Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection
Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN....
Saved in:
| Published in | International journal of advanced computer science & applications Vol. 6; no. 9 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
West Yorkshire
Science and Information (SAI) Organization Limited
01.01.2015
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2158-107X 2156-5570 2156-5570 |
| DOI | 10.14569/IJACSA.2015.060922 |
Cover
| Abstract | Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN. In this paper we present a comparative evaluation of the most performant detection techniques in IDS for WSNs, the analyzes and comparisons of the approaches are represented technically, followed by a brief. Attacks in WSN also are presented and classified into several criteria. To implement and measure the performance of detection techniques we prepare our dataset, based on KDD'99, into five step, after normalizing our dataset, we determined normal class and 4 types of attacks, and used the most relevant attributes for the classification process. We propose applying CfsSubsetEval with BestFirst approach as an attribute selection algorithm for removing the redundant attributes. The experimental results show that the random forest methods provide high detection rate and reduce false alarm rate. Finally, a set of principles is concluded, which have to be satisfied in future research for implementing IDS in WSNs. To help researchers in the selection of IDS for WSNs, several recommendations are provided with future directions for this research. Keywords: |
|---|---|
| AbstractList | Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN. In this paper we present a comparative evaluation of the most performant detection techniques in IDS for WSNs, the analyzes and comparisons of the approaches are represented technically, followed by a brief. Attacks in WSN also are presented and classified into several criteria. To implement and measure the performance of detection techniques we prepare our dataset, based on KDD'99, into five step, after normalizing our dataset, we determined normal class and 4 types of attacks, and used the most relevant attributes for the classification process. We propose applying CfsSubsetEval with BestFirst approach as an attribute selection algorithm for removing the redundant attributes. The experimental results show that the random forest methods provide high detection rate and reduce false alarm rate. Finally, a set of principles is concluded, which have to be satisfied in future research for implementing IDS in WSNs. To help researchers in the selection of IDS for WSNs, several recommendations are provided with future directions for this research. Keywords: |
| Author | BOUIRDEN, ANOUAR EL, YOUSEF TOUMANARI, AHMED EL, NADYA |
| Author_xml | – sequence: 1 givenname: YOUSEF surname: EL fullname: EL, YOUSEF – sequence: 2 givenname: AHMED surname: TOUMANARI fullname: TOUMANARI, AHMED – sequence: 3 givenname: ANOUAR surname: BOUIRDEN fullname: BOUIRDEN, ANOUAR – sequence: 4 givenname: NADYA surname: EL fullname: EL, NADYA |
| BookMark | eNp9kc1O4zAUhS0EElB4AjaWZp3in9iJ2YUCM0X8LADBLroxLrikdrEdEI8wbz1pg4TESNzNPQufc64-76JN551B6ICSMc2FVIfT82pyU40ZoWJMJFGMbaAdRoXMhCjI5lqXGSXFwzbaj3FO-uGKyZLvoL9Tl0IXrXf4xCSj00rdGv3s7GtnIrYO39tgWhMjvjEu-oCvTHr34QX3LveETyABvrRupav2yQebnhfxCE_8YgkBkn0z-PQN2g7W0ccQzSPuRZUS6Jf41bqHtmbQRrP_uUfo7uz0dvInu7j-PZ1UF5lmgqXMSFEUDW1Io7kxkuVlztQsB13qsilkI7kUJSOFeBSUq1LlinMyIwXlRCkogI9QPuR2bgkf79C29TLYBYSPmpJ6TbS2c9AR6hXReiDa234NtmXwKzKpnvsuuP7SmkkhRd_YF44QH17p4GMMZvZ_9vBb37LVN5e2ac0rBbDtj95_HMabjw |
