Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

被引:31
|
作者
Salmi, Salim [1 ]
Oughdir, Lahcen [1 ]
机构
[1] Sidi Mohamed Ben Abdellah Univ, ENSA, Engn Syst & Applicat Lab, Fes, Morocco
关键词
Wireless sensor networks (WSNs); Intrusion detection system (IDS); Denial of service (DOS); Deep learning (DL); INTRUSION DETECTION;
D O I
10.1186/s40537-023-00692-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used remotely to collect data about the activities and conditions of a particular area, for example, temperature, pressure, motion. Each sensor node is usually small, inexpensive, and relatively easy to deploy compared to other sensing methods. For this reason, WSNs are used in a wide range of applications and industries. However, WSNs are vulnerable to different kinds of security threats and attacks. This is primarily because they are very limited in resources like power, storage, bandwidth, and processing power that could have been used in developing their defense. To ensure their security, an effective Intrusion detection system (IDS) need to be in place to detect these attacks even under these constraints. Today, traditional IDS are less effective as these malicious attacks are becoming more intelligent, frequent, and complex. Denial of service (DOS) attack is one of the main types of attacks that threaten WSNs. For this reason, we review related works that focus on detecting DoS attacks in WSN. In addition, we developed and implemented several Deep learning (DL) based IDS. These systems were trained on a specialized dataset for WSNs called WSN-DS in detecting four types of DoS attacks that affects WSNs. They include the Blackhole, Grayhole, Flooding, and Scheduling attacks. Finally, we evaluated and compared the results and we discuss possible future works.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks
    K. Lakshmi Narayanan
    R. Santhana Krishnan
    E. Golden Julie
    Y. Harold Robinson
    Vimal Shanmuganathan
    Wireless Personal Communications, 2022, 127 : 479 - 503
  • [42] Hybrid deep learning-based intrusion detection system for wireless sensor network
    Gowdhaman V.
    Dhanapal R.
    International Journal of Vehicle Information and Communication Systems, 2024, 9 (03) : 239 - 255
  • [43] Early Forest Fire Detection System using Wireless Sensor Network and Deep Learning
    Benzekri, Wiame
    El Moussati, Ali
    Moussaoui, Omar
    Berrajaa, Mohammed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 496 - 503
  • [44] Wireless Sensor Network - Performance Evaluation in the field
    Batra, K. B.
    Srivastava, Saswati
    2012 2ND INTERNATIONAL CONFERENCE ON POWER, CONTROL AND EMBEDDED SYSTEMS (ICPCES 2012), 2012,
  • [45] Distributed Detection of Flooding and Gray Hole Attacks in Wireless Sensor Network
    Dharini, N.
    Balakrishnan, Ranjith
    Renold, A. Pravin
    2015 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES AND MANAGEMENT FOR COMPUTING, COMMUNICATION, CONTROLS, ENERGY AND MATERIALS (ICSTM), 2015, : 178 - 184
  • [46] Comparative analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network
    Patil, Ashish
    Gaikwad, Rahul
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 387 - 393
  • [47] Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks
    Gavric, Zeljko
    Simic, Dejan
    INGENIERIA E INVESTIGACION, 2018, 38 (01): : 130 - 138
  • [48] WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS AND EFFECT OF BLACKHOLE AND SINKHOLE ATTACKS
    Anwar, Raja Waseem
    Bakhtiari, Majid
    Zainal, Anazida
    Qureshi, Kashif Naseer
    JURNAL TEKNOLOGI-SCIENCES & ENGINEERING, 2016, 78 (4-3): : 75 - 81
  • [49] Wireless sensor networks routing attacks prevention with blockchain and deep neural network
    Ali, Mohamed
    Abd El-Moghith, Ibrahim A.
    El-Derini, Mohamed N.
    Darwish, Saad M.
    Computers, Materials and Continua, 2022, 70 (03): : 6127 - 6140
  • [50] Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network
    Ali, Mohamed
    Abd El-Moghith, Ibrahim A.
    El-Derini, Mohamed N.
    Darwish, Saad M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 6127 - 6140