Deep learning and entity embedding-based intrusion detection model for wireless sensor networks

Research output: Contribution to journalArticlepeer-review

20 Scopus citations

Abstract

Wireless sensor networks (WSNs) are considered promising for applications such as military surveillance and healthcare. The security of these networks must be ensured in order to have reliable applications. Securing such networks requires more attention, as they typically implement no dedicated security appliance. In addition, the sensors have limited computing resources and power and storage, which makes WSNs vulnerable to various attacks, especially denial of service (DoS). The main types of DoS attacks against WSNs are blackhole, grayhole, flooding, and scheduling. There are two primary techniques to build an intrusion detection system (IDS): signature-based and data-driven-based. This study uses the data-driven approach since the signature-based method fails to detect a zero-day attack. Several publications have proposed data-driven approaches to protect WSNs against such attacks. These approaches are based on either the traditional machine learning (ML) method or a deep learning model. The fundamental limitations of these methods include the use of raw features to build an intrusion detection model, which can result in low detection accuracy. This study implements entity embedding to transform the raw features to a more robust representation that can enable more precise detection and demonstrates how the proposed method can outperform state-of-the-art solutions in terms of recognition accuracy.

Original languageEnglish
Pages (from-to)1343-1360
Number of pages18
JournalComputers, Materials and Continua
Volume69
Issue number1
DOIs
StatePublished - 2021

Keywords

  • Artificial neural networks
  • Deep learning
  • Entity embedding
  • Intrusion detection
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Deep learning and entity embedding-based intrusion detection model for wireless sensor networks'. Together they form a unique fingerprint.

Cite this