banner

Mitigation of network security attacks in wireless multimedia sensors networks using intrusion detection system

M. A. Matheen, S. Sundar

Abstract


In this work, research propose a deep transfer learning-based Lecun network P-Lenet technique to move the knowledge contained in source domain data to the target domain and integrate to produce an efficient intrusion detection system (IDS) that would enhance the detection accuracy for any wireless multimedia sensors networks (WMSN) ecosystems. To prevent attacks on the software defined network (SDN) platform in real time, the proposed method placed a strong emphasis on anomaly detection as the primary mechanism. The Lecun network (LeNet) was investigated in this work, and a new variant of the network called the Lenet was proposed. In addition, research make use of techniques like as feature normalization to increase the accuracy of the algorithm predictions and to optimize the training process in such a way that it consumes the least amount of time and resources. The performance of the proposed model that was recommended was superior to that of existing network intrusion detection system (NIDS) algorithms.


Keywords


network security; wireless multimedia networks; security attacks; intrusion detection system

Full Text:

PDF

References


1. Matheen MA, Sundar S. IoT multimedia sensors for energy efficiency and security: A review of QoS aware and methods in wireless multimedia sensor networks. International Journal of Wireless Information Networks 2022; 29: 407–418. doi: 10.1007/s10776-022-00567-6

2. Raveendranadh B, Tamilselvan S. An accurate attack detection framework based on exponential polynomial kernel‐centered deep neural networks in the wireless sensor network. Transactions on Emerging Telecommunications Technologies 2023; 34(3): e4726. doi: 10.1002/ett.4726

3. Santhosh Kumar SVN, Selvi M, Kannan A. A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Computational Intelligence and Neuroscience 2023; 2023: 8981988. doi: 10.1155/2023/8981988

4. Onat I, Miri A. An intrusion detection system for wireless sensor networks. In: Proceedings of the WiMob'2005), IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2005. 22–24 August 2005; Montreal, QC, Canada. pp. 253–259.

5. Chen RC, Hsieh CF, Huang YF. A new method for intrusion detection on hierarchical wireless sensor networks. In Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication; 15–16 January 2009; Suwon, Korea. pp. 238–245.

6. Shi Q, Qin L, Song L, et al. A dynamic programming model for internal attack detection in wireless sensor networks. Discrete Dynamics in Nature and Society 2017; 2017: 5743801. doi: 10.1155/2017/5743801

7. Cheng ZM. A differential game model between intrusion detection system and attackers for wireless sensor networks. Wireless Personal Communications 2016; 90: 1211–1219. doi: 10.1007/s11277-016-3386-6

8. Fu RR, Zheng KF, Lu TL, Yang YX. Danger theory inspired intrusion detection model for wireless sensor networks. Journal of China Institute of Communications 2012; 33(9): 31–37. doi: 1000-436X(2012)09-0031-07

9. Xiao X, Zhang R. Study of immune-based intrusion detection technology in wireless sensor networks. Arabian Journal for Science and Engineering 2017; 42: 3159–3174. doi: 10.1007/s13369-017-2426-1

10. Saravanan V, Rajeshwari S, Jayashree P. Security issues in protecting computers and maintenance. Journal of Global Research in Computer Science 2013; 4(1): 55–58.

11. Gobinathan B, Mukunthan MA, Surendran S, et al. A novel method to solve real time security issues in software industry using advanced cryptographic techniques. Scientific Programming 2021; 2021: 3611182. doi: 10.1155/2021/3611182

12. Matheen MA, Sundar S. A novel technique to mitigate the data redundancy and to improvise network lifetime using fuzzy criminal search ebola optimization for WMSN. Sensors 2023; 23(4): 2218. doi: 10.3390/s23042218




DOI: https://doi.org/10.32629/jai.v7i1.751

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 M. A. Matheen, S. Sundar

License URL: https://creativecommons.org/licenses/by-nc/4.0/