Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection

Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN....

Full description

Saved in:
Bibliographic Details
Published inInternational journal of advanced computer science & applications Vol. 6; no. 9
Main Authors EL, YOUSEF, TOUMANARI, AHMED, BOUIRDEN, ANOUAR, EL, NADYA
Format Journal Article
LanguageEnglish
Published West Yorkshire Science and Information (SAI) Organization Limited 01.01.2015
Subjects
Online AccessGet full text
ISSN2158-107X
2156-5570
2156-5570
DOI10.14569/IJACSA.2015.060922

Cover

Abstract Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN. In this paper we present a comparative evaluation of the most performant detection techniques in IDS for WSNs, the analyzes and comparisons of the approaches are represented technically, followed by a brief. Attacks in WSN also are presented and classified into several criteria. To implement and measure the performance of detection techniques we prepare our dataset, based on KDD'99, into five step, after normalizing our dataset, we determined normal class and 4 types of attacks, and used the most relevant attributes for the classification process. We propose applying CfsSubsetEval with BestFirst approach as an attribute selection algorithm for removing the redundant attributes. The experimental results show that the random forest methods provide high detection rate and reduce false alarm rate. Finally, a set of principles is concluded, which have to be satisfied in future research for implementing IDS in WSNs. To help researchers in the selection of IDS for WSNs, several recommendations are provided with future directions for this research. Keywords:
AbstractList Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several attacks, intrusion and security vulnerabilities. Intrusion detection system (IDS) is one of the essential security mechanism against attacks in WSN. In this paper we present a comparative evaluation of the most performant detection techniques in IDS for WSNs, the analyzes and comparisons of the approaches are represented technically, followed by a brief. Attacks in WSN also are presented and classified into several criteria. To implement and measure the performance of detection techniques we prepare our dataset, based on KDD'99, into five step, after normalizing our dataset, we determined normal class and 4 types of attacks, and used the most relevant attributes for the classification process. We propose applying CfsSubsetEval with BestFirst approach as an attribute selection algorithm for removing the redundant attributes. The experimental results show that the random forest methods provide high detection rate and reduce false alarm rate. Finally, a set of principles is concluded, which have to be satisfied in future research for implementing IDS in WSNs. To help researchers in the selection of IDS for WSNs, several recommendations are provided with future directions for this research. Keywords:
Author BOUIRDEN, ANOUAR
EL, YOUSEF
TOUMANARI, AHMED
EL, NADYA
Author_xml – sequence: 1
  givenname: YOUSEF
  surname: EL
  fullname: EL, YOUSEF
– sequence: 2
  givenname: AHMED
  surname: TOUMANARI
  fullname: TOUMANARI, AHMED
– sequence: 3
  givenname: ANOUAR
  surname: BOUIRDEN
  fullname: BOUIRDEN, ANOUAR
– sequence: 4
  givenname: NADYA
  surname: EL
  fullname: EL, NADYA
BookMark eNp9kc1O4zAUhS0EElB4AjaWZp3in9iJ2YUCM0X8LADBLroxLrikdrEdEI8wbz1pg4TESNzNPQufc64-76JN551B6ICSMc2FVIfT82pyU40ZoWJMJFGMbaAdRoXMhCjI5lqXGSXFwzbaj3FO-uGKyZLvoL9Tl0IXrXf4xCSj00rdGv3s7GtnIrYO39tgWhMjvjEu-oCvTHr34QX3LveETyABvrRupav2yQebnhfxCE_8YgkBkn0z-PQN2g7W0ccQzSPuRZUS6Jf41bqHtmbQRrP_uUfo7uz0dvInu7j-PZ1UF5lmgqXMSFEUDW1Io7kxkuVlztQsB13qsilkI7kUJSOFeBSUq1LlinMyIwXlRCkogI9QPuR2bgkf79C29TLYBYSPmpJ6TbS2c9AR6hXReiDa234NtmXwKzKpnvsuuP7SmkkhRd_YF44QH17p4GMMZvZ_9vBb37LVN5e2ac0rBbDtj95_HMabjw
