WSN中安全切换认证策略和LSTM门控递归神经网络入侵检测方法

IF 1.8 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
J. Kamala, G. M. Kadhar Nawaz
{"title":"WSN中安全切换认证策略和LSTM门控递归神经网络入侵检测方法","authors":"J. Kamala,&nbsp;G. M. Kadhar Nawaz","doi":"10.1002/dac.70178","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the <i>Z</i>-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 13","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Handover Authentication Policy and LSTM Gated Recurrent Neural Network Approaches for Intrusion Detection in WSN\",\"authors\":\"J. Kamala,&nbsp;G. M. Kadhar Nawaz\",\"doi\":\"10.1002/dac.70178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the <i>Z</i>-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.</p>\\n </div>\",\"PeriodicalId\":13946,\"journal\":{\"name\":\"International Journal of Communication Systems\",\"volume\":\"38 13\",\"pages\":\"\"},\"PeriodicalIF\":1.8000,\"publicationDate\":\"2025-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Communication Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/dac.70178\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70178","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

无线传感器网络(wsn)中的安全通信对于保护传感器节点之间数据通信的完整性、保密性和可用性至关重要。安全和认证协议负责保护数据,防止传输介质上的恶意活动。通过通信,在通信介质中收集日志;分析了特征依赖关系,使节点形成和路由安全,从而使用密钥策略和加密方法安全地传输数据。但是在过去的几十年里,由于通信特性的限制没有对传输介质中的行为方法进行分析,导致了由于认证失败和入侵导致的丢包、误注入和数据盗窃。为了解决这一问题,我们提出了一种基于花瓣蜘蛛蚁群特征选择(PSACFS)的LSTM门控递归神经网络(LSTMG-RNN)来分析路由日志,从而实现WSN中的安全路由。通过z分数归一化策略ZNP (Z-score Normalization Policy)对路由日志进行分析,预测特征限值。然后利用决策因子分析了频谱密集缺陷路由裕度(SIDRM),利用特征标量权重估计模型估计了传输延迟容忍影响率(TDTIR)。基于行为限制,通过PSACFS模型进行特征选择,降低特征维数,通过LSTMG-RNN进行路由选择。每条路由都采用安全的主节点密钥切换认证策略(SMN-KHAP)进行安全优化,以验证网络中通信实体的身份。它可以防止未经授权的节点参与通信过程。该方法在准确率(91.06%)、准确率(93.31%)、召回率(92.26%)、f1分数(92.08%)、错误率(26.21%)等方面均优于其他方法,提高了WSN的安全性能,实现了更安全的路由、验证和认证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

Secure Handover Authentication Policy and LSTM Gated Recurrent Neural Network Approaches for Intrusion Detection in WSN

Secure Handover Authentication Policy and LSTM Gated Recurrent Neural Network Approaches for Intrusion Detection in WSN

Secure communication in wireless sensor networks (WSNs) is essential to protect the integrity, confidentiality, and availability of data communication between sensor nodes. The secure and authentication protocols take responsibility for data protection against malicious activities over the transmission medium. Over the communication, logs are collected in the communication medium; the feature dependences are analyzed to make secure node forming and routing secure to transfer the data using key policies and cryptography approaches. But in the last decades, the communication feature limits have failed to analyze the behavioral approach in the transmission medium, leading to packet loss, false injection, and data theft due to failed authentication and intrusion. To resolve this problem, we propose a Petal Spider Ant Colony Feature Selection (PSACFS)-Based LSTM Gated Recurrent Neural Network (LSTMG-RNN) applied to analyze the routing logs to make secure routing in WSN. The route log analysis is carried out through the Z-score Normalization Policy (ZNP) to predict the feature limits. Then Spectral Intensive Defect Route Margins (SIDRM) are analyzed by a decision factor, and the Transmission Delay Tolerance Impact Rate (TDTIR) is estimated by a feature scalar weights estimation model. Based on the behavior limits, the feature selection is carried out by a PSACFS model to reduce feature dimension, and route selection is carried out through LSTMG-RNN. Each route is securely optimized with a secure master Node Key handover authentication policy (SMN-KHAP) to verify the identity of the communicating entities in a network. It prevents unauthorized nodes from participating in the communication process. This proposed method surpasses other methods in terms of precision (91.06%), accuracy (93.31%), recall rate (92.26%), F1-score (92.08%), and false rate (26.21%), which ensures enhanced security performance in WSN, leading to more secure routing, verification, and authentication.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信