International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Development of Hybrid Cognitive Security Managers on Improved Multilayer CFA Feed Forward Neural Network to Improve the Security on Wireless Networks

Author NameAuthor Details

Senthil Kumar S, Suganya J, Kanagalakshmi K, Hariharan C

Senthil Kumar S[1]

Suganya J[2]

Kanagalakshmi K[3]

Hariharan C[4]

[1]Department of Computer Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Tiruchirappalli, India.

[2]Department of Computer Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Tiruchirappalli, India.

[3]Department of Computer Applications, Faculty of Science and Humanities, SRM Institute of Science and Technology, Tiruchirappalli, India.

[4]Department of Management Studies, Faculty of Science and Humanities, SRM Institute of Science and Technology, Tiruchirappalli, India.

Abstract

Wireless Local Area Networks (WLANs) that are currently deployed are vulnerable to assaults. The wireless networks have been secured with the application of cognition. A variety of soft computing methods can be utilized to accomplish cognition, whereby they are employed to supply the intelligence required to comprehend user nodes' malevolent actions. The consumer nodes activities are inherently dynamic. The strategies for autonomous protection and adaptation of the Wireless Network environment are investigated as a result of basic weaknesses within the IEEE 802.11 Access Control (AC) mechanism. In the cognitive framework architecture, an Improved Multilayer CFA (Color Filter Array) Feed Forward Neural Network (IMCFFNN) proposed to generate node behaviour patterns and then to analyze them using supervised multilayer CFA feedforward neural networks. The Cognitive Security Managers (CSM) can attain Cognition because the multilayer neural networks are efficient at detecting variations in user node behaviors. The CFA uses the Physical Architecture description layer (PADL) to identify nodes. A solid and effective framework has been developed from this work. Therefore, experiments have proved that malicious node behavior can be detected with 99 % effectiveness. In comparison to unsupervised teaching methods, similar rates of 94% are seen in the laboratory.

