Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks

Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless networks 2024, Vol.30 (1), p.209-231
Hauptverfasser: Rajasoundaran, S., Kumar, S. V. N. Santhosh, Selvi, M., Thangaramya, K., Arputharaj, Kannan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 231
container_issue 1
container_start_page 209
container_title Wireless networks
container_volume 30
creator Rajasoundaran, S.
Kumar, S. V. N. Santhosh
Selvi, M.
Thangaramya, K.
Arputharaj, Kannan
description Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.
doi_str_mv 10.1007/s11276-023-03470-x
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2916503251</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2916503251</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIlMIPcLLE2eBHEtvHquIlteLQcrYcZ1NSWie1ExX4elyKxI3TjnZnZjWD0DWjt4xSeRcZ47IglAtCRSYp-ThBI5ZLThTTxWnClHNCqVDn6CLGNaVUCa1HaLcANwTA1le47fpm23xBhRvfhyE2rccV9OD6A4ruDbaA09qv8GyxnJP5ZIq70HjXdBuIuG4DHnwFYW97CHjfBEjriCP4mE4e-n0b3uMlOqvtJsLV7xyj14f75fSJzF4en6eTGXGC6Z4IVQLkMmdFlVc2U7VVmc5kLVVps7zSRc0ybjXUDmqwipfWlTyDLNfKlVpKMUY3R98utLsBYm_W7RB8emm4ZkVOBc9ZYvEjy4U2xgC1SYm2NnwaRs2hWnOs1qRqzU-15iOJxFEUD_FXEP6s_1F9AxWsf4c</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2916503251</pqid></control><display><type>article</type><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><source>Springer Nature - Complete Springer Journals</source><creator>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</creator><creatorcontrib>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</creatorcontrib><description>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</description><identifier>ISSN: 1022-0038</identifier><identifier>EISSN: 1572-8196</identifier><identifier>DOI: 10.1007/s11276-023-03470-x</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Access control ; Agent-based models ; Communication ; Communications Engineering ; Computer Communication Networks ; Cryptography ; Data communication ; Deep learning ; Electrical Engineering ; Engineering ; Generative adversarial networks ; Hash based algorithms ; Intrusion detection systems ; IT in Business ; Jamming ; Machine learning ; Military communications ; Networks ; Nodes ; Original Paper ; Principles ; Sensors ; Signal monitoring ; Underwater ; Wireless networks ; Wireless sensor networks</subject><ispartof>Wireless networks, 2024, Vol.30 (1), p.209-231</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</citedby><cites>FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</cites><orcidid>0000-0003-1747-9639</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11276-023-03470-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11276-023-03470-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27915,27916,41479,42548,51310</link.rule.ids></links><search><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Kumar, S. V. N. Santhosh</creatorcontrib><creatorcontrib>Selvi, M.</creatorcontrib><creatorcontrib>Thangaramya, K.</creatorcontrib><creatorcontrib>Arputharaj, Kannan</creatorcontrib><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><title>Wireless networks</title><addtitle>Wireless Netw</addtitle><description>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</description><subject>Access control</subject><subject>Agent-based models</subject><subject>Communication</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cryptography</subject><subject>Data communication</subject><subject>Deep learning</subject><subject>Electrical Engineering</subject><subject>Engineering</subject><subject>Generative adversarial networks</subject><subject>Hash based algorithms</subject><subject>Intrusion detection systems</subject><subject>IT in Business</subject><subject>Jamming</subject><subject>Machine learning</subject><subject>Military communications</subject><subject>Networks</subject><subject>Nodes</subject><subject>Original Paper</subject><subject>Principles</subject><subject>Sensors</subject><subject>Signal monitoring</subject><subject>Underwater</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>1022-0038</issn><issn>1572-8196</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UMtOwzAQtBBIlMIPcLLE2eBHEtvHquIlteLQcrYcZ1NSWie1ExX4elyKxI3TjnZnZjWD0DWjt4xSeRcZ47IglAtCRSYp-ThBI5ZLThTTxWnClHNCqVDn6CLGNaVUCa1HaLcANwTA1le47fpm23xBhRvfhyE2rccV9OD6A4ruDbaA09qv8GyxnJP5ZIq70HjXdBuIuG4DHnwFYW97CHjfBEjriCP4mE4e-n0b3uMlOqvtJsLV7xyj14f75fSJzF4en6eTGXGC6Z4IVQLkMmdFlVc2U7VVmc5kLVVps7zSRc0ybjXUDmqwipfWlTyDLNfKlVpKMUY3R98utLsBYm_W7RB8emm4ZkVOBc9ZYvEjy4U2xgC1SYm2NnwaRs2hWnOs1qRqzU-15iOJxFEUD_FXEP6s_1F9AxWsf4c</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rajasoundaran, S.</creator><creator>Kumar, S. V. N. Santhosh</creator><creator>Selvi, M.</creator><creator>Thangaramya, K.