Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

A system that leverages blockchain technology to protect network data and provide tamper-proof administration, privacy, and intrusion detection for sensor networks. This blockchain technology takes advantage of the decentralised and open nature of blockchain technology to address the issues of security risks and data privacy concerns in sensor networks. This research put out a cutting-edge method for sensor network intrusion detection and mitigation combining deep reinforcement learning (DRL) and blockchain technology. There are several stages to the suggested method for wireless sensor network intrusion detection. First, using data cleaning and transformation techniques, the datasets (NSL-KDD, CSE-CIC-IDS2018) are gathered and pre-processed. For the intrusion detection task, pertinent characteristics are chosen, including statistical features, protocol-based features, higher-order statistical features (HOS), and Pearson Correlation Based Principal Component Analysis (PC-PCA). To prevent unauthorised access, the best features are encrypted with the latest AES. Following storage in the blockchain network, the encrypted data is guaranteed for integrity, immutability, and transparency. The chosen ideal features are input to the multi-layer perceptron’s (MLP) recurrent neural network (RNN) during the intrusion detection phase. To increase detection accuracy, the weight function of the RNN is adjusted using the Adaptive Spiral Seagull Optimisation (ASSO). The blockchain network takes the appropriate steps to mitigate the attack (BAIT) if an intrusion is discovered. The A* algorithm determines the shortest path for data transmission, and the gateway node uses that path to transfer the encrypted data to the destination node. The destination node receives the encrypted data, decrypts it using the proper decryption method, and then processes it for various applications. Python is used to implement the suggested model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Fig. 2
Fig. 3
Fig. 4
Algorithm 3
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Data links are available in References [1] and [2].

References

  1. Canadian Institute of cybersecurity, university of new brunswick, ISCX dataset https://www.unb.ca/cic/datasets/nsl.html (Accessed on 09 May 2023)

  2. Canadian Institute of cybersecurity, university of new brunswick, IDS dataset https://www.unb.ca/cic/datasets/ids-2018.html (Accessed on 09 May 2023)

  3. Khan MA, Kim J. Toward developing efficient conv-AE-based intrusion detection system using heterogeneous dataset. Electronics. 2020;9:1771. https://doi.org/10.3390/electronics9111771.

    Article  Google Scholar 

  4. Al-Daweri MS, Zainol Ariffin KA, Abdullah S, Md. Senan MFE. An analysis of the KDD99 and UNSW-NB15 datasets for the intrusion detection system. Symmetry. 2020;12:1666. https://doi.org/10.3390/sym12101666.

    Article  Google Scholar 

  5. Kumar R, Kumar P, Tripathi R, Gupta GP, Garg S, Hassan MM. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J Parallel Distrib Comput. 2022;164:55–68.

    Article  Google Scholar 

  6. Banerjee M, Lee J, Choo KKR. A blockchain future for internet of things security: a position paper. Digital Commun Netw. 2018;4(3):149–60.

    Article  Google Scholar 

  7. Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, Kavianpour S, Idris NB. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics. 2020;9(7):1120.

    Article  Google Scholar 

  8. Mubarakali A. An efficient authentication scheme using blockchain technology for wireless sensor networks. Wirel Person Commun. 2021. https://doi.org/10.1007/s11277-021-08212-w.

    Article  Google Scholar 

  9. Khalaf OI, Abdulsahib GM. Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Netw Appl. 2021;14:2858–73.

    Article  Google Scholar 

  10. Li W, Wang Y, Li J, Au MH. Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int J Inf Secur. 2021;20:127–39.

    Article  Google Scholar 

  11. Yang J, He S, Xu Y, Chen L, Ren J. A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors. 2019;19(4):970.

    Article  Google Scholar 

  12. Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F. A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput Netw. 2021;196: 108217.

    Article  Google Scholar 

  13. Rathore S, Kwon BW, Park JH. BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network. J Netw Comput Appl. 2019;143:167–77.

    Article  Google Scholar 

  14. He D, Chan S, Ni X, Guizani M. Software-defined-networking-enabled traffic anomaly detection and mitigation. IEEE Internet Things J. 2017;4(6):1890–8. https://doi.org/10.1109/JIOT.2017.2694702.

    Article  Google Scholar 

  15. Rahman A, Islam MJ, Montieri A, Nasir MK, Reza MM, Band SS, Pescape A, Hasan M, Sookhak M, Mosavi A. Smartblock-sdn: an optimized blockchain-sdn framework for resource management in IoT. IEEE Access. 2021;9:28361–76.

