Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Document Type : Research Paper


1 Faculty of Computer and IT Engineering, Shahrood University of Technology, Shahrood, Iran

2 Faculty of Electrical and Robotic Engineering, Shahrood University of Technology, Shahrood, Iran


Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are the most attacked targets by attackers, And also according to their critical operations in CWSNs, their compromise and control by an attacker will disrupt the entire cluster and sometimes the entire network, so their security needs more attentiveness and must be ensured. In this paper, we introduce a hybrid Intrusion Detection System (HIDS) for securing CHs, to take advantages of both anomaly-based and misuse-based detection methods, that is high detection and low false alarm rate. Also by using a novel preprocessing model, significantly reduces the computational and memory complexities of the proposed IDS, and finally allows the use of the clustering algorithms for it. The simulation results show that the proposed IDS in comparison to existing works, which often have high computational and memory complexities, can be as an effective and lightweight IDS for securing CHs.


[1]     M. G. Ball, B. Qela and S. Wesolkowski, “A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks,” Recent Advances in Computational Intelligence in Defense and Security, vol. 621, pp. 663-693, Dec. 2015.
[2]     D. He, N. Kumar, J. Chen, C. C. Lee and N. Chilamkurti, “Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks,” Multimedia Systems, vol. 21, no. 1, pp. 49–60, Feb. 2015.
[3]     M. Li and H. J. Lin, “Design and Implementation of Smart Home Control Systems Based on Wireless Sensor Networks and Power Line Communications,” IEEE Transactions on Industrial Electronics, vol. 62, no.7, pp. 4430–4442, July 2015.
[4]     I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[5]     J. Sen, “A Survey on Wireless Sensor Network Security,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 1, no. 2, pp. 55-78, Aug. 2009.
[6]     Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys and Tutorials, vol. 10, no. 3, pp. 6–28, Third Quarter 2008.
[7]     M. Sadeghizadeh, O. R. Marouzi, “A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks”, Journal of Communication Engineering, vol. 7, no. 2, July-Dec. 2018.
[8]     M. Ehdaie, N. Alexiou and P. Papadimitratos, “Random Key Pre-Distribution Techniques against Sybil Attacks,” Journal of Communication Engineering, vol. 5, no. 1, pp. 1-13, Jan.-June 2016.
[9]     I. Q. Kolagar, H. H. S. Javadi and S. Bijani, “A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs,” Journal of Communication Engineering, vol. 6, no. 1, pp. 53-70, Jan.-June 2017.
[10]   I. Butun, S. D. Morgera, and R. Sankar, “A Survey of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 266-282, First Quarter 2014.
[11]   A. Ghosal and S. Halder, “A survey on energy efficient intrusion detection in wireless sensor networks,” Journal of Ambient Intelligence and Smart Environments, vol. 9, no. 2, pp. 239-261, Feb. 2017.
[12]   S. Duhan and P. Khandnor, “Intrusion detection system in wireless sensor networks: A comprehensive review,” 2016 International Conf. on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 2707-2713.
[13]   N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion Detection Systems in Wireless Sensor Networks: A Review,” International Journal of Distributed Sensor Networks, vol. 2013, no. 4, pp. 1-7, May 2013.
[14]   A. Abduvaliyev, S. K. Pathan, J. Zhou, R. Roman, and W. C. Wong, “On the Vital Areas of Intrusion Detection systems in Wireless Sensor Networks,” IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1223-1237, Third Quarter 2013.
[15]   C. Elkan, “Results of the KDD’99 classifier learning,” ACM SIGKDD Explorations Newsletter, vol. 1, no. 2, pp. 63-64, Jan. 2000.
[16]   P. Aggarwal and S. K. Sharma, “Analysis of KDD Dataset Attributes - Class wise For Intrusion Detection,” Procedia Computer Science, vol. 57, pp. 842-851, Dec. 2015.
[17]   S. K. Sahu, S. Sarangi, and S. K. Jena, “A detail analysis on intrusion detection datasets,” 2014 IEEE International Advance Computing Conference (IACC), Gurgaon, 2014, pp. 1348-1353.
[18]   M. M. Ozcelik, E. Irmak, and S. Ozdemir, “A hybrid trust based intrusion detection system for wireless sensor networks,” 2017 International Symposium on Networks, Computers and Communications, Marrakech, 2017, pp. 1-6.
[19]   S. S. Wang, K. Q. Yan, S. C. Wang, and C. W. Liu, “An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks,” Expert Systems with Applications, vol. 38, no. 12, pp. 15234-15243, Dec. 2011.
[20]   Y. Maleh, A. Ezzati, Y. Qasmaoui, and M. Mbida, “A Global Hybrid Intrusion Detection System for Wireless Sensor Networks,” Procedia Computer Science, vol. 52, pp. 1047-1052, June 2015.
[21]   H. Sedjelmaci and M. Feham, “Novel hybrid intrusion detection system for clustered wireless sensor networks” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 4, pp. 1-14, Aug. 2011.
[22]   W. Xingzhu, “ACO and SVM Selection Feature Weighting of Network ntrusion Detection Method,” International Journal of Security and Its Applications, vol. 9, no. 4, pp. 129-270, Apr. 2015.
[23]   M. Aslahi-Shahri, R. Rahmani, M. Chizari, A. Maralani, M. Eslami, M.J. Golker, and A. Ebrahimi, “A hybrid method consisting of GA and SVM for intrusion detection system,” Neural computing and applications, vol. 27, no. 6, pp. 1669–1676, Aug. 2016.
[24]   N. Acharya and S. Singh, “An IWD-based feature selection method for intrusion detection system,” Soft Computing, vol. 22, no. 13, pp. 4407-4416, July 2018.
[25]   R. Kaur, M. Sachdeva, and G. Kumar, “Nature Inspired Feature Selection Approach for Effective Intrusion Detection,” Indian Journal of Science and Technology, vol. 9, no. 42, pp. 1-9, Nov. 2016.
[26]   S. Ramakrishnan and S. Devaraju, “Attack's feature selection-based network intrusion detection using fuzzy control language,” International journal of fuzzy systems, vol. 19, no. 2, pp. 316–328, Apr. 2017.
[27]   Y. Zhu, J. Liang, J. Chen, and Z. Ming, “An improved NSGA-III algorithm for feature selection used in intrusion detection,” Knowledge-Based Systems, vol. 116, pp. 74-85, Jan. 2017.
[28]   H. Qu, Z. Qiu, X. Tang, M. Xiang, and P. Wang, “An Adaptive Intrusion Detection Method for Wireless Sensor Networks,” International Journal of Advanced Computer Science and Applications(IJACSA), vol. 8, no. 11, pp. 27-36, Jan. 2017.
[29]   S. Rajasegarar, C. Leckie, and M. Palaniswami, “Anomaly detection in wireless sensor networks,” IEEE Wireless Communications, vol. 15, no. 4, pp. 34-40, Aug. 2008.
[30]   W. Wang, X. Zhang, S. Gombault and S. J. Knapskog, "Attribute Normalization in Network Intrusion Detection," 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks, Kaohsiung, 2009, pp. 448-453.
[31]   E. Frank, I. H. Witten, “Generating Accurate Rule Sets Without Global Optimization”, 1998 Fifteenth International Conference on Machine Learning, San Francisco, 1998, pp. 144-151.