Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN

Full Text (PDF, 597KB), PP.1-15

Views: 0 Downloads: 0

Author(s)

Ramesh Vatambeti 1,* Vijay Kumar Damera 2 Karthikeyan H. 3 Manohar M. 3 Sharon Roji Priya C. 3 M. S. Mekala 4

1. School of Computer Science and Engineering, VIT-AP University, Vijayawada-522237, India

2. Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Hyderabad-500075, India

3. Computer Science and Engineering, CHRIST (Deemed to be University), Bangalore-560074, India

4. School of Communication Engineering, Yeungnam University, Republic of Korea, Gyeongsan-38541, Korea

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.06.01

Received: 20 Nov. 2022 / Revised: 18 Jan. 2023 / Accepted: 25 Mar. 2023 / Published: 8 Dec. 2023

Index Terms

Wireless Sensor Network, Clone Attack, Horse Herd Metaheuristic Optimization Algorithm, Optimized Extreme Learning Machine, Battery Resource

Abstract

Thanks to recent technological advancements, low-cost sensors with dispensation and communication capabilities are now feasible. As an example, a Wireless Sensor Network (WSN) is a network in which the nodes are mobile computers that exchange data with one another over wireless connections rather than relying on a central server. These inexpensive sensor nodes are particularly vulnerable to a clone node or replication assault because of their limited processing power, memory, battery life, and absence of tamper-resistant hardware. Once an attacker compromises a sensor node, they can create many copies of it elsewhere in the network that share the same ID. This would give the attacker complete internal control of the network, allowing them to mimic the genuine nodes' behavior. This is why scientists are so intent on developing better clone assault detection procedures. This research proposes a machine learning based clone node detection (ML-CND) technique to identify clone nodes in wireless networks. The goal is to identify clones effectively enough to prevent cloning attacks from happening in the first place. Use a low-cost identity verification process to identify clones in specific locations as well as around the globe. Using the Optimized Extreme Learning Machine (OELM), with kernels of ELM ideally determined through the Horse Herd Metaheuristic Optimization Algorithm (HHO), this technique safeguards the network from node identity replicas. Using the node identity replicas, the most reliable transmission path may be selected. The procedure is meant to be used to retrieve data from a network node. The simulation result demonstrates the performance analysis of several factors, including sensitivity, specificity, recall, and detection.

Cite This Paper

Ramesh Vatambeti, Vijay Kumar Damera, Karthikeyan H., Manohar M., Sharon Roji Priya C., M. S. Mekala, "Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.6, pp.1-15, 2023. DOI:10.5815/ijcnis.2023.06.01

