{"title":"WSN中安全切换认证策略和LSTM门控递归神经网络入侵检测方法","authors":"J. Kamala, G. M. Kadhar Nawaz","doi":"10.1002/dac.70178","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the <i>Z</i>-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 13","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Handover Authentication Policy and LSTM Gated Recurrent Neural Network Approaches for Intrusion Detection in WSN\",\"authors\":\"J. Kamala, G. M. Kadhar Nawaz\",\"doi\":\"10.1002/dac.70178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the <i>Z</i>-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.</p>\\n </div>\",\"PeriodicalId\":13946,\"journal\":{\"name\":\"International Journal of Communication Systems\",\"volume\":\"38 13\",\"pages\":\"\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2025-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/dac.70178\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70178","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Secure Handover Authentication Policy and LSTM Gated Recurrent Neural Network Approaches for Intrusion Detection in WSN
Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the Z-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.
期刊介绍:
The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues.
The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered:
-Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.)
-System control, network/service management
-Network and Internet protocols and standards
-Client-server, distributed and Web-based communication systems
-Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity
-Trials of advanced systems and services; their implementation and evaluation
-Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation
-Performance evaluation issues and methods.