| CitedBy_id | crossref_primary_10_3233_JIFS_232532 crossref_primary_10_1002_cpe_7332 crossref_primary_10_1007_s11082_023_05659_y crossref_primary_10_1016_j_matpr_2020_12_1027 crossref_primary_10_4018_IJCWT_2017040103 crossref_primary_10_1007_s13198_023_02128_3 crossref_primary_10_1007_s13198_023_02090_0 |
| ContentType | Journal Article |
| Copyright | 2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7XB 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- M2O MBDVC P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.14569/IJACSA.2015.060922 |
| DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One Community College ProQuest Central Korea ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database (ProQuest) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Research Library Prep Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2156-5570 |
| ExternalDocumentID | 10.14569/ijacsa.2015.060922 10_14569_IJACSA_2015_060922 |
| GroupedDBID | .DC 5VS 8G5 AAYXX ABUWG ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CCPQU CITATION DWQXO EBS EJD GNUQQ GUQSH HCIFZ K7- KQ8 M2O OK1 PHGZM PHGZT PIMPY PQGLB PUEGO RNS 3V. 7XB 8FE 8FG 8FK JQ2 MBDVC P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| ID | FETCH-LOGICAL-c252t-e6577b1b0bc3ee6248429f4ac8c8b76b636582075d51398949330f0713099a7a3 |
| IEDL.DBID | BENPR |
| ISSN | 2158-107X 2156-5570 |
| IngestDate | Tue Aug 19 19:37:15 EDT 2025 Mon Jul 14 08:29:45 EDT 2025 Thu Apr 24 22:54:00 EDT 2025 Wed Oct 01 04:49:10 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 9 |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c252t-e6577b1b0bc3ee6248429f4ac8c8b76b636582075d51398949330f0713099a7a3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/2656507551?pq-origsite=%requestingapplication%&accountid=15518 |
| PQID | 2656507551 |
| PQPubID | 5444811 |
| ParticipantIDs | unpaywall_primary_10_14569_ijacsa_2015_060922 proquest_journals_2656507551 crossref_primary_10_14569_IJACSA_2015_060922 crossref_citationtrail_10_14569_IJACSA_2015_060922 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20150101 |
| PublicationDateYYYYMMDD | 2015-01-01 |
| PublicationDate_xml | – month: 01 year: 2015 text: 20150101 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | West Yorkshire |
| PublicationPlace_xml | – name: West Yorkshire |
| PublicationTitle | International journal of advanced computer science & applications |
| PublicationYear | 2015 |
| Publisher | Science and Information (SAI) Organization Limited |
| Publisher_xml | – name: Science and Information (SAI) Organization Limited |
| SSID | ssj0000392683 |
| Score | 2.0184207 |
| Snippet | Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several... |
| SourceID | unpaywall proquest crossref |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database |
| SubjectTerms | Algorithms Data mining Datasets False alarms Intrusion detection systems Sensors Wireless sensor networks |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV1Lb9QwEB6V7QEulKdYKMgHjmQ369h5cAu7rdpKXVVqFy0ny3acdiEkqyYVgn_Ahd_MeJ1kiyohceHmSI4nimc839jjbwDeah1LlU0QuQXG91hCcw_diO8ljPE8CuJIbyiFTufh0YKdLPlyB7qjGAQ9tXQn-DNLFl_JrB5_3NhpOK-S8ZlcY-iO8dNxae8k4KeLmWk2SUuluOhYT2uxKoXNHi1wtRDnGA9W12Lu0qpH6yy_B7shR-g-gN3F_Cz9ZAvQYRzjWToq17aUp9GyZSlCjJGMV5-lri1R0YSP_NBPKP3Tk23h6f2bci2_f5NFcctTHe7Br-6-j0tQ-TK6adRI_7hL__h_fsIjeNhiXpI6JX0MO6Z8AntdPQnSLi9P4WcvifSSyFYSWZWkk0ScJNJKIjZ9_5LMZCPJ6abkBUmLy-p61Vx9rd-T6ZbinBz09ObkA3rwjGAjbRpLNbCV-gwWhwcX0yOvLRXhacpp45mQR5GaKF_pwJiQshj9bM6kjnWsolCFASItivAo4wh544TZfZzcRuiIkGUkg-cwKKvSvACSZb7i0tCIy4QphpamrTeZaBNkiB3jIdBu2oVuedRtOY9C2HjK6oo4Pkmn56mwuiKcrgzhXf_S2tGI_L37fqdPol1TakEReiN6R4g7BK_XsbvDOU29PdzLf-z_Ch7YJ7fTtA8DnHvzGrFXo960FvMb8p41tA priority: 102 providerName: Unpaywall |
