Improvement of Wireless Sensor Networks Against Service Attacks Based on Machine Learning

Improvement of Wireless Sensor Networks Against Service Attacks Based on Machine Learning

© 2022 by IJETT Journal
Volume-70 Issue-5
Year of Publication : 2022
Authors : Gang Xu, Allemar Jhone P. Delima, Ivy Kim D. Machica, Jan Carlo T. Arroyo, Zhengfang He, Weibin Su
DOI :  10.14445/22315381/IJETT-V70I5P209

How to Cite?

Gang Xu, Allemar Jhone P. Delima, Ivy Kim D. Machica, Jan Carlo T. Arroyo, Zhengfang He, Weibin Su, "Improvement of Wireless Sensor Networks Against Service Attacks Based on Machine Learning," International Journal of Engineering Trends and Technology, vol. 70, no. 5, pp. 74-79, 2022. Crossref,

With the rapid development of sensor technology, wireless sensor networks (WSNs) composed of a large number of low-cost, high-performance and plug and play sensor nodes have occupied more and more application scenarios in society, such as medical and health, environmental monitoring, business activities, and national defense security. However, a WSN is a distributed network exposed in an open environment. Each node is independent of the other, and the lack of a central node and monitoring node makes it vulnerable to malicious attacks, and it is difficult to prevent. Denial of Service (DoS) attack is one of them. Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) algorithms prevent network attacks, but these methods have specific disadvantages such as low quality, complex time, and data loss. This paper proposes a method using Random Support Vector Regression (RSVC) to improve the quality of preventing distributed denial of service (DDoS) attacks in WSN. It provides the results of various simulation scenarios and compares the corresponding data. The research on DDoS prevention is very helpful in understanding the anti-attack performance of wireless sensor network nodes. The impact of DoS attacks on wireless sensor networks` performance is considered the key research of these problems.

Machine learning, random support vector regression (RSVR), support vector machine (SVM), wireless sensor network (WSN).

