HYBRID OPTIMIZATION INTEGRATED INTRUSION DETECTION SYSTEM IN WSN USING ELMAN NETWORK
Journal Title: International Journal of Data Science and Artificial Intelligence - Year 2024, Vol 2, Issue 02
Abstract
Wireless Sensor Networks (WSNs) increases the usage of integrated systems and areas which attracts the attention of attackers. However, WSNs are vulnerable to different kinds of security threats and attacks. To ensure their security, an effective Intrusion Detection System (IDS) need to be in place to detect these attacks even under these constraints. The traditional IDS are less effective as these malicious attacks are becoming more intelligent, frequent, and complex. To overcome these challenges, this paper proposes a novel Improved Deep Neural Network Integrated Intrusion Detection System in WSN (IIDS-NET) technique has been proposed, which increases the energy efficiency in the WSN network. Initially, an optimal CH is selected via Tom and Jerry optimization algorithm (TJOA) based on the Residual energy and Node Centrality. The proposed scheme makes use of Improved Elman Spike Neural Network (IESNN) technique is implemented to detect the intrusion nodes and to blocks the suspicious or malicious activity in the wireless networks. Finally, the Aquila-Sooty Tern Optimization Algorithm (AQSOA) is used to find the optimal route for sending the data between the sensor nodes and the base stations. The proposed scheme is simulated by using Cloud simulator (CloudSim) and a comparison is made between proposed IIDS-NET and existing approaches such as GWOSVM-IDS, EPK-DNN, FL-SCNN-Bi-LSTM and SG-IDS in terms of detection accuracy, energy consumption, and throughput. The proposed HOPI-NET approach outperforms the existing techniques such as GWOSVM-IDS, EPK-DNN, FL-SCNN-Bi-LSTM and SG-IDS in terms of energy consumption of 120.73%, 198.68%, 193.34%, 187.73%, and 165.88% respectively.
Authors and Affiliations
B. Muthu Kumar, J. Ragaventhiran, V. Neela
DEEP REINFORCEMENT LEARNING BASED REAL TIME VIOLENCE DETECTION
In recent days violence is rampant, and the violence that occurs in public places is considered trembling violence in this study. To avert these anomalous activities, a real-time violence identification model is required...
SEMANTIC FEATURE ENABLED AGGLOMERATIVE CLUSTERING FOR INFORMATION TECHNOLOGY JOB PROFILE ANALYSIS
The maintenance and implementation of computer systems are the core activities of information technology. Database administration and network architecture are also included in information technology. Professionals have a...
CLASSIFICATION OF LIVER CANCER VIA DEEP LEARNING BASED DILATED ATTENTION CONVOLUTIONAL NEURAL NETWORK
Liver cancer occur when normal cells develop aberrant DNA alterations and reproduce uncontrollably. Patients with cirrhosis, hepatitis B or C, or both have an increased risk of developing the progressing stage of cancer....
IOT-ENABLED PROTEIN STRUCTURE CLASSIFICATION VIA CSA-PSO BASED CD4.5 CLASSIFIER
Data mining is a technique for obtaining useful information from vast amounts of information. Big data refers to large amounts of complicated information that is processed, particularly in relation to biological processe...
IOT-CENTRIC DATA PROTECTION USING DEEP LEARNING TECHNIQUE FOR PRESERVING SECURITY AND PRIVACY IN CLOUD
The Internet of Things (IoT) describes a system where interconnected physical objects are connected online. As the collection and sharing of vast amounts of personal data grow, so do concerns over user privacy within IoT...