Deep Learning-Infused Hybrid Security Model for Energy Optimization and Enhanced Security in Wireless Sensor Networks

Author:

Ramu K1,Rama S. V. S.2,Singh Satyanand3,Rachapudi Venubabu4,Mary Anitha5,Singh Vikash6,Joshi Shubham7

Affiliation:

1. IBM KYNDRYL LLC

2. St. Martin's Engineering College

3. Fiji National University

4. Koneru Lakshmaiah Education Foundation

5. Rajalakshmi Engineering College

6. Manipal Academy of Higher Education

7. Symbiosis International University

Abstract

Abstract Many wireless sensors are placed in an ad hoc way to create a wireless sensor network (WSN), which is used to monitor system, physical, and environmental conditions and transmit the collected data to a centralized point. Base stations and several nodes (wireless sensors) make up the system. The base station of a WSN System is connected to the Internet to share data, and these networks are used to cooperatively transfer data via the network to the base station while monitoring physical or environmental factors like sound, pressure, and temperature. These data can be processed, analyzed, stored, and mined by WSN. In this study, additional optimization and a deep learning approach were used to separate a rogue node from the network's busiest node based on a variety of criteria. A deep learning model for identifying the malicious node has been offered as a solution to these challenges. This model works by computing the probability of request forwarding, reply forwarding, and data dropping in a sum-rule weighted method. It has been determined that the planned task would have both a high throughput and a decreased necessary amount of time. There has been a decrease in the overall rate of packet loss. There has been a drop from 70ms to 42ms in the delay-related hyper metrics. There has been a near threefold reduction in the percentage of missing packages, from 23–8%. The adoption of deep learning has removed hostile node behaviour that might bring down a network as a potential failure mode.

Publisher

Research Square Platform LLC

Reference25 articles.

1. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks”;Jin Wang YU;Wirel. Commun. mobile Comput.,2018

2. Miles Brundage & Anil Anthony Bharath 2017 “A brief survey of deep reinforcement learning”;Kai Arulkumaran Marc Peter

3. Khan F, Memon S & Jokhio SH 2016, “Support vector machine-based energy-aware routing in wireless sensor networks”, in: 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI), 01–02 Nov 2016, Rawalpindi, Pakistan, pp. 1–4.

4. Energy management in wireless sensor networks: A survey”;Khan JA;Computers & Electrical Engineering,2016

5. Krishnan & Nagamuthu SS β019, “Denial of Service (DoS) Detection in Wireless Sensor Networks Applying Geometrically Varying Clusters”, International Conference on Computer Networks and Communication Technologies, Springer, Singapore, pp.1023–1030.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3