Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks
Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In...
Gespeichert in:
Veröffentlicht in: | Wireless networks 2024, Vol.30 (1), p.209-231 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 231 |
---|---|
container_issue | 1 |
container_start_page | 209 |
container_title | Wireless networks |
container_volume | 30 |
creator | Rajasoundaran, S. Kumar, S. V. N. Santhosh Selvi, M. Thangaramya, K. Arputharaj, Kannan |
description | Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics. |
doi_str_mv | 10.1007/s11276-023-03470-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2916503251</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2916503251</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIlMIPcLLE2eBHEtvHquIlteLQcrYcZ1NSWie1ExX4elyKxI3TjnZnZjWD0DWjt4xSeRcZ47IglAtCRSYp-ThBI5ZLThTTxWnClHNCqVDn6CLGNaVUCa1HaLcANwTA1le47fpm23xBhRvfhyE2rccV9OD6A4ruDbaA09qv8GyxnJP5ZIq70HjXdBuIuG4DHnwFYW97CHjfBEjriCP4mE4e-n0b3uMlOqvtJsLV7xyj14f75fSJzF4en6eTGXGC6Z4IVQLkMmdFlVc2U7VVmc5kLVVps7zSRc0ybjXUDmqwipfWlTyDLNfKlVpKMUY3R98utLsBYm_W7RB8emm4ZkVOBc9ZYvEjy4U2xgC1SYm2NnwaRs2hWnOs1qRqzU-15iOJxFEUD_FXEP6s_1F9AxWsf4c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2916503251</pqid></control><display><type>article</type><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><source>Springer Nature - Complete Springer Journals</source><creator>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</creator><creatorcontrib>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</creatorcontrib><description>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-023-03470-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Agent-based models ; Communication ; Communications Engineering ; Computer Communication Networks ; Cryptography ; Data communication ; Deep learning ; Electrical Engineering ; Engineering ; Generative adversarial networks ; Hash based algorithms ; Intrusion detection systems ; IT in Business ; Jamming ; Machine learning ; Military communications ; Networks ; Nodes ; Original Paper ; Principles ; Sensors ; Signal monitoring ; Underwater ; Wireless networks ; Wireless sensor networks</subject><ispartof>Wireless networks, 2024, Vol.30 (1), p.209-231</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</citedby><cites>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</cites><orcidid>0000-0003-1747-9639</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-023-03470-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-023-03470-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27915,27916,41479,42548,51310</link.rule.ids></links><search><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Kumar, S. V. N. Santhosh</creatorcontrib><creatorcontrib>Selvi, M.</creatorcontrib><creatorcontrib>Thangaramya, K.</creatorcontrib><creatorcontrib>Arputharaj, Kannan</creatorcontrib><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</description><subject>Access control</subject><subject>Agent-based models</subject><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cryptography</subject><subject>Data communication</subject><subject>Deep learning</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Generative adversarial networks</subject><subject>Hash based algorithms</subject><subject>Intrusion detection systems</subject><subject>IT in Business</subject><subject>Jamming</subject><subject>Machine learning</subject><subject>Military communications</subject><subject>Networks</subject><subject>Nodes</subject><subject>Original Paper</subject><subject>Principles</subject><subject>Sensors</subject><subject>Signal monitoring</subject><subject>Underwater</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UMtOwzAQtBBIlMIPcLLE2eBHEtvHquIlteLQcrYcZ1NSWie1ExX4elyKxI3TjnZnZjWD0DWjt4xSeRcZ47IglAtCRSYp-ThBI5ZLThTTxWnClHNCqVDn6CLGNaVUCa1HaLcANwTA1le47fpm23xBhRvfhyE2rccV9OD6A4ruDbaA09qv8GyxnJP5ZIq70HjXdBuIuG4DHnwFYW97CHjfBEjriCP4mE4e-n0b3uMlOqvtJsLV7xyj14f75fSJzF4en6eTGXGC6Z4IVQLkMmdFlVc2U7VVmc5kLVVps7zSRc0ybjXUDmqwipfWlTyDLNfKlVpKMUY3R98utLsBYm_W7RB8emm4ZkVOBc9ZYvEjy4U2xgC1SYm2NnwaRs2hWnOs1qRqzU-15iOJxFEUD_FXEP6s_1F9AxWsf4c</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rajasoundaran, S.</creator><creator>Kumar, S. V. N. Santhosh</creator><creator>Selvi, M.</creator><creator>Thangaramya, K.</creator><creator>Arputharaj, Kannan</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-1747-9639</orcidid></search><sort><creationdate>2024</creationdate><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><author>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Agent-based models</topic><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cryptography</topic><topic>Data communication</topic><topic>Deep learning</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Generative adversarial networks</topic><topic>Hash based algorithms</topic><topic>Intrusion detection systems</topic><topic>IT in Business</topic><topic>Jamming</topic><topic>Machine learning</topic><topic>Military communications</topic><topic>Networks</topic><topic>Nodes</topic><topic>Original Paper</topic><topic>Principles</topic><topic>Sensors</topic><topic>Signal monitoring</topic><topic>Underwater</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Kumar, S. V. N. Santhosh</creatorcontrib><creatorcontrib>Selvi, M.</creatorcontrib><creatorcontrib>Thangaramya, K.</creatorcontrib><creatorcontrib>Arputharaj, Kannan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rajasoundaran, S.</au><au>Kumar, S. V. N. Santhosh</au><au>Selvi, M.</au><au>Thangaramya, K.</au><au>Arputharaj, Kannan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2024</date><risdate>2024</risdate><volume>30</volume><issue>1</issue><spage>209</spage><epage>231</epage><pages>209-231</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-023-03470-x</doi><tpages>23</tpages><orcidid>https://orcid.org/0000-0003-1747-9639</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1022-0038 |
ispartof | Wireless networks, 2024, Vol.30 (1), p.209-231 |
issn | 1022-0038 1572-8196 |
language | eng |
recordid | cdi_proquest_journals_2916503251 |
source | Springer Nature - Complete Springer Journals |
subjects | Access control Agent-based models Communication Communications Engineering Computer Communication Networks Cryptography Data communication Deep learning Electrical Engineering Engineering Generative adversarial networks Hash based algorithms Intrusion detection systems IT in Business Jamming Machine learning Military communications Networks Nodes Original Paper Principles Sensors Signal monitoring Underwater Wireless networks Wireless sensor networks |
title | Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T06%3A36%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20optimized%20intrusion%20detection%20scheme%20using%20LSTM-MAC%20principles%20for%20underwater%20wireless%20sensor%20networks&rft.jtitle=Wireless%20networks&rft.au=Rajasoundaran,%20S.&rft.date=2024&rft.volume=30&rft.issue=1&rft.spage=209&rft.epage=231&rft.pages=209-231&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-023-03470-x&rft_dat=%3Cproquest_cross%3E2916503251%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2916503251&rft_id=info:pmid/&rfr_iscdi=true |