Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security
Abstract
:1. Introduction
1.1. Research Contribution
- (1)
- An Emphatic Farmland Fertility Integrated Deep Perceptron Network (EFDPN)-based cyber-physical system was developed for protecting WSN-IoT networks;
- (2)
- By using the Farmland Fertility Feature Selection (F3S) algorithm, the processes of incursion identification and classification are streamlined, with reduced computing complexity;
- (3)
- A Deep Perceptron Network (DPN) classification technique was used to accurately classify intrusion types, yielding great performance outcomes;
- (4)
- A Tunicate Swarm Optimization (TSO) model was used to estimate the sigmoid transformation function for better classification;
- (5)
- Using well-known cyber-attack datasets, the results of the proposed EFDPN model were validated and contrasted.
1.2. Paper Organization
2. Related Works
- Low performance in various models;
- Excessive memory use during classification;
- High curse of dimensionality;
- Inability to handle massive datasets.
3. Proposed Methodology
- Cyber-dataset collection;
- Preprocessing and feature extraction;
- Farmland Fertility Feature Selection (F3S);
- Deep Perceptron Network (DPN) classification;
- Tunicate Swarm Optimization (TSO) for sigmoid transformation function estimation.
3.1. Farmland Fertility Feature Selection (F3S)
Algorithm 1: Farmland Fertility Feature Selection (F3S) |
Step 1: → for each section of land, as shown in Equation (1); Step 2: → of each portion of the farm using Equation (2); Step 3: → using Equation (3); Step 4: → ) memory updation, where the best solutions in each portion are stored in the local memory using Equations (4) and (5); Step 5: → Change the quality of soil in each portion of the farm, which is determined with global memory solutions in the farm’s worst section, as shown in Equations (6) and (7); Step 6: → , providing the feasible solutions in each section. Step 7: → Improve the quality of solutions, as depicted in Equation (8), for obtaining the optimized set of features . |
3.2. Deep Perceptron Network (DPN)
Algorithm 2: Deep Perceptron Network (DPN) |
; ; Procedure: using Equation (9); Step 2: → as shown in Equation (10);//Tunicate Swarm Optimization; Step 3: Compute the posterior probability of class, as ; Step 4: → as shown in Equation (11); Step 5: → The training process is carried out with the optimized cost function as represented in Equation (12); Step 6: → The classified output is predicted as shown in the form of Equations (13) and (14); |
3.3. Tunicate Swarm Optimization (TSO)
Algorithm 3: Tunicate Swarm Algorithm (TSO) |
; Output: Optimal Value ; Procedure: and the maximum number of iterations are initialized as represented in Equation (15) to (18); Step 2: → After successfully avoiding a dispute with their neighbors, the search agents are directed towards the best neighbors, as shown in Equation (19); Step 3: → , as shown in Equation (20); Step 4: → using Equation (21); Step 5: → Obtain the optimal value as the output; |
4. Experimental Results
4.1. Experimental Setup
4.2. Performance Metrics
4.3. Results Analysis
5. Discussion
5.1. Advantages of EFDPN Model
- (1)
- The model can precisely identify different types of incursions by combining F3S and DPN, reducing false positives;
- (2)
- The F3S method makes it easier to extract pertinent information, improving the model’s capacity to pinpoint threats with greater accuracy while requiring less computational effort;
- (3)
- By including tunicate swarm optimization (TSO), the sigmoid transformation function can be adjusted, improving the model’s ability to detect intrusions;
- (4)
- Thanks to better feature selection and decreased dimensionality, the EFDPN model efficiently decreases training time, boosting efficiency without compromising the detection rate;
- (5)
- The architecture of the EFDPN model allows for scalable deployment, making it adaptable to various network sizes and complexities;
- (6)
- The model is capable of identifying and mitigating a wide range of attack categories, including brute force, botnet, and web attacks, thereby providing a robust defense mechanism;
- (7)
- The model’s compatibility with established benchmark datasets (UNSW-NB 15 and NSL-KDD) showcases its readiness for real-world applications and further testing;
- (8)
- Given its feature set and capabilities, the EFDPN model has substantial potential for implementation in real-time environments, offering a timely response to security breaches;
- (9)
- The model is designed to minimize the usage of resources, such as memory, through intelligent design choices in the classification and feature selection phases, which contribute to overall system efficiency.
