Abstract
As a result of technological growth, WSNs enable creative practical solutions for anything from basic communication to sophisticated applications, which are not confined to a particular domain. In addition to the advances, there is an ongoing issue concerning the frequent threats or attacks on WSNs. The sinkhole attack, which jeopardizes the accuracy and trustworthiness of information in a WSN, is one of the most devastating attacks. Moreover, WSN routing schemes are extremely vulnerable to sinkhole attacks. To address the security challenges faced by WSNs, timely and reliable intrusion detection is of utmost importance. In this paper, a novel intrusion detection scheme, called Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model (TSMR-CDNN), is introduced for sinkhole attack detection. TSMR-CDNN incorporates a reverse time synchronization scheme for its potential to provide precise clock skews and offsets, effectively reducing detection delays. The Broken-stick regression method is applied for the analysis of multivariate data such as clock features, RSSI, LQI, and energy by setting the threshold value, for enhancing its detection capabilities. The steepest gradient function is used to update the weight parameter in order to reduce the false positive rate. This approach minimizes the error rate, resulting in superior classification performance. The experimental results confirm that TSMR-CDNN outperforms the existing methods in terms of various metrics, and demonstrates 5% improvement in attack detection accuracy, 3% enhancement in precision, recall, and F-measure, and 10% reduction in detection time, respectively.
Similar content being viewed by others
Data availability:
N/A
References
Huan, X., Kyeong, S. K., & Zhang, J. (2021). NISA: Node identification and spoofing attack detection based on clock features and radio information for wireless sensor networks. IEEE Transactions on Communications, 69(7), 4691–4703.
Gowdhaman, V., & Dhanapal, R. (2021). An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing, 26, 1–9.
Bilal, A., Hasany, S. M. N., & Pitafi, A. H. (2022). Effective modelling of sinkhole detection algorithm for edge-based Internet of Things (IoT) sensing devices. IET Communications, 16(8), 845–855.
Babaeer, Huda A., & Al-Ahmadi, Saad A. (2020). Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access, 8, 92098–92109.
Sejaphala, L. C., & Velempini, M. (2020). The design of a defense mechanism to mitigate sinkhole attack in software-defined wireless sensor cognitive radio networks. Wireless Personal Communications, 113, 977–993.
An, G. H., & Cho, T. H. (2022). Improving Sinkhole Attack Detection Rate through Knowledge-Based Specification Rule for a Sinkhole Attack Intrusion Detection Technique of IoT. International Journal of Computer Networks and Applications, 9, 169.
Khosravi, H., & GhasemiGol, M. (2021). A mobile agent-based method to counter sinkhole attacks in wireless sensor networks. Jordanian Journal of Computers and Information Technology, 7(4), 1.
Hasan, B., Alani, S., & Saad, M. A. (2021). Secured node detection technique based on artificial neural network for wireless sensor network. International Journal of Electrical & Computer Engineering (2088–8708), 11(1), 1.
Pundir, S., et al. (2020). Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment. Sensors, 20(5), 1300.
Prathapchandran, K., & Janani, T. (2021). A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest-RFTRUST. Computer Networks, 198, 108413.
Mondal, K., et al. (2022). Detecting sinkhole attacks in IoT-based wireless sensor networks using distance from base station. International Journal of Information System Modeling and Design (IJISMD), 13(6), 1–18.
Gite, P., et al. (2023). ML based intrusion detection scheme for various types of attacks in a WSN using C45 and CART classifiers. Materials Today Proceedings, 80, 3769–3776.
Khedr, A. M., et al. (2020). A novel association rule-based data mining approach for internet of things based wireless sensor networks. IEEE Access, 8, 151574–151588.
Salim, A., et al. (2020). A secure data gathering scheme based on properties of primes and compressive sensing for IoT-based WSNs. IEEE Sensors Journal, 21(4), 5553–5571.
Salim, A., et al. (2021). Compressive sensing based secure data aggregation scheme for IoT based WSN applications. PloS One, 16(12), e0260634.
Al-Naeem, Mohammed Abdulaziz. (2021). Prediction of re-occurrences of spoofed ACK packets sent to deflate a target wireless sensor network node by DDOS. IEEE Access, 9, 87070–87078.
Marabissi, Dania, Mucchi, Lorenzo, & Stomaci, Andrea. (2022). IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet, 14(2), 61.
Hanif, M., et al. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324.
Alruhaily, Nada M., & Ibrahim, Dina M. (2021). A multi-layer machine learning-based intrusion detection system for wireless sensor networks. International Journal of Advanced Computer Science and Applications, 12(4), 281–288.
Pang, B., et al. (2021). A malicious node detection strategy based on fuzzy trust model and the ABC algorithm in wireless sensor network. IEEE Wireless Communications Letters, 10(8), 1613–1617.
Mousavi, S. K., & Ghaffari, A. (2021). Data cryptography in the Internet of Things using the Artificial Bee Colony algorithm in a smart irrigation system. Journal of Information Security and Applications, 61, 102945.
Mousavi, S. K., et al. (2021). Security of Internet of Things using RC4 and ECC algorithms (case study: smart irrigation systems). Wireless Personal Communications, 116, 1713–1742.
Beheshtiasl, Azam, & Ghaffari, Ali. (2019). Secure and trust-aware routing scheme in wireless sensor networks. Wireless Personal Communications, 107, 1799–1814.
Mohammadi, Payam, & Ghaffari, Ali. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.
Mosavvar, Hadi, & Ghaffari, Ali. (2018). Detecting faulty nodes in wireless sensor networks using Harmony Search Algorithm. Wireless Personal Communications, 103, 2927–2945.
Funding
N/A
Author information
Authors and Affiliations
Contributions
To this study, the authors contributed equally. The final manuscript is read and approved by all authors.
Corresponding author
Ethics declarations
Conflicts of interest
Regarding the publishing of this work, the authors affirm that there are no conflicts of interest
Ethical Approval
N/A
Code availability:
N/A
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Khedr, A.M., Raj, P.V.P. & Rani, S.S. Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Wireless Pers Commun 134, 361–382 (2024). https://doi.org/10.1007/s11277-024-10913-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-10913-x