| Title | Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection |
| URI | https://www.proquest.com/docview/2656507551 http://thesai.org/Downloads/Volume6No9/Paper_22-Intrusion_Detection_Techniques_in_Wireless_Sensor_Network.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 6 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Colorado Digital library customDbUrl: eissn: 2156-5570 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000392683 issn: 2158-107X databaseCode: KQ8 dateStart: 20100101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2156-5570 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000392683 issn: 2158-107X databaseCode: BENPR dateStart: 20100101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT9wwEB7BcmgvLX2JbQHNocemZB3nhVRVYdktIBGhwkrbU2Q7XkqVZrdsqqo_of-amTx2QZU4JQfHkfzZM5_H428A3hsTKZ0PiLl51nVkLGYOuRHXiaX0Z6EXhaaWFDpPg5OJPJv60w1Iu7swnFbZ2cTaUOdzwzHyA0HEg7gLOfjPi18OV43i09WuhIZqSyvkn2qJsU3YEqyM1YOto1F68XUVdXGJDgS1Nie5OtY1DaetFBERifjg9CwZXiac8OV_dAM3FuKhu1pz0Ce_y4X6-0cVxT13NN6GZy2PxKQB_gVs2PIlPO9qNGC7ZF_Bv9OSr1XQ6OOxreq8qxKvOuHWJd6UyAmwBRk8vKQt7fwW0yYzHDkl_hqPVaXwvC4jgUlxTUNSff-5PMThWjYcRyvJcDwir5gjvSRVxdf31399DZPx6Gp44rTlFxwjfFE5NvDDUA-0q41nbSBkRL5rJpWJTKTDQAcesRdBkOQ-0cgolhwbmfGul1inCpX3BnrlvLQ7gHnual9ZEfoqllrS7DVsoQfGejnxsagPohvlzLTa5Fwio8h4j8LQZA00GUOTNdD04cPqo0UjzfF4890Ovqxdp8tsPav64Kwg_b-7mx_KLNX97t4-3t07eMqNm2DNLvQIartH9KXS-7AZjb_stzOTnpP0Ivl2B9Sy7ls |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9NAEB2V9lAufCNSCuwBbpg66_UXUoXcJFXSNhGiqZSb2V1vSivjBGxU9Sfwp_htzNjrpAipt9588M5Kfrszb9azbwDeah1JlXWRuXnGdUTM5w6GEdeJhfDnoReFupYUGk-C4Zk4mvmzDfjT3oWhssrWJ9aOOltoOiPf40g8kLtggP-0_OFQ1yj6u9q20JC2tUK2X0uM2Ysdx-b6ClO4cn_UR7zfcX44mPaGju0y4Gju88oxgR-GqqtcpT1jAi4idNFzIXWkIxUGKvAwSHOcOfORLUWxoCOAOSV3SK5kKD20ew-2hCdiTP62DgaTz19Wpzwu0o-g1gLF0Eo6quHMSh8hcYn3RkdJ7zShAjP_gxu4Mef_hsc1593-VSzl9ZXM8xvh7_ARPLC8lSXNQnsMG6Z4Ag_bnhDMuoin8HtU0DUORJv1TVXXeRVs2grFluyiYFRwm6ODZaeYQi9-sklTic6oBP-c9WUl2bhuW8GS_BwhqL59Lz-y3lqmnA1WEuXsAKNwxvAhqSqSC1jP-gzO7gSI57BZLArzAliWucqXhoe-jIUSuFs0RYSuNl6G_C_qAG-_cqqtFjq15MhTyokImrSBJiVo0gaaDrxfDVo2UiC3v77bwpdav1Cm61XcAWcF6f_mLi6lLuVNczu3m3sD28Pp-CQ9GU2OX8J9GtgcFO3CJsJuXiF1qtRruz4ZfL3rLfEXuZwmFg |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV1Lb9QwEB6V7QEulKdYKMgHjmQ369h5cAu7rdpKXVVqFy0ny3acdiEkqyYVgn_Ahd_MeJ1kiyohceHmSI4nimc839jjbwDeah1LlU0QuQXG91hCcw_diO8ljPE8CuJIbyiFTufh0YKdLPlyB7qjGAQ9tXQn-DNLFl_JrB5_3NhpOK-S8ZlcY-iO8dNxae8k4KeLmWk2SUuluOhYT2uxKoXNHi1wtRDnGA9W12Lu0qpH6yy_B7shR-g-gN3F_Cz9ZAvQYRzjWToq17aUp9GyZSlCjJGMV5-lri1R0YSP_NBPKP3Tk23h6f2bci2_f5NFcctTHe7Br-6-j0tQ-TK6adRI_7hL__h_fsIjeNhiXpI6JX0MO6Z8AntdPQnSLi9P4WcvifSSyFYSWZWkk0ScJNJKIjZ9_5LMZCPJ6abkBUmLy-p61Vx9rd-T6ZbinBz09ObkA3rwjGAjbRpLNbCV-gwWhwcX0yOvLRXhacpp45mQR5GaKF_pwJiQshj9bM6kjnWsolCFASItivAo4wh544TZfZzcRuiIkGUkg-cwKKvSvACSZb7i0tCIy4QphpamrTeZaBNkiB3jIdBu2oVuedRtOY9C2HjK6oo4Pkmn56mwuiKcrgzhXf_S2tGI_L37fqdPol1TakEReiN6R4g7BK_XsbvDOU29PdzLf-z_Ch7YJ7fTtA8DnHvzGrFXo960FvMb8p41tA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intrusion+Detection+Techniques+in+Wireless+Sensor+Network+using+Data+Mining+Algorithms%3A+Comparative+Evaluation+Based+on+Attacks+Detection&rft.jtitle=International+journal+of+advanced+computer+science+%26+applications&rft.au=EL%2C+YOUSEF&rft.au=TOUMANARI%2C+AHMED&rft.au=BOUIRDEN%2C+ANOUAR&rft.au=EL%2C+NADYA&rft.date=2015-01-01&rft.issn=2158-107X&rft.eissn=2156-5570&rft.volume=6&rft.issue=9&rft_id=info:doi/10.14569%2FIJACSA.2015.060922&rft.externalDBID=n%2Fa&rft.externalDocID=10_14569_IJACSA_2015_060922 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-107X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-107X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-107X&client=summon |