Reinforcement Learning for Intrusion Detection and Improving Optimal Route by Cuckoo Search in WSN (original) (raw)

Abstract

Wireless Sensor Network (WSN) is a generally hopeful technology for several real-time applications due to its cost-effective, size, and distribution nature. WSN is a collection of sensor nodes spread in a great region such that the required information can be collected. However, sensor nodes are susceptible to attacks, for example, intrusion, hackers, defective hardware starting the physical incident, etc. Therefore, it is compulsory to defend a sensor node from an intrusion. If it brings attacked next, the information transmitted through the sensor may be wrong and lead to incorrect data analysis, leading to unnecessary outcomes. To solve these issues, Reinforcement Learning for Intrusion Detection (RLID) and Improving Optimal Route by Cuckoo Search is proposed. The Reinforcement Learning uses the repeating node classification for detecting the intrusion during the route discovery. Reinforcement learning evaluates the sensor node behaviour by the quality of the link, and it is computed by sensor node packet forward rate and node residual energy. Here, the repeating node classification method classified the intrusion sensor based on node-link quality. As a result, it can improve intrusion detection performance efficiently. Besides, the Cuckoo Search Technique (CST) is used to find the optimal forwarder for transmitting the data from sender to destination. The main objective of this work is to offer optimal routing and communicate the data via normal sensor nodes in WSN. The simulation platform and the obtained results are compared with the baseline protocol to prove the efficiency of our proposed approach.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

References (22)

  1. Sen, S.; Koo, J.; Bagchi, S. (2018). TRIFECTA: security, energy efficiency, and communication capacity comparison for wireless IoT devices. IEEE Internet Computing, 22(1), pp. 74-81.
  2. Sun, W.; Song, X.; Wang, F. (2015). Energy-balanced clustering routing protocol based on task separation in wireless sensor networks. In 2015 8th International Conference on Biomedical Engineering and Informatics (BMEI) pp. 778-782. IEEE.
  3. Albert Alghamdi, T. A. (2018). Secure and energy-efficient path optimization technique in wireless sensor networks using DH method. IEEE Access, 6, 53576-53582.
  4. Meng, W.; Li, W.; Su, C.; Zhou, J.; Lu, R. (2017). Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access, 6, pp.7234-7243.
  5. Patel, N. J.; Jhaveri, R. H. (2015). Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A survey. In 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 468-472. IEEE.
  6. Zhao, D.; Qin, H.; Song, B.; Zhang, Y.; Du, X.; Guizani, M. (2020). A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G. IEEE Transactions on Cognitive Communications and Networking, 6(2), pp. 452-463.
  7. Zavrak, S.; İskefiyeli, M. (2020). Anomaly-based intrusion detection from network flow features using variational autoencoder. IEEE Access, 8, pp. 108346-108358.
  8. Naseer, S.; Saleem, Y.; Khalid, S.; Bashir, M. K.; Han, J.; Iqbal, M. M.; Han, K. (2018). Enhanced network anomaly detection based on deep neural networks. IEEE access, 6, pp. 48231-48246.
  9. Fig. 12. False Negative Ratio of BTMA and RLID
  10. Yildiz, H. U.; Ciftler, B. S.; Tavli, B.; Bicakci, K.; Incebacak, D. (2016). The impact of incomplete secure connectivity on the lifetime of wireless sensor networks. IEEE Systems Journal, 12(1), pp. 1042-1046.
  11. Rajasegarar, S.; Leckie, C.; Bezdek, J. C.; Palaniswami, M. (2010). Centeredhyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Transactions on Information Forensics and Security, 5(3), pp. 518- 533.
  12. Zhu, Y.; Yang, K. (2019). Tripartite active learning for interactive anomaly discovery. IEEE Access, 7, pp. 63195-63203.
  13. Chalmers, E.; Contreras, E. B.; Robertson, B.; Luczak, A.; Gruber, A. (2017). Learning to predict consequences as a method of knowledge transfer in reinforcement learning. IEEE transactions on neural networks and learning systems, 29(6), pp. 2259-2270.
  14. Chen, X.; Li, B.; Proietti, R.; Zhu, Z.; Yoo, S. B. (2019). Self-taught anomaly detection with hybrid unsupervised/supervised machine learning in optical networks. Journal of Lightwave Technology, 37(7), pp. 1742-1749.
  15. Nagaraja, A.; Boregowda, U.; Khatatneh, K.; Vangipuram, R.; Nuvvusetty, R.; Kiran, V. S. (2020). Similarity-Based Feature Transformation for Network Anomaly Detection. IEEE Access, 8, pp. 39184-39196.
  16. Mukherjee, P.; Sen, S. (2011). Comparing reputation schemes for detecting malicious nodes in sensor networks. The Computer Journal, 54(3), pp. 482-489.
  17. Manikandan, S and Kumar, S.B. (2021) Energy Efficient Clustering Algorithm For Mobile Cluster Heads To Enhance The Lifespan Of Wireless Sensor Network, Indian Journal of Computer Science and Engineering, 12(3), pp. 605-617.
  18. Indira, K and Sakthi, U. (2021) An Efficient Anonymous Authentication Scheme to Improve Security And Privacy In SDN Based Wireless Sensor Networks, Indian Journal of Computer Science and Engineering, 11(1),pp.27-35.
  19. Vardhini, K.K and Mahalakshmi, T.S. (2020). Implementation of Swarm Optimized Artificial Neural Network for Network Intruder Detection and Attack Classification, Indian Journal of Computer Science and Engineering, 11(2).
  20. Ravindra, S and Shankaraiah, (2020). MAPSDN-EESC: A Modeling Of Authentication Process For The Software Defined Network Using Encrypted Entity Scheme Cryptography, 11(4).
  21. Das, S.; Barani, S.; Wags S.; Sonavane S.S. (2017) Optimal Clustering And Routing For Wireless Sensor Network Based On Cuckoo Search. International Journal of Advanced Smart Sensor Network Systems, 7(2/3), pp. 1-13.
  22. Masoodi, I.S.; Dar, M.A..; Banday, M.T. (2018) Energy Efficient Routing in WSNs Based on Dynamic Cuckoo Search Algorithm, IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, pp. 2514- 2517.