DOI QR코드

DOI QR Code

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

  • Guo, Weipeng (College of Computer Science & Technology, Huaqiao University) ;
  • Chen, Yonghong (College of Computer Science & Technology, Huaqiao University) ;
  • Cai, Yiqiao (College of Computer Science & Technology, Huaqiao University) ;
  • Wang, Tian (College of Computer Science & Technology, Huaqiao University) ;
  • Tian, Hui (College of Computer Science & Technology, Huaqiao University)
  • Received : 2016.06.11
  • Accepted : 2017.06.04
  • Published : 2017.11.30

Abstract

Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimum black hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.

Keywords

References

  1. Chee-Yee Chong, S. P. Kumar, "Sensor networks: evolution, opportunities, and challenges," Proceedings of the IEEE, vol. 91, no. 8, pp. 1247-1256, August, 2003. https://doi.org/10.1109/JPROC.2003.814918
  2. I. Butun, S. Morgera, R. Sankar, "A survey of intrusion detection systems for wireless sensor networks," IEEE Communications Surveys Tutorials, vol. 6,no. 1, pp. 266-282, May, 2014.
  3. H. M. Salmon, C. M. D. Farias, P. Loureiro, L. Pirmez, "Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques," International journal of wireless information networks, vol. 20, no. 1, pp. 39-66, March, 2013. https://doi.org/10.1007/s10776-012-0179-z
  4. S. Forrest, A. S. Perelson, L. Allen, R. Cherukuri, "Self-nonself discrimination in a computer." in Proc. of the 1994 IEEE Computer Society Symposium on IEEE, pp. 202-212, May 16-18, 1994.
  5. X. Z. Gao, S. J. Ovaska, X. Wang, "Genetic algorithms-based detector generation in negative selection algorithm," in Proc. of 2006 IEEE Mountain Workshop on Adaptive and Learning Systems,pp. 133-137, July 24-26, 2006.
  6. Z. X. Cai, W. Yong, "A multiobjective optimization-based evolutionary algorithm for constrained optimization," IEEE Transactions on Evolutionary Computation, vol. 10, no. 6, pp. 658-675, November, 2006. https://doi.org/10.1109/TEVC.2006.872344
  7. R. Storn, P. Kenneth, "Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces," Journal of global optimization, vol. 11, no. 4, pp. 341-359, December, 1997. https://doi.org/10.1023/A:1008202821328
  8. J. Morteza, M. Hossein, M. Kasra, F. Mohammad, S. Shahaboddin, "A method in security of wireless sensor network based on optimized artificial immune system in multi-agent environments," Research Journal of Recent Science, vol. 2, no. 10, pp. 99-106, August, 2013.
  9. M. Zeeshan, H. Javed, A. Haider, A. Khan, "An immunology inspired flow control attack detection using negative selection with R-contiguous bit matching for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 11, no. 11, January, 2015.
  10. R. Rizwan, F. A. Khan, H. Abbas, S. H. Chauhdary, "Anomaly detection in Wireless Sensor Networks using immune-based bioinspired mechanism," International Journal of Distributed Sensor Networks, vol. 11, no. 10, January, 2015.
  11. M. Drozda, S. Schaust, H. Szczerbicka, "AIS for misbehavior detection in wireless sensor networks: Performance and design principles," in Proc. of the 2007 IEEE Congress on Evolutionary Computation, pp. 3719-3726, September 25-28, 2007.
  12. Y. Liu, F. Q. Yu, "Immunity-based intrusion detection for wireless sensor networks," in Proc. of IEEE International Joint Conference on Neural Networks, pp. 439-444, June 1-8, 2008.
  13. R. Fu, K. Zheng, T. Lu, D. Zhang, Y. Yang, "Biologically inspired anomaly detection for hierarchical wireless sensor networks," Journal of Networks, vol. 7, no. 8, pp. 1214-1219, August, 2012.
  14. J. Zhou, "Negative Selection Algorithms: from the Thymus to V-detector," The University of Memphis, 2006.
  15. F. Gonzalez, D. Dasgupta, R. Kozma, "Combining negative selection and classification techniques for anomaly detection,"in Proc. of Congress on Evolutionary Computation, vol. 1, no. 11, pp. 705-710, May 12-17, 2002.
  16. F. Gonzalez, D. Dasgupta. "A study of artificial immune systems applied to anomaly detection," The University of Memphis , May, 2003.
  17. M. Ostaszewski, F. Seredynski, P. Bouvry, "Coevolutionary-based mechanisms for network anomaly detection," Journal of Mathematical Modelling and Algorithms, vol. 6, no. 3, pp. 411-431, March, 2007. https://doi.org/10.1007/s10852-007-9061-x
  18. R. Fu, K. F. Zheng, F. C. You, D. M. Zhang, B. Wu, "Anomaly detection algorithm based on fuzzy and immune theory in wireless sensor networks," Journal of Nanjing University of Science and Technology, vol. 36, no. 1, pp. 137-142, 2012.
  19. K. Deb, "Multi-objective optimization using evolutionary algorithms," John Wiley & Sons, Inc, vol. 16, 2001.
  20. R. Balling, "The maximin fitness function; multi-objective city and regional planning." in Proc. of International Conference on Evolutionary multi-criterion optimization, vol. 2632, pp. 1-15, April 8-11, 2003.
  21. C. A. C. Coello, "Theoretical and numerical constraint-handling techniques used with evolutionary algorithms: a survey of the state of the art," Computer methods in applied mechanics and engineering, vol. 191, no. 11, pp. 1245-1287, January, 2002. https://doi.org/10.1016/S0045-7825(01)00323-1
  22. Z. Ji, D. Dasgupta, "Estimating the detector coverage in a negative selection algorithm," in Proc. of the 7th annual conference on Genetic and evolutionary computation, pp. 281-288, June 25-29, 2005.
  23. H. Wang, X. Z. Gao, X. Huang, Z. Song, "PSO-optimized negative selection algorithm for anomaly detection," Advances in Soft Computing, vol. 52, pp.13-21, 2009.
  24. A. W. Iorio, X. Li, "Solving rotated multi-objective optimization problems using differential evolution," in Proc. of AI 2004: Advances in artificial intelligence, vol.3339, pp. 861-872, December 4-6, 2004.
  25. Fisher's iris data is available at ftp://ftp.ics.uci.edu/pub/machinelearning-databases/iris/.
  26. D. M. Farid, N. Harbi, M. Z. Rahman, "Combining naive bayes and decision tree for adaptive intrusion detection," Internation Journal of Network Security & Its Application, vol. 2, no. 2, pp.12-25, May, 2010. https://doi.org/10.5121/ijnsa.2010.2202
  27. X. Xiao, T. Li, R. Zhang, "An immune optimization based real-valued negative selection algorithm." Applied Intelligence, vol. 42, no. 2, pp. 289-302, March, 2015. https://doi.org/10.1007/s10489-014-0599-9

Cited by

  1. Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division vol.2019, pp.None, 2017, https://doi.org/10.1155/2019/5451263