[1] D. Kim and S. An, PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks, in IEEE Sensors Journal, 16(8) (2016) 2217-2218. doi: 10.1109/JSEN.2016.2519539.
[2] J. Wu, K. Ota, M. Dong, and C. Li, A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities, in IEEE Access, 4 (2016) 416-424. doi: 10.1109/ACCESS.2016.2517321.
[3] L. Shi, Q. Liu, J. Shao, and Y. Cheng, Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks, in IEEE Control Systems Letters, 5(2) (2021) 493-498. doi: 10.1109/LCSYS.2020.3003789.
[4] Ghildiyal S, Mishra A K, Gupta A, et al. Analysis of denial of service (dos) attacks in wireless sensor networks[J]. IJRET: International Journal of Research in Engineering and Technology, 3 (2014) 2319-1163.
[5] Ahmad R, Wazirali R, Bsoul Q, et al. Feature-selection and mutual-clustering approaches to improve dos detection and maintain wsns’ lifetime[J]. Sensors, 21(14) (2021) 4821.
[6] Premkumar M, Sundararajan T V P. DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks[J]. Microprocessors and Microsystems, 79 (2020) 103278.
[7] Al-Issa A I, Al-Akhras M, ALsahli M S, et al. Using machine learning to detect DoS attacks in wireless sensor networks[C]//2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT). IEEE, (2019) 107-112.
[8] Y. Kirsal Ever, Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks, in IEEE Systems Journal, 13(1) (2019) 456-467.doi: 10.1109/JSYST.2018.2866067.
[9] C. Pu and S. Lim, A Lightweight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation, in IEEE Systems Journal, 12(1) (2018) 834-842. doi: 10.1109/JSYST.2016.2535730.
[10] C. Hongsong, M. Caixia, F. Zhongchuan, and C. Lee, Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network, in IET Information Security, 14(4) (2020) 452-458. doi: 10.1049/iet-ifs.2018.5512.
[11] H. Xie, Z. Yan, Z. Yao, and M. Atiquzzaman, Data Collection for Security Measurement in Wireless Sensor Networks: A Survey, in IEEE Internet of Things Journal, 6(2) (2019) 2205-2224. doi: 10.1109/JIOT.2018.2883403.
[12] O. A. Osanaiye, A. S. Alfa and G. P. Hancke, Denial of Service Defence for Resource Availability in Wireless Sensor Networks, in IEEE Access, 6 (2018) 6975-7004. doi: 10.1109/ACCESS.2018.2793841.
[13] H. Chen, C. Meng, Z. Shan, Z. Fu, and B. K. Bhargava, A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation, in IEEE Access, 7 (2019) 32853-32866. doi: 10.1109/ACCESS.2019.2903816.
[14] A. Tsiota, D. Xenakis, N. Passas and L. Merakos, on Jamming and Black Hole Attacks in Heterogeneous Wireless Networks, in IEEE Transactions on Vehicular Technology, 68(11) (2019) 10761-10774. doi: 10.1109/TVT.2019.2938405.
[15] C. Lyu, X. Zhang, Z. Liu, and C. Chi, Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks, in IEEE Access, 7 (2019) 31068-31082. doi: 10.1109/ACCESS.2019.2902843.
[16] Dr.G.Kavithaa, M.Prithivi Raj, 2019, Dynamic Signal Driving Strategy Based High Speed and Low Powered Dual Edge Triggered Flip Flop Design Used Memory Applications, in Microprocessors and Microsystems, Elsevier, 71 (2019) . Https://Doi.Org/10.1016/J.Micpro.2019.102879.
[17] J. Padmanabhan and V. Manickavasagam, Scalable and Distributed Detection Analysis on Wormhole Links in Wireless Sensor Networks For Networked Systems, in IEEE Access, 6 (2018) 1753-1763. Doi: 10.1109/ACCESS.2017.2780188.
[18] H. Zhang, P. Cheng, L. Shi, and J. Chen, Optimal Dos Attack Scheduling in Wireless Networked Control System, in IEEE Transactions on Control Systems Technology, 24(3) (2016) 843-852.Doi: 10.1109/TCST.2015.2462741.
[19] R. Huang, L. Ma, G. Zhai, J. He, X. Chu, and H. Yan, Resilient Routing Mechanism For Wireless Sensor Networks With Deep Learning Link Reliability Prediction, in IEEE Access, 8 (2020) 64857-64872. Doi: 10.1109/ACCESS.2020.2984593.
[20] F. Afianti, Wirawan, and T. Suryani, Lightweight and Dos Resistant Multiuser Authentication in Wireless Sensor Networks For Smart Grid Environments, in IEEE Access, 7 (2019) 67107-67122. Doi: 10.1109/ACCESS.2019.2918199.
[21] A.Sangeetha, Dr.M.Chandrasekaran, Dr.G.Kavithaa, 2020, Time Situate Recurrence Estimation Technique For Efficient Data Collection in War Field Sensor Network, in Microprocessors and Microsystems, Elsevier, 73 (2020). Https://Doi.Org/10.1016/J.Micpro.2020.102988.
[22] Yu, D., Kang, J., & Dong, J., Service Attack Improvement in Wireless Sensor Network Based on Machine Learning. Microprocessors and Microsystems, 80 (2021) 103637.
[23] Kavousi-Fard A, Su W, Jin T. A Machine-Learning-Based Cyber-Attack Detection Model For Wireless Sensor Networks in Microgrids[J]. IEEE Transactions on Industrial Informatics, 17(1) (2020) 650-658.
[24] Khan ZA, Samad A. A Study of Machine Learning in Wireless Sensor Networks [J]. Int. J. Comput. Netw. Appl, 4(4) (2017) 105-112.
[25] Khattab A, Youssry N. Machine Learning For Iot Systems[J]. Internet of Things (Iot), (2020) 105-127.
[26] Mamdouh M, Elrukhsi M A I, Khattab A. Securing The Internet of Things and Wireless Sensor Networks Via Machine Learning: A Survey[C]//2018 International Conference on Computer and Applications (ICCA). IEEE, (2018) 215-218.
[27] G Martín A, Fernández-Isabel A, Martín De Diego I, Et Al. A Survey For User Behavior Analysis Based on Machine Learning Techniques: Current Models and Applications[J]. Applied Intelligence, 51(8) (2021) 6029-6055.
[28] Singh G, Khare N. A Survey of Intrusion Detection From The Perspective of Intrusion Datasets and Machine Learning Techniques[J]. International Journal of Computers and Applications, (2021) 1-11.
[29] Alloghani M, Al-Jumeily D, Hussain A, Et Al. Implementation of Machine Learning and Data Mining to Improve Cybersecurity and Limit Vulnerabilities to Cyber Attacks[M]//Nature-Inspired Computation in Data Mining and Machine Learning. Springer, Cham, (2020) 47-76.
[30] Ahmad R, Wazirali R, Bsoul Q, Et Al. Feature-Selection and Mutual-Clustering Approaches to Improve Dos Detection and Maintain Wsns’ Lifetime[J]. Sensors, 21(14) (2021) 4821