Main Article Content

Authors

Saziya Tabbassum

Chandra Kumar Jha

Sneha Asopa

Abstract

The research focuses on hierarchical clustering-based intrusion detection using artificial neural networks (ANNs) for secure data transmission in wireless sensor networks (WSNs). WSNs consist of numerous tiny sensor nodes deployed to monitor environmental phenomena. These nodes face significant challenges, including restricted energy, memory space, communication range, and limited capacity for managing energy, storing, transmitting, and processing data. To address these limitations, a machine learning-based approach is proposed to detect intrusions and efficiently utilize energy by properly selecting cluster heads using a secure clustering protocol. The proposed method was implemented and tested using MATLAB software, employing the NSLKDD and UNSW-NB15 datasets for intrusion detection. The results demonstrated promising outcomes in detecting intruders and enhancing network efficiency, achieving a 92% packet delivery ratio (PDR) and 1.82 Mbps throughput. The study concludes that while WSNs are gaining popularity due to their simplicity, flexibility, and scalability, innovative solutions are necessary for efficient energy management and security. Future research should focus on advanced machine learning models, energy harvesting techniques, scalable protocols, real-time data processing, and integration with IoT platforms for broader applications and enhanced functionality.

Downloads

Download data is not yet available.

Article Details

Section

Articles

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102-114.
  2. Al-Karaki, J. N., & Kamal, A. E. (2004). Routing techniques in wireless sensor networks: a survey. IEEE Wireless Communications, 11(6), 6-28.
  3. Chen, D., & Zhang, P. K. (2005). Data-intensive applications, challenges, techniques and technologies: A survey on routing in wireless sensor networks. International Journal of Sensor Networks, 1(1-2), 104-112.
  4. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 41-47).
  5. Hart, J. K., & Martinez, K. (2006). Environmental sensor networks: A revolution in the earth system science? Earth-Science Reviews, 78(3-4), 177-191.
  6. Heinzelman, W. B., Chandrakasan, A., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660-670.
  7. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315.
  8. Lo, B., Wang, Q., & Yang, G. Z. (2005). From research to reality: Wireless body sensor networks for healthcare. Proceedings of the 2005 IEEE EMBS International Conference on Information Technology Applications in Biomedicine (pp. 162-165).
  9. Onat, I., & Miri, A. (2005). An intrusion detection system for wireless sensor networks. In Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, Networking And Communications (Vol. 3, pp. 253-259).
  10. Pantazis, N. A., Nikolidakis, S. A., & Vergados, D. D. (2013). Energy-efficient routing protocols in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(2), 551-591.
  11. Perrig, A., Stankovic, J., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53-57.
  12. Yang, X. (2014). Wireless sensor networks principles and applications. In Handbook of Networks in Power Systems I (pp. 41-77). Springer, Berlin, Heidelberg.
  13. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer Communications, 30(14-15), 2826-2841.
  14. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (pp. 162-175).
  15. Kinney, P. (2003). ZigBee technology: Wireless control that simply works. Communications Design Conference, 2(1), 1-7.
  16. Kulik, J., Heinzelman, W. R., & Balakrishnan, H. (2002). Negotiation-based protocols for disseminating information in wireless sensor networks. Wireless Networks, 8(2-3), 169-185.
  17. Lindsey, S., & Raghavendra, C. S. (2002). PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings, IEEE Aerospace Conference (Vol. 3, pp. 3-1125).
  18. Manjeshwar, A., & Agrawal, D. P. (2001). TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Parallel and Distributed Processing Symposium., Proceedings International (pp. 2009-2015).
  19. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521-534.
  20. Rajasegarar, S., Leckie, C., & Palaniswami, M. (2006). Anomaly detection in wireless sensor networks. IEEE Wireless Communications, 15(4), 34-40.
  21. Sun, B., Osborn, S., & Xu, Y. (2004). Intrusion detection techniques in wireless ad hoc networks. IEEE Wireless Communications, 11(5), 56-63.
  22. Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366-379.
  23. Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (pp. 62-72).