Skip to main content

An Online Model for Detecting Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Machine Intelligence and Computer Science Applications (ICMICSA 2022)

Abstract

The Internet of Things (IoT) has been employed in a variety of critical fields, including healthcare, geriatric surveillance, self-driving vehicles, and energy management. The most prevalent infrastructure for these applications is Wireless Sensor Networks (WSNs). Although WSNs have intriguing characteristics, the security of such networks is a major concern, especially for applications where confidentiality is extremely crucial. In order to set up WSNs securely, any type of intrusion should be identified before attackers potentially harm the network. However, research findings have demonstrated that existing approaches are ineffective, particularly in detecting attacks in real-time, mostly owing to the accumulation of enormous amounts of data through interconnected devices. Within this interpretation, our intention is to construct a robust Intrusion Detection System (IDS) for analyzing real-time network traffic of WSNs using online learning algorithm while taking into account the network’s resource constraints. To achieve this goal, we investigated the use of an online classifier, namely the Hoeffding Adaptive Tree (HAT), along with the selection of relevant attributes to distinguish four kinds of DoS attacks among normal network traffic: the attacks considered are Blackhole, Grayhole, Flooding, and Scheduling attacks. Among the experimental findings, we determined that utilizing the HAT classifier along with the Chi-squared method of feature selection, detection rate percentages were 86.75%, 80.02%, 94.92%, 99.12% and 99.03% respectively for Flooding, Scheduling, Grayhole, Blackhole and normal case attacks. With an overall accuracy of 99.03%. Based on these findings, it is indeed possible to infer that the HAT classifier is extremely beneficial for categorizing attacks, as it has managed to secure a high detection rate despite the existence of many threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kumar, D.P., Amgoth, T., Annavarapu, C.S.R.: Machine learning algorithms for wireless sensor networks: a survey. Inf. Fusion 49, 1–25 (2019)

    Article  Google Scholar 

  2. Kurniabudi, K., et al.: Network anomaly detection research: a survey. Indonesian J. Electrical Eng. Informat. (IJEEI) 7(1), 37–50 (2019)

    Article  Google Scholar 

  3. Gupta, S.K., Sinha, P.: Overview of wireless sensor network: a survey. Telos 3.15\(\upmu \)W, 38mW (2014)

    Google Scholar 

  4. Hasan, S., Hussain, Z., Singh, R.K.: A survey of wireless sensor network. Int. J. of Emerg. Technol. and Adv. Engin 3.3, 487-492 (2013)

    Google Scholar 

  5. Chander, B.: Kumaravelan, One class SVMs outlier detection for wireless sensor networks in harsh environments: analysis. Int. J. Recent Technol. Eng. 7(4), 294–301 (2018)

    Google Scholar 

  6. Ifzarne, S., Hafidi, I., Idrissi, N.: Secure data collection for wireless sensor network. In: Ben Ahmed, M., Mellouli, S., Braganca, L., Anouar Abdelhakim, B., Bernadetta, K.A. (eds.) Emerging Trends in ICT for Sustainable Development. ASTI, pp. 241–248. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-53440-0_26

    Chapter  Google Scholar 

  7. Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. 31(8), 805–822 (1999)

    Article  Google Scholar 

  8. Almomani, I., Al-Kasasbeh, B., Al-Akhras, M.: WSN-DS: a dataset for intrusion detection systems in wireless sensor networks. J. Sensors 2016 (2016)

    Google Scholar 

  9. Park, T., Cho, D., Kim, H.: An effective classification for DoS attacks in wireless sensor networks. In: 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE (2018)

    Google Scholar 

  10. Alqahtani, M., et al.: A genetic-based extreme gradient boosting model for detecting intrusions in wireless sensor networks. Sensors 19.20, 4383 (2019)

    Google Scholar 

  11. Chandre, P.R., Mahalle, P.N., Shinde, G.R.: Deep learning and machine learning techniques for intrusion detection and prevention in wireless sensor networks: comparative study and performance analysis, pp. 95–120. Singapore, Design frameworks for wireless networks. Springer (2020)

    Google Scholar 

  12. Dong, R.-H., Yan, H.-H., Zhang, Q.-Y.: An intrusion detection model for wireless sensor network based on information gain ratio and bagging algorithm. Int. J. Netw. Secur. 22(2), 218–230 (2020)

    Google Scholar 

  13. Ifzarne, S., et al.: Anomaly detection using machine learning techniques in wireless sensor networks. J. Phys.: Conf. Ser. vol. 1743, no. 1. IOP Publishing (2021)

    Google Scholar 

  14. Lohrasbinasab, I., et al.: From statistical-to machine learning-based network traffic prediction. Trans. Emerg. Telecommun. Technol. 33.4, e4394 (2022)

    Google Scholar 

  15. Lobo, J.L., et al.: Spiking neural networks and online learning: an overview and perspectives. Neural Netw. 121, 88–100 (2020)

    Article  Google Scholar 

  16. Gama, J., et al.: A survey on concept drift adaptation. ACM Computing Surveys (CSUR) 46.4, 1--37 (2014)

    Google Scholar 

  17. Hoi, S.C.H., Wang, J., Zhao, P.: Libol: a library for online learning algorithms. J. Mach. Learn. Res. 15.1, 495 (2014)

    Google Scholar 

  18. Losing, V., Hammer, B., Wersing, H.: Incremental on-line learning: a review and comparison of state of the art algorithms. Neurocomputing 275, 1261–1274 (2018)

    Article  Google Scholar 

  19. Tsymbal, Alexey: The problem of concept drift: definitions and related work. Computer Science Department, Trinity College Dublin 106(2), 58 (2004)

    Google Scholar 

  20. Rachburee, N., Punlumjeak, W.: A comparison of feature selection approach between greedy, IG-ratio, Chi-square, and mRMR in educational mining. In: 2015 7th international conference on information technology and electrical engineering (ICITEE). IEEE (2015)

    Google Scholar 

  21. Sreedevi, P., Venkateswarlu, S.: An efficient intra-cluster data aggregation and finding the best sink location in WSN using EEC-MA-PSOGA approach. Int. J. Commun. Syst. 35.8, e5110 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hiba Tabbaa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tabbaa, H., Hafidi, I. (2023). An Online Model for Detecting Attacks in Wireless Sensor Networks. In: Aboutabit, N., Lazaar, M., Hafidi, I. (eds) Advances in Machine Intelligence and Computer Science Applications. ICMICSA 2022. Lecture Notes in Networks and Systems, vol 656. Springer, Cham. https://doi.org/10.1007/978-3-031-29313-9_24

Download citation

Publish with us

Policies and ethics