</creator><creator>Arputharaj, Kannan</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7SP</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>88I</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M2P</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-1747-9639</orcidid></search><sort><creationdate>2024</creationdate><title>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</title><author>Rajasoundaran, S. ; Kumar, S. V. N. Santhosh ; Selvi, M. ; Thangaramya, K. ; Arputharaj, Kannan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-38bee57516d5da48fa84947f78ba45d96f142a9efcefea82bacb24e4598cb9773</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Agent-based models</topic><topic>Communication</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cryptography</topic><topic>Data communication</topic><topic>Deep learning</topic><topic>Electrical Engineering</topic><topic>Engineering</topic><topic>Generative adversarial networks</topic><topic>Hash based algorithms</topic><topic>Intrusion detection systems</topic><topic>IT in Business</topic><topic>Jamming</topic><topic>Machine learning</topic><topic>Military communications</topic><topic>Networks</topic><topic>Nodes</topic><topic>Original Paper</topic><topic>Principles</topic><topic>Sensors</topic><topic>Signal monitoring</topic><topic>Underwater</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rajasoundaran, S.</creatorcontrib><creatorcontrib>Kumar, S. V. N. Santhosh</creatorcontrib><creatorcontrib>Selvi, M.</creatorcontrib><creatorcontrib>Thangaramya, K.</creatorcontrib><creatorcontrib>Arputharaj, Kannan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rajasoundaran, S.</au><au>Kumar, S. V. N. Santhosh</au><au>Selvi, M.</au><au>Thangaramya, K.</au><au>Arputharaj, Kannan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks</atitle><jtitle>Wireless networks</jtitle><stitle>Wireless Netw</stitle><date>2024</date><risdate>2024</risdate><volume>30</volume><issue>1</issue><spage>209</spage><epage>231</epage><pages>209-231</pages><issn>1022-0038</issn><eissn>1572-8196</eissn><abstract>Underwater Wireless Sensor Networks (UWSNs) are the type of WSNs that transmit the data through water medium and monitor the oceanic conditions, water contents, under-sea habitations, underwater beings and military objects. Unlike air medium, water channel creates stronger communication barriers. In addition, the malicious data injection and other network attacks create security problems during data communication. Protecting the vulnerable UWSN channel is not an easy task under critical water conditions. Many research works proposed in the literature used cryptography principles and intelligent intrusion detection systems to secure the network activities from malicious nodes. However, the need for Machine Learning (ML) and Deep Learning (DL) associated Medium Access Control (MAC) principles is expected for handling the barriers in uncertain UWSN. In this regard, this article proposes a new Intrusion detection system with Integrated Secure MAC principles and Long Short-Term Memory (LSTM) architectures for organizing real-time neighbor monitoring tasks. The proposed system implements Generative Adversarial Network (GAN) driven UWSN channel assessment models and Secure LSTM-MAC principles to protect the data communication. In this regard, the proposed model creates the Intrusion Detection System (IDS) using trained distributed agents. These agents run in each legitimate sensor node contain novel LSTM-MAC engine, intrusion dataset, rule-based monitoring techniques, Secure Hashing Algorithm-3 (SHA-3), Two Fish algorithm and packet filtering tools. The proposed LSTM and agent-based model drives adaptive MAC channel operations to avoid malicious traffics in to legitimate nodes. In addition, this work implements neighbor-based packet monitoring, signal jamming and alert messaging procedures to build reliable security services against different types of attacks. The experiments and the observations reveal the performance of proposed techniques is proved to be 5% to 10% higher than existing techniques in various aspects measured with different metrics.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11276-023-03470-x</doi><tpages>23</tpages><orcidid>https://orcid.org/0000-0003-1747-9639</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1022-0038
ispartof Wireless networks, 2024, Vol.30 (1), p.209-231
issn 1022-0038
1572-8196
language eng
recordid cdi_proquest_journals_2916503251
source Springer Nature - Complete Springer Journals
subjects Access control
Agent-based models
Communication
Communications Engineering
Computer Communication Networks
Cryptography
Data communication
Deep learning
Electrical Engineering
Engineering
Generative adversarial networks
Hash based algorithms
Intrusion detection systems
IT in Business
Jamming
Machine learning
Military communications
Networks
Nodes
Original Paper
Principles
Sensors
Signal monitoring
Underwater
Wireless networks
Wireless sensor networks
title Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T06%3A36%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20optimized%20intrusion%20detection%20scheme%20using%20LSTM-MAC%20principles%20for%20underwater%20wireless%20sensor%20networks&rft.jtitle=Wireless%20networks&rft.au=Rajasoundaran,%20S.&rft.date=2024&rft.volume=30&rft.issue=1&rft.spage=209&rft.epage=231&rft.pages=209-231&rft.issn=1022-0038&rft.eissn=1572-8196&rft_id=info:doi/10.1007/s11276-023-03470-x&rft_dat=%3Cproquest_cross%3E2916503251%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2916503251&rft_id=info:pmid/&rfr_iscdi=true