Volume 20 No 9 (2022)
Download PDF
Intrusion Detection System based on Energy Efficient Dynamic Clustering in a Heterogeneous Environment of Wireless Sensor Networks (WSNs)
Dr. Rajkumar K. Chougale, Ranjeet S. Mithari, Amit A. Desai, Avadhut R. Jadhav, Sarita S. Shinde, Gayatri S. Ghorpade
Abstract
Wireless sensor networks (WSNs) has widely used in the practical-world applications, including the
identification of the military targets, the monitoring of forest fires, the detection of medical and/or
scientific targets, and, most importantly, in our everyday lives at home. However, because WSNs use
broadcast transmission as their communication method and therefore lacks tamper resistance,
adversaries can easily compromise WSNs. As a result, a hacker has the ability to listen in on all
communication, replay past texts, insert suspensive data groups, and the compromised nodes. The two
main security vulnerabilities that affect sensor nodes most frequently are the node and authentication
of node compromise. This study proposes a heterogeneous structure for WSN intrusion detection and
node capture. Using a cutting-edge method that combines a signature- based and anomaly-oriented
methods through the neural network of multi-layer perceptron (MLP) classification through the
clustering context, this framework effectively finds the recorded nodes. Additionally, the suggested
architecture is effective at a very reasonable level of computation and cost of communication, it could
provide a security barrier for actual application of WSN.
Keywords
WSN, intrusion detection, multi-layer perceptron, wireless sensor networks, heterogeneous
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.