CitedBy_id crossref_primary_10_3233_JIFS_232532
crossref_primary_10_1002_cpe_7332
crossref_primary_10_1007_s11082_023_05659_y
crossref_primary_10_1016_j_matpr_2020_12_1027
crossref_primary_10_4018_IJCWT_2017040103
crossref_primary_10_1007_s13198_023_02128_3
crossref_primary_10_1007_s13198_023_02090_0
ContentType Journal Article
Copyright 2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2015. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
3V.
7XB
8FE
8FG
8FK
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
GUQSH
HCIFZ
JQ2
K7-
M2O
MBDVC
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
DOI 10.14569/IJACSA.2015.060922
DatabaseName CrossRef
ProQuest Central (Corporate)
ProQuest Central (purchase pre-March 2016)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Research Library
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection (via ProQuest SciTech Premium Collection)
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Research Library
Research Library (Corporate)
Advanced Technologies & Aerospace Database (ProQuest)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Publicly Available Content Database
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Research Library
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
ProQuest Central Basic
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2156-5570
ExternalDocumentID 10.14569/ijacsa.2015.060922
10_14569_IJACSA_2015_060922
GroupedDBID .DC
5VS
8G5
AAYXX
ABUWG
ADMLS
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CITATION
DWQXO
EBS
EJD
GNUQQ
GUQSH
HCIFZ
K7-
KQ8
M2O
OK1
PHGZM
PHGZT
PIMPY
PQGLB
PUEGO
RNS
3V.
7XB
8FE
8FG
8FK
JQ2
MBDVC
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
Q9U
ADTOC
UNPAY
ID FETCH-LOGICAL-c252t-e6577b1b0bc3ee6248429f4ac8c8b76b636582075d51398949330f0713099a7a3
IEDL.DBID BENPR
ISSN 2158-107X
2156-5570
IngestDate Tue Aug 19 19:37:15 EDT 2025
Mon Jul 14 08:29:45 EDT 2025
Thu Apr 24 22:54:00 EDT 2025
Wed Oct 01 04:49:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 9
Language English
License cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c252t-e6577b1b0bc3ee6248429f4ac8c8b76b636582075d51398949330f0713099a7a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://www.proquest.com/docview/2656507551?pq-origsite=%requestingapplication%&accountid=15518
PQID 2656507551
PQPubID 5444811
ParticipantIDs unpaywall_primary_10_14569_ijacsa_2015_060922
proquest_journals_2656507551
crossref_primary_10_14569_IJACSA_2015_060922
crossref_citationtrail_10_14569_IJACSA_2015_060922
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20150101
PublicationDateYYYYMMDD 2015-01-01
PublicationDate_xml – month: 01
  year: 2015
  text: 20150101
  day: 01
PublicationDecade 2010
PublicationPlace West Yorkshire
PublicationPlace_xml – name: West Yorkshire
PublicationTitle International journal of advanced computer science & applications
PublicationYear 2015
Publisher Science and Information (SAI) Organization Limited
Publisher_xml – name: Science and Information (SAI) Organization Limited
SSID ssj0000392683
Score 2.0184207
Snippet Wireless sensor network (WSN) consists of sensor nodes. Deployed in the open area, and characterized by constrained resources, WSN suffers from several...
SourceID unpaywall
proquest
crossref
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
SubjectTerms Algorithms
Data mining
Datasets
False alarms
Intrusion detection systems
Sensors
Wireless sensor networks
