (2024)Lifetime maximization of wireless sensor networks while ensuring intruder detectionSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-024-09692-128:5(4197-4215)Online publication date: 1-Mar-2024

Index Terms

  1. A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Expert Systems with Applications: An International Journal
    Expert Systems with Applications: An International Journal  Volume 211, Issue C
    Jan 2023
    1635 pages

    Publisher

    Pergamon Press, Inc.

    United States

    Publication History

    Published: 01 January 2023

    Author Tags

    1. WSNs
    2. Binary sensing model
    3. Gaussian distribution
    4. Uniform distribution
    5. Barrier coverage
    6. Deep learning

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Stochastic gradient descent classifier-based lightweight intrusion detection systems using the efficient feature subsets of datasetsExpert Systems with Applications: An International Journal10.1016/j.eswa.2023.121493237:PBOnline publication date: 1-Feb-2024
    • (2024)A survey on graph neural networks for intrusion detection systemsComputers and Security10.1016/j.cose.2024.103821141:COnline publication date: 1-Jun-2024
    • (2024)Lifetime maximization of wireless sensor networks while ensuring intruder detectionSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-024-09692-128:5(4197-4215)Online publication date: 1-Mar-2024

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media