A preview of this full-text is provided by Springer Nature.
Content available from Soft Computing
This content is subject to copyright. Terms and conditions apply.
FOCUS
A novel implementation of routing attack detection scheme by using
fuzzy and feed-forward neural networks
M. Ezhilarasi
1
•L. Gnanaprasanambikai
2
•A. Kousalya
3
•M. Shanmugapriya
4
Accepted: 14 February 2022 / Published online: 14 March 2022
The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022
Abstract
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in
innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the
advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various
intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate
on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity
replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing
attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase
the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system
is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The
experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum
detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and
random forest (RF) models.
Keywords Intrusion detection Routing attacks Wireless sensor networks Neural networks
1 Introduction
The application of wireless sensor IoT networks has
increased rapidly over the past decade. It is widely used in
environmental monitoring, geographical sensing, home
automation, traffic control, and other industrial applica-
tions. The sensors are deployed even in remote locations to
monitor and observe the changes. The sensors collect the
information and transmit it to the base station for further
processing. However, due to the limited energy capacity,
memory, bandwidth, and processing structure, they are
vulnerable to attacks. Depending on the attacking nature,
the attacks are mainly categorized into active and passive
attacks. In a passive attack, the intruder listens to the
communication channel as an unauthorized attacker and
monitors the data transmission. Whereas in active attacks,
the intruder monitors the channel and tries to modify the
channel data transmission. Some of the most significant
active and passive attacks are discussed here in order to
provide an ideology about the attacking nature. The major
passive attacks are monitoring and eavesdropping, homing
attacks, traffic analysis, and camouflaging adversaries.
Communicated by V Suma.
&M. Ezhilarasi
ezhilarasi.nagarajan@srec.ac.in
L. Gnanaprasanambikai
gnanaprasanambikai.lakshmanan@kahedu.edu.in
A. Kousalya
kousalyaa@skcet.ac.in
M. Shanmugapriya
shanmugapriya_sf175@anjaconline.org
1
Department of EEE, Sri Ramakrishna Engineering College,
Coimbatore, India
2
Department of Computer Science, Karpagam Academy of
Higher Education, Eachanari, India
3
Department of IT, Sri Krishna College of Engineering and
Technology, Kuniyamuthur, India
4
Department of Computer Science, Ayya Nadar Janaki
Ammal College, Sivakasi, India
123
Soft Computing (2023) 27:4157–4168
https://doi.org/10.1007/s00500-022-06915-1(0123456789().,-volV)(0123456789().,-volV)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.