5.2. Future Works
- (1)
- Conduct pilot studies to assess the model’s adaptability and performance in real-time environments, with a focus on scaling the model to accommodate larger and more complex network infrastructures;
- (2)
- Further refine the F3S and TSO algorithms to enhance computational efficiency and accuracy, possibly integrating it with other optimization techniques to forge a more robust system;
- (3)
- Continually update and adapt the model to identify and counteract emerging and sophisticated attack vectors, fostering a dynamic security framework that evolves with the threat landscape;
- (4)
- Develop multi-layered security protocols within the EFDPN framework, which can work in synergy with existing security infrastructures, to provide a comprehensive security solution;
- (5)
- Explore the potential applications of the EFDPN model in other domains, such as industrial control systems and healthcare networks, tailoring the model to meet the unique security requirements of these sectors;
- (6)
- Engage with the user and broader community to gather feedback and insights, fostering a collaborative approach to further refine and enhance the model;
- (7)
- Develop educational initiatives and training programs to foster awareness and skill development, equipping individuals and organizations with the tools to effectively deploy and manage EFDPN-based security systems.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hasan, M.Z.; Hanapi, Z.M. Efficient and Secured Mechanisms for Data Link in IoT WSNs: A Literature Review. Electronics 2023, 12, 458. [Google Scholar] [CrossRef]
- Begum, B.A.; Nandury, S.V. Data Aggregation Protocols for WSN and IoT Applications–A Comprehensive Survey. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 651–681. [Google Scholar] [CrossRef]
- Sudha, I.; Mustafa, M.A.; Suguna, R.; Karupusamy, S.; Ammisetty, V.; Shavkatovich, S.N.; Ramalingam, M.; Kanani, P. Pulse jamming attack detection using swarm intelligence in wireless sensor networks. Optik 2023, 272, 170251. [Google Scholar] [CrossRef]
- Ramana, K.; Revathi, A.; Gayathri, A.; Jhaveri, R.H.; Narayana, C.L.; Kumar, B.N. WOGRU-IDS—An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks. Comput. Commun. 2022, 196, 195–206. [Google Scholar] [CrossRef]
- Biswas, P.; Samanta, T.; Sanyal, J. Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network. Multimed. Tools Appl. 2023, 82, 14123–14134. [Google Scholar] [CrossRef]
- Reddy, G.; Kadiyala, S.; Potluri, C.S.; Saravanan, P.S.; Athisha, G.; Mukunthan, M.; Sujaritha, M. An Intrusion Detection Using Machine Learning Algorithm Multi-Layer Perceptron (MlP): A Classification Enhancement in Wireless Sensor Network (WSN). Int. J. Recent Innov. Trends Comput. Commun. 2022, 10, 139–145. [Google Scholar] [CrossRef]
- Choudhary, V.; Srivastava, A.; Kumar, A.; Taruna, S. Comparative Analysis of Security Issues and Trends in IoT and WSN. SAMRIDDHI J. Phys. Sci. Eng. Technol. 2022, 14, 216–222. [Google Scholar]
- Alwan, M.H.; Hammadi, Y.I.; Mahmood, O.A.; Muthanna, A.; Koucheryavy, A. High Density Sensor Networks Intrusion Detection System for Anomaly Intruders Using the Slime Mould Algorithm. Electronics 2022, 11, 3332. [Google Scholar] [CrossRef]
- Ahmed, S.H.; Rani, S. A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities. Future Gener. Comput. Syst. 2018, 79, 941–951. [Google Scholar] [CrossRef]
- Zrelli, A.; Nakkach, C.; Ezzedine, T. Cyber-Security for IoT Applications based on ANN Algorithm. In Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 19–22 July 2022; pp. 1–5. [Google Scholar]
- Kumar, A.; Agrawal, K.K. Energy-Efficient Resource Allocation and Routing Protocols for IoT-based WSN: A Review. In Proceedings of the 2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bengaluru, India, 27–28 January 2023; pp. 363–369. [Google Scholar]
- Samara, A.M.; Bennis, I.; Abouaissa, A.; Lorenz, P. A survey of outlier detection techniques in IoT: Review and classification. J. Sens. Actuator Netw. 2022, 11, 4. [Google Scholar] [CrossRef]
- Vishnu, V.M. ProSD-edgeIoT: Protected cluster assisted SDWSN for tetrad edge-IoT by collaborative DDoS detection and mitigation. Cyber-Phys. Syst. 2023, 9, 144–173. [Google Scholar]
- Kumar, A.; Dhabliya, D.; Agarwal, P.; Aneja, N.; Dadheech, P.; Jamal, S.S.; Antwi, O.A. Cyber-internet security framework to conquer energy-related attacks on the internet of things with machine learning techniques. Comput. Intell. Neurosci. 2022, 2022, 8803586. [Google Scholar] [CrossRef] [PubMed]