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV1Lb9QwEB6V7QEulKdYKMgHjmQ369h5cAu7rdpKXVVqFy0ny3acdiEkqyYVgn_Ahd_MeJ1kiyohceHmSI4nimc839jjbwDeah1LlU0QuQXG91hCcw_diO8ljPE8CuJIbyiFTufh0YKdLPlyB7qjGAQ9tXQn-DNLFl_JrB5_3NhpOK-S8ZlcY-iO8dNxae8k4KeLmWk2SUuluOhYT2uxKoXNHi1wtRDnGA9W12Lu0qpH6yy_B7shR-g-gN3F_Cz9ZAvQYRzjWToq17aUp9GyZSlCjJGMV5-lri1R0YSP_NBPKP3Tk23h6f2bci2_f5NFcctTHe7Br-6-j0tQ-TK6adRI_7hL__h_fsIjeNhiXpI6JX0MO6Z8AntdPQnSLi9P4WcvifSSyFYSWZWkk0ScJNJKIjZ9_5LMZCPJ6abkBUmLy-p61Vx9rd-T6ZbinBz09ObkA3rwjGAjbRpLNbCV-gwWhwcX0yOvLRXhacpp45mQR5GaKF_pwJiQshj9bM6kjnWsolCFASItivAo4wh544TZfZzcRuiIkGUkg-cwKKvSvACSZb7i0tCIy4QphpamrTeZaBNkiB3jIdBu2oVuedRtOY9C2HjK6oo4Pkmn56mwuiKcrgzhXf_S2tGI_L37fqdPol1TakEReiN6R4g7BK_XsbvDOU29PdzLf-z_Ch7YJ7fTtA8DnHvzGrFXo960FvMb8p41tA
  priority: 102
  providerName: Unpaywall
Title Intrusion Detection Techniques in Wireless Sensor Network using Data Mining Algorithms: Comparative Evaluation Based on Attacks Detection
URI https://www.proquest.com/docview/2656507551
http://thesai.org/Downloads/Volume6No9/Paper_22-Intrusion_Detection_Techniques_in_Wireless_Sensor_Network.pdf
UnpaywallVersion publishedVersion
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Colorado Digital library
  customDbUrl:
  eissn: 2156-5570
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000392683
  issn: 2158-107X
  databaseCode: KQ8
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2156-5570
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000392683
  issn: 2158-107X
  databaseCode: BENPR
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT9wwEB7BcmgvLX2JbQHNocemZB3nhVRVYdktIBGhwkrbU2Q7XkqVZrdsqqo_of-amTx2QZU4JQfHkfzZM5_H428A3hsTKZ0PiLl51nVkLGYOuRHXiaX0Z6EXhaaWFDpPg5OJPJv60w1Iu7swnFbZ2cTaUOdzwzHyA0HEg7gLOfjPi18OV43i09WuhIZqSyvkn2qJsU3YEqyM1YOto1F68XUVdXGJDgS1Nie5OtY1DaetFBERifjg9CwZXiac8OV_dAM3FuKhu1pz0Ce_y4X6-0cVxT13NN6GZy2PxKQB_gVs2PIlPO9qNGC7ZF_Bv9OSr1XQ6OOxreq8qxKvOuHWJd6UyAmwBRk8vKQt7fwW0yYzHDkl_hqPVaXwvC4jgUlxTUNSff-5PMThWjYcRyvJcDwir5gjvSRVxdf31399DZPx6Gp44rTlFxwjfFE5NvDDUA-0q41nbSBkRL5rJpWJTKTDQAcesRdBkOQ-0cgolhwbmfGul1inCpX3BnrlvLQ7gHnual9ZEfoqllrS7DVsoQfGejnxsagPohvlzLTa5Fwio8h4j8LQZA00GUOTNdD04cPqo0UjzfF4890Ovqxdp8tsPav64Kwg_b-7mx_KLNX97t4-3t07eMqNm2DNLvQIartH9KXS-7AZjb_stzOTnpP0Ivl2B9Sy7ls
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9NAEB2V9lAufCNSCuwBbpg66_UXUoXcJFXSNhGiqZSb2V1vSivjBGxU9Sfwp_htzNjrpAipt9588M5Kfrszb9azbwDeah1JlXWRuXnGdUTM5w6GEdeJhfDnoReFupYUGk-C4Zk4mvmzDfjT3oWhssrWJ9aOOltoOiPf40g8kLtggP-0_OFQ1yj6u9q20JC2tUK2X0uM2Ysdx-b6ClO4cn_UR7zfcX44mPaGju0y4Gju88oxgR-GqqtcpT1jAi4idNFzIXWkIxUGKvAwSHOcOfORLUWxoCOAOSV3SK5kKD20ew-2hCdiTP62DgaTz19Wpzwu0o-g1gLF0Eo6quHMSh8hcYn3RkdJ7zShAjP_gxu4Mef_hsc1593-VSzl9ZXM8xvh7_ARPLC8lSXNQnsMG6Z4Ag_bnhDMuoin8HtU0DUORJv1TVXXeRVs2grFluyiYFRwm6ODZaeYQi9-sklTic6oBP-c9WUl2bhuW8GS_BwhqL59Lz-y3lqmnA1WEuXsAKNwxvAhqSqSC1jP-gzO7gSI57BZLArzAliWucqXhoe-jIUSuFs0RYSuNl6G_C_qAG-_cqqtFjq15MhTyokImrSBJiVo0gaaDrxfDVo2UiC3v77bwpdav1Cm61XcAWcF6f_mLi6lLuVNczu3m3sD28Pp-CQ9GU2OX8J9GtgcFO3CJsJuXiF1qtRruz4ZfL3rLfEXuZwmFg
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwvV1Lb9QwEB6V7QEulKdYKMgHjmQ369h5cAu7rdpKXVVqFy0ny3acdiEkqyYVgn_Ahd_MeJ1kiyohceHmSI4nimc839jjbwDeah1LlU0QuQXG91hCcw_diO8ljPE8CuJIbyiFTufh0YKdLPlyB7qjGAQ9tXQn-DNLFl_JrB5_3NhpOK-S8ZlcY-iO8dNxae8k4KeLmWk2SUuluOhYT2uxKoXNHi1wtRDnGA9W12Lu0qpH6yy_B7shR-g-gN3F_Cz9ZAvQYRzjWToq17aUp9GyZSlCjJGMV5-lri1R0YSP_NBPKP3Tk23h6f2bci2_f5NFcctTHe7Br-6-j0tQ-TK6adRI_7hL__h_fsIjeNhiXpI6JX0MO6Z8AntdPQnSLi9P4WcvifSSyFYSWZWkk0ScJNJKIjZ9_5LMZCPJ6abkBUmLy-p61Vx9rd-T6ZbinBz09ObkA3rwjGAjbRpLNbCV-gwWhwcX0yOvLRXhacpp45mQR5GaKF_pwJiQshj9bM6kjnWsolCFASItivAo4wh544TZfZzcRuiIkGUkg-cwKKvSvACSZb7i0tCIy4QphpamrTeZaBNkiB3jIdBu2oVuedRtOY9C2HjK6oo4Pkmn56mwuiKcrgzhXf_S2tGI_L37fqdPol1TakEReiN6R4g7BK_XsbvDOU29PdzLf-z_Ch7YJ7fTtA8DnHvzGrFXo960FvMb8p41tA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Intrusion+Detection+Techniques+in+Wireless+Sensor+Network