    Article  Google Scholar 

  16. Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P. Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor. 2019;21(3):2671–701. https://doi.org/10.1109/COMST.2019.2896380.

    Article  Google Scholar 

  17. Cao S, Dang S, Zhang Y, Wang W, Cheng N. A blockchain-based access control and intrusion detection framework for satellite communication systems. Comput Commun. 2021;172:216–25.

    Article  Google Scholar 

  18. Ferrag MA, Maglaras L. DeepCoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans Eng Manage. 2019;67(4):1285–97.

    Article  Google Scholar 

  19. Goyat R, Kumar G, Rai MK, Saha R, Thomas R, Kim TH. Blockchain powered secure range-free localization in wireless sensor networks. Arab J Sci Eng. 2020;45:6139–55.

    Article  Google Scholar 

  20. Sun Z, Xu Y, Liang G, Zhou Z. An intrusion detection model for wireless sensor networks with an improved V-detector algorithm. IEEE Sens J. 2018;18(5):1971–84. https://doi.org/10.1109/JSEN.2017.2787997.

    Article  Google Scholar 

  21. Qu H, Qiu Z, Tang X, Xiang M, Wang P. Incorporating unsupervised learning into intrusion detection for wireless sensor networks with structural co-evolvability. Appl Soft Comput. 2018;71:939–51.

    Article  Google Scholar 

  22. Safaldin M, Otair M, Abualigah L. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J Ambient Intell Humaniz Comput. 2021;12:1559–76.

    Article  Google Scholar 

  23. Jin X, Liang J, Tong W, Lu L, Li Z. Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput Electr Eng. 2017;59:262–73.

    Article  Google Scholar 

  24. Miranda C, Kaddoum G, Bou-Harb E, Garg S, Kaur K. A collaborative security framework for software-defined wireless sensor networks. IEEE Trans Inf Forensics Secur. 2020;15:2602–15.

    Article  Google Scholar 

  25. Wang J, Jiang S, Fapojuwo AO. A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors. 2017;17(6):1227.

    Article  Google Scholar 

  26. Han L, Zhou M, Jia W, Dalil Z, Xu X. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf Sci. 2019;476:491–504.

    Article  Google Scholar 

  27. Butun I, Ra IH, Sankar R. An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks. Sensors. 2015;15(11):28960–78.

    Article  Google Scholar 

  28. Alqahtani M, Gumaei A, Mathkour H, Ismail MMB. A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors. 2019;19(20):4383.

    Article  Google Scholar 

  29. Almomani I, Alromi A. Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks. Sensors. 2020;20(5):1375.

    Article  Google Scholar 

  30. Rajasoundaran S, Kumar SS, Selvi M, Ganapathy S, Rakesh R, Kannan A. Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wireless Netw. 2021;27(7):4513–34.

    Article  Google Scholar 

  31. Li W, Wang Y, Li J. Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks. J Syst Architect. 2022;127: 102510.

    Article  Google Scholar 

  32. Sundararajan RK, Arumugam U. Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. J Sens. 2015. https://doi.org/10.1155/2015/203814.

    Article  Google Scholar 

  33. Mbarek B, Ge M, Pitner T. An adaptive anti-jamming system in HyperLedger-based wireless sensor networks. Wireless Netw. 2022;28(2):691–703.

    Article  Google Scholar 

  34. Babu ES, SrinivasaRao BKN, Nayak SR, Verma A, Alqahtani F, Tolba A, Mukherjee A. Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks. Comput Electr Eng. 2022;103: 108287.

    Article  Google Scholar 

  35. Mansour RF. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep. 2022;12:12937. https://doi.org/10.1038/s41598-022-17043-z.

    Article  Google Scholar 

  36. Yin C, Zhu Y, Fei J, He X. A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access. 2017;5:21954–61. https://doi.org/10.1109/ACCESS.2017.2762418.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swathi Darla.

Ethics declarations

Conflict of Interest

The author declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advances in Computational Approaches for Artificial Intelligence, Image Processing, IoT and Cloud Applications” guest edited by Bhanu Prakash K N and M. Shivakumar.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Darla, S., Naveena, C. Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network. SN COMPUT. SCI. 5, 394 (2024). https://doi.org/10.1007/s42979-024-02725-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02725-4

Keywords