- Sheron, P.F.; Sridhar, K.; Baskar, S.; Shakeel, P.M. A decentralized scalable security framework for end-to-end authentication of future IoT communication. Trans. Emerg. Telecommun. Technol. 2019, 31, e3815a. [Google Scholar] [CrossRef]
- VenkataRao, S.; Ananth, V. A Hybrid Optimization Algorithm and Shamir Secret Sharing Based Secure Data Transmission for IoT based WSN. Int. J. Intell. Eng. Syst. 2021, 14, 498–506. [Google Scholar]
- Ismail, S.; Reza, H. Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 283–289. [Google Scholar]
- Subburayalu, G.; Duraivelu, H.; Raveendran, A.P.; Arunachalam, R.; Kongara, D.; Thangavel, C. Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J. Appl. Secur. Res. 2021, 18, 402–420. [Google Scholar] [CrossRef]
- Islam, M.S.; Dey, G.K. Precision agriculture: Renewable energy based smart crop field monitoring and management system using WSN via IoT. In Proceedings of the 2019 International Conference on Sustainable Technologies for Industry 4.0 (STI), Dhaka, Bangladesh, 24–25 December 2019; pp. 1–6. [Google Scholar]
- Tama, B.A.; Lim, S. Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation. Comput. Sci. Rev. 2021, 39, 100357. [Google Scholar] [CrossRef]
- Zrelli, A.; Ezzedine, T. A new approach of WSN deployment, K-coverage and connectivity in border area. Wirel. Pers. Commun. 2021, 121, 3365–3381. [Google Scholar] [CrossRef]
- Iwendi, C.; Maddikunta, P.K.R.; Gadekallu, T.R.; Lakshmanna, K.; Bashir, A.K.; Piran, J. A metaheuristic optimization approach for energy efficiency in the IoT networks. Softw. Pract. Exp. 2021, 51, 2558–2571. [Google Scholar] [CrossRef]
- Rajeswari, A.; Kulothungan, K.; Ganapathy, S.; Kannan, A. Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 2021, 40, 9197–9211. [Google Scholar] [CrossRef]
- Pundir, S.; Wazid, M.; Singh, D.P.; Das, A.K.; Rodrigues, J.J.; Park, Y. Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access 2019, 8, 3343–3363. [Google Scholar] [CrossRef]
- Baraneetharan, E. Role of machine learning algorithms intrusion detection in WSNs: A survey. J. Inf. Technol. Digit. World 2020, 2, 161–173. [Google Scholar] [CrossRef]
- Jiang, S.; Zhao, J.; Xu, X. SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 2020, 8, 169548–169558. [Google Scholar] [CrossRef]
- Amouri, A.; Alaparthy, V.T.; Morgera, S.D. A machine learning based intrusion detection system for mobile Internet of Things. Sensors 2020, 20, 461. [Google Scholar] [CrossRef] [PubMed]
- Gopalakrishnan, S. Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits Syst. 2016, 7, 748–758. [Google Scholar] [CrossRef]
- Singh, G.; Khare, N. A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int. J. Comput. Appl. 2022, 44, 659–669. [Google Scholar] [CrossRef]
- Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics 2020, 9, 800. [Google Scholar] [CrossRef]
- Safaldin, M.; Otair, M.; Abualigah, L. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 1559–1576. [Google Scholar] [CrossRef]
- Hemanand, D.; Reddy, G.V.; Babu, S.S.; Balmuri, K.R.; Chitra, T.; Gopalakrishnan, S. An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). Int. J. Intell. Syst. Appl. Eng. 2022, 10, 285–293. [Google Scholar]
- Jayanayudu, D.; Sudhir, A.C. Shuffled Frog Leap and Ant Lion Optimization for Intrusion Detection in IoT-Based WSN. In Proceedings of Fourth International Conference on Computer and Communication Technologies; Springer: Singapore, 2023; pp. 17–26. [Google Scholar]
- Hussain, M.Z.; Hanapi, Z.M. Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics 2023, 12, 482. [Google Scholar] [CrossRef]
- Al Sawafi, Y.; Touzene, A.; Hedjam, R. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks. J. Sens. Actuator Netw. 2023, 12, 21. [Google Scholar] [CrossRef]
- Maheswari, M.; Karthika, R. A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks. Intell. Autom. Soft Comput. 2022, 33, 365–3822022. [Google Scholar] [CrossRef]
- Maldonado, J.; Riff, M.C.; Neveu, B. A review of recent approaches on wrapper feature selection for intrusion detection. Expert Syst. Appl. 2022, 198, 116822. [Google Scholar] [CrossRef]
- De Souza, C.A.; Westphall, C.B.; Machado, R.B. Two-step ensemble approach for intrusion detection and identification in IoT and fog computing environments. Comput. Electr. Eng. 2022, 98, 107694. [Google Scholar] [CrossRef]