Reference

[1]Numan, M., Subhan, F., Khan, W.Z., Hakak, S., Haider, S., Reddy, G.T., Jolfaei, A. and Alazab, M., “A systematic review on clone node detection in static wireless sensor networks”, IEEE Access, 8, pp.65450-65461, 2020. DOI:10.1109/ACCESS.2020.2983091.
[2]Mohindru, V., Singh, Y. and Bhatt R., “Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack”, Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering)”, 13(2), pp.251-259, 2020. https://doi.org/10.2174/2352096512666190215125026.
[3]Mohindru, V. and Singh, Y, “Node authentication algorithm for securing static wireless sensor networks from node clone Attack”, International Journal of Information and Computer Security, 10(2-3), pp.129-148, 2020. DOI:10.1504/IJICS.2018.091462.
[4]Lalar, S., Bhushan, S. and Surender, M., “Hybrid encryption algorithm to detect clone node attack in wireless sensor Network”, In Proceedings of the International Conference on Innovative Computing & Communications (ICICC), 2020.
[5]Shaukat, H.R., Hashim, F., Shaukat, M.A. and Ali Alezabi, K., “Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)”, Sensors, 20(8), p.2283, 2020. https://doi.org/10.3390/s20082283.
[6]Jane Nithya, K. and Shyamala, K., “A Systematic Review on Various Attack Detection Methods for Wireless Sensor Networks”, In International Conference on Innovative Computing and Communications (pp. 183-204). Springer, Singapore., 2022.
[7]Dora, J.R. and Nemoga, K., “Clone node detection attacks and mitigation mechanisms in static wireless sensor networks”, Journal of Cybersecurity and Privacy, 1(4), pp.553-579, 2021. https://doi.org/10.3390/jcp1040028.
[8]Mohindru, V., Singh, Y. and Bhatt, R., “Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm”, International Journal of Information and Computer Security, 12(2-3), pp.217-233, 2020. DOI:10.1504/IJICS.2020.105174.
[9]Lalar, S., Bhushan, S. and Surender, “An efficient tree-based clone detection scheme in wireless sensor network”, Journal of Information and Optimization Sciences, 40(5), pp.1003-1023, 2019. https://doi.org/10.1080/02522667.2019.1637998.
[10]Sherubha, P., Amudhavalli, P. and Sasirekha, S.P., “Clone attack detection using random forest and multi objective cuckoo search classification”, In 2019 International Conference on Communication and Signal Processing (ICCSP), pp. 0450-0454, IEEE, 2019.
[11]Tang, C. and Han, D., “A low resource consumption clone detection method for multi-base station wireless sensor networks”, IEEE Access, 8, pp.128349-128361, 2020, DOI: 10.1109/ACCESS.2020.3007388.
[12]Jaballah, W.B., Conti, M., Filè, G., Mosbah, M. and Zemmari, A., “Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks”, Computer Communications, 119, pp.66-82, 2018. https://doi.org/10.1016/j.comcom.2018.01.010
[13]Anitha, S., Jayanthi, P., & Chandrasekaran, V., “An intelligent based healthcare security monitoring schemes for detection of node replication attack in wireless sensor networks”, Measurement, 167, 108272, 2021. https://doi.org/10.1016/j.measurement.2020.108272.
[14]Devi, P.P. and Jaison, B., "Optimal Scheme for the Detection and Classification of Clone Node Attack in WSN Using TAIGBRFCNIA”, Wireless Personal Communications, 125, pp.1615-1629, 2022. https://doi.org/10.1007/s11277-022-09623-z
[15]Meganathan, S., Rajesh Kumar, N., Sheik Mohideen Shah, S., Sumathi, A. and Santhoshkumar, S., “Wireless Sensor-Based Enhanced Security Protocol to Prevent Node Cloning Attack”, In Computational Vision and Bio-Inspired Computing (pp. 603-615). Springer, Singapore., 2022.
[16]Mohammad, S.; Sultanul Kabir, A.F.M., “Hierarchical Design Based Intrusion Detection System for Wireless Ad Hoc Sensor Network”, Int. J. Netw. Secur. Appl., 2, 102–117, 2022.
[17]Devi, P.P. and Jaison, B., “Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms”, Computer Communications, 152, pp.316-322, 2020. https://doi.org/10.1016/j.comcom.2020.01.064
[18]Hameed, K., Garg, S., Amin, M.B., Kang, B. and Khan, A., “A context-aware information-based clone node attack detection scheme in Internet of Things”, Journal of Network and Computer Applications, 197, p.103271, 2022. https://doi.org/10.1016/j.jnca.2021.103271
[19]Vatambeti R, Supriya KS, Sanshi S, “Identifying and detecting black hole and gray hole attack in MANET using gray wolf Optimization”, Int J Commun Syst., 33(18): e4610, 2020. https://doi.org/10.1002/dac.4610.
[20]S. G. Thakur, ‘‘Cinora: Cell based identification of node replication attack in wireless sensor networks’’, in Proc. IEEE Int. Conf. Commun. Syst. (ICCS), pp. 1–8, 2008.
[21]H. R. Shaukat, F. Hashim, A. Sali, and M. F. Abdul Rasid, ‘‘Node replication attacks in mobile wireless sensor network: A survey’’, Int. J. Distrib. Sensor Netw., 10, 12, 2014. https://doi.org/10.1155/2014/402541
[22]Mirkarimi F, Azizyan G, Rashki M, “Horse herd optimization algorithm: a nature-inspired algorithm for high-dimensional optimization problems”, Knowledge-Based Systems, 213:106711, 2021. https://doi.org/10.1016/j.knosys.2020.106711.