Index Terms

Wireless Local Area Networks

Cognitive Framework

Improved Multi-Layer Feed Forward Neural Network

Security

Performance Measures

Reference

  1. 1.
    Salmi, S., &Oughdir, L. (2023). Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network. Journal of Big Data, 10(1), 1-25.
  2. 2.
    Singh, A., Amutha, J., Nagar, J., & Sharma, S. (2023). A deep learning approach to predict the number of k-barriers for intrusion detection over a circular region using wireless sensor networks. Expert Systems with Applications, 211, 118588.
  3. 3.
    Fan, F., Chu, S. C., Pan, J. S., Lin, C., & Zhao, H. (2023). An optimized machine learning technology scheme and its application in fault detection in wireless sensor networks. Journal of Applied Statistics, 50(3), 592-609.
  4. 4.
    Sharma, H. S., Singh, M. M., & Sarkar, A. (2023, January). Machine Learning-Based DoS Attack Detection Techniques in Wireless Sensor Network: A Review. In Proceedings of the International Conference on Cognitive and Intelligent Computing: ICCIC 2021, Volume 2 (pp. 583-591). Singapore: Springer Nature Singapore.
  5. 5.
    Srivastava, A., & Bharti, M. R. (2023). Hybrid Machine Learning Model for Anomaly Detection in Unlabelled Data of Wireless Sensor Networks. Wireless Personal Communications, 129(4), 2693-2710.
  6. 6.
    Gite, P., Shrivastava, A., Krishna, K. M., Kusumadevi, G. H., Dilip, R., & Potdar, R. M. (2023). Under water motion tracking and monitoring using wireless sensor network and Machine learning. Materials Today: Proceedings, 80, 3511-3516.
  7. 7.
    Abdullah, O. A., Al-Hraishawi, H., &Chatzinotas, S. (2023, March). Deep Learning-Based Device-Free Localization in Wireless Sensor Networks. In 2023 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.
  8. 8.
    Ghazal, T. M., Hasan, M. K., Alzoubi, H. M., Alshurideh, M., Ahmad, M., & Akbar, S. S. (2023). Internet of Things Connected Wireless Sensor Networks for Smart Cities. In The Effect of Information Technology on Business and Marketing Intelligence Systems (pp. 1953-1968). Cham: Springer International Publishing.
  9. 9.
    Gupta, D., Sundaram, S., Rodrigues, J. J., & Khanna, A. (2023). An improved fault detection crow search algorithm for wireless sensor network. International Journal of Communication Systems, 36(12), e4136.
  10. 10.
    Gola, K. K., Dhingra, M., Gupta, B., & Rathore, R. (2023). An empirical study on underwater acoustic sensor networks based on localization and routing approaches. Advances in Engineering Software, 175, 103319.
  11. 11.
    Andronie, M., L?z?roiu, G., Iatagan, M., Hurloiu, I., ?tef?nescu, R., Dijm?rescu, A., &Dijm?rescu, I. (2023). Big Data Management Algorithms, Deep Learning-Based Object Detection Technologies, and Geospatial Simulation and Sensor Fusion Tools in the Internet of Robotic Things. ISPRS International Journal of Geo-Information, 12(2), 35.
  12. 12.
    Kori, G. S., &Kakkasageri, M. S. (2023). Classification and regression tree (cart) based resource allocation scheme for wireless sensor networks. Computer Communications, 197, 242-254.
  13. 13.
    Khan, S., &Mailewa, A. B. (2023). Discover botnets in IoT sensor networks: A lightweight deep learning framework with hybrid self-organizing maps. Microprocessors and Microsystems, 97, 104753.
  14. 14.
    Fredj, N., Hadj Kacem, Y., Khriji, S., Kanoun, O., Hamdi, S., & Abid, M. (2023). AI-based model driven approach for adaptive wireless sensor networks design. International Journal of Information Technology, 15(4), 1871-1883.
  15. 15.
    Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik, 273, 170419.
  16. 16.
    Oliveira, L. L. D., Eisenkraemer, G. H., Carara, E. A., Martins, J. B., & Monteiro, J. (2023). Mobile localization techniques for wireless sensor networks: Survey and recommendations. ACM Transactions on Sensor Networks, 19(2), 1-39.
  17. 17.
    Jain, K., Kumar, A., & Singh, A. (2023). Data transmission reduction techniques for improving network lifetime in wireless sensor networks: An up?to?date survey from 2017 to 2022. Transactions on Emerging Telecommunications Technologies, 34(1), e4674.
  18. 18.
    Pawar, M. V. (2023). Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. International Journal of Pervasive Computing and Communications, 19(1), 124-153.
  19. 19.
    Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A., & Shanmugapriya, M. (2023). A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks. Soft Computing, 27(7), 4157-4168.
  20. 20.
    Rabhi, S., Abbes, T., & Zarai, F. (2023). IoT routing attacks detection using machine learning algorithms. Wireless Personal Communications, 128(3), 1839-1857.
  21. 21.
    Yadav, P., & Sharma, S. C. (2023). A systematic review of localization in WSN: Machine learning and optimization?based approaches. International Journal of Communication Systems, 36(4), e5397.
  22. 22.
    DeMedeiros, K., Hendawi, A., & Alvarez, M. (2023). A survey of AI-based anomaly detection in IoT and sensor networks. Sensors, 23(3), 1352.
  23. 23.
    Mall, P. K., & Singh, P. K. (2023). Credence-Net: a semi-supervised deep learning approach for medical images. International Journal of Nanotechnology, 20(5-10), 897-914.
  24. 24.
    Subramani, S., & Selvi, M. (2023). Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks. International Journal of Information and Computer Security, 20(3-4), 439-461.
  25. 25.
    Hajializadeh, D. (2023). Deep learning-based indirect bridge damage identification system. Structural health monitoring, 22(2), 897-912.
  26. 26.
    Seyfollahi, A., Taami, T., & Ghaffari, A. (2023). Towards developing a machine learning-metaheuristic-enhanced energy-sensitive routing framework for the internet of things. Microprocessors and Microsystems, 96, 104747.
  27. 27.
    Rafique, S., Gul, S., Jan, K., & Khan, G. M. (2023). Optimized real-time parking management framework using deep learning. Expert Systems with Applications, 220, 119686.
  28. 28.
    Booth, T. M., & Ghosh, S. (2023, April). A Gradient Descent Multi-Algorithm Grid Search Optimization of Deep Learning for Sensor Fusion. In 2023 IEEE International Systems Conference (SysCon) (pp. 1-8). IEEE.
  29. 29.
    Nagy, M., L?z?roiu, G., & Valaskova, K. (2023). Machine Intelligence and Autonomous Robotic Technologies in the Corporate Context of SMEs: Deep Learning and Virtual Simulation Algorithms, Cyber-Physical Production Networks, and Industry 4.0-Based Manufacturing Systems. Applied Sciences, 13(3), 1681.
  30. 30.
    Mohammed, S. K., Singh, S., Mizouni, R., & Otrok, H. (2023). A deep learning framework for target localization in error-prone environment. Internet of Things, 22, 100713.
  31. 31.
    Alghamdi, R., & Bellaiche, M. (2023). A cascaded federated deep learning-based framework for detecting wormhole attacks in IoT networks. Computers & Security, 125, 103014.
SCOPUS
SCImago Journal & Country Rank