- Manimurugan, S.; Al-Mutairi, S.; Aborokbah, M.M.; Chilamkurti, N.; Ganesan, S.; Patan, R. Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE Access 2020, 8, 77396–77404. [Google Scholar] [CrossRef]
- Chaganti, R.; Mourade, A.; Ravi, V.; Vemprala, N.; Dua, A.; Bhushan, B. A Particle Swarm Optimization and Deep Learning Approach for Intrusion Detection System in Internet of Medical Things. Sustainability 2022, 14, 12828. [Google Scholar] [CrossRef]
- Saheed, Y.K.; Arowolo, M.O. Efficient cyber attack detection on the internet of medical things-smart environment based on deep recurrent neural network and machine learning algorithms. IEEE Access 2021, 9, 161546–161554. [Google Scholar] [CrossRef]
- Cui, J.; Zong, L.; Xie, J.; Tang, M. A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data. Appl. Intell. 2023, 53, 272–288. [Google Scholar] [CrossRef]
Reference | Methodology | Results | Limitations |
---|---|---|---|
Pundir et al. [24] | Investigated security challenges and requirements in WSN-IoT networks. | Identification of potential threats like eavesdropping, DoS, etc. | Low performance in various models. |
Baraneetharan et al. [25] | Explored machine learning algorithms (classification, regression, clustering) for intrusion detection. | Comparative analysis based on prediction accuracy, energy, etc. | High false positive rate; increased time consumption for attack detection. |
Jiang et al. [26] | Implemented a lightweight GBM-based cyber-physical system. | Enhanced smart-networking environment. | Low performance in various models. |
Amouri et al. [27] | Cross-layered IDS framework using a linear regression model. | Detection of malicious activities like blackholes, DDoS, etc. | High false positive rate; increased time consumption for attack detection. |
Singh et al. [29] | Comprehensive review of machine-learning-based intrusion detection approaches. | Highlighted strengths and weaknesses of various ML algorithms. | Low performance in various models; insufficient memory use during classification. |
Damasevicius et al. [30] | Utilized LITNET-2020 dataset for classifying events; suggested other datasets. | Identification of normal and intrusive events in WSN-IoT systems. | Inability to handle massive datasets. |
Safaldin et al. [31] | Binary grey-wolf optimization with SVM for intrusion detection, considering feature set reduction. | SVM with reduced feature set achieved efficient intrusion identification. | High curse of dimensionality. |
Krishnan et al. [32] | Anomalous intrusion detection and prevention protocol for WSN-IoT. | Increased network reliability. | Excessive memory use during classification. |
Jayanayudu et al. [33] | Hybrid SFL and ALO algorithms for an IDS framework; authors focused on energy efficiency with a greedy routing strategy. | Enhanced network efficiency; defence against fraudulent attacks. | Low performance in various models. |
Attacking Classes | No of Samples |
---|---|
IS-1 | |
Normal | 77,054 |
DoS | 53,385 |
Probe | 14,077 |
R2L | 3749 |
U2R | 252 |
UNSW-NB 15 | |
Normal | 2,218,761 |
Generic | 215,481 |
Exploits | 44,525 |
Fuzzers | 24,246 |
DoS | 16,353 |
Reconnaissance | 13,987 |
Analysis | 2677 |
Backdoor | 2329 |
Shellcode | 1511 |
Worms | 174 |
Methods | FAR | Accuracy | DR | No of Features | Time |
---|---|---|---|---|---|
Multi-agent IDS | L | L | VH | NA | NA |
ARIMA-IDS | L | L | VH | NA | H |
Lightweight IDS | VL | H | VH | NA | NA |
Sensor IDS | L | H | VH | NA | NA |
PSO-IDS | H | H | L | VH | NA |
Evolutionary NN—MO IDS | VH | VH | VH | L | NA |
GWO-SVM | VL | H | H | VL | VL |
Proposed | VL | VH | VH | VL | VL |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Krishnasamy, S.; Alotaibi, M.B.; Alehaideb, L.I.; Abbas, Q. Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security. Sensors 2023, 23, 9294. https://doi.org/10.3390/s23229294
Krishnasamy S, Alotaibi MB, Alehaideb LI, Abbas Q. Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security. Sensors. 2023; 23(22):9294. https://doi.org/10.3390/s23229294
Chicago/Turabian StyleKrishnasamy, Sundaramoorthy, Mutlaq B. Alotaibi, Lolwah I. Alehaideb, and Qaisar Abbas. 2023. "Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security" Sensors 23, no. 22: 9294. https://doi.org/10.3390/s23229294
APA StyleKrishnasamy, S., Alotaibi, M. B., Alehaideb, L. I., & Abbas, Q. (2023). Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security. Sensors, 23(22), 9294. https://doi.org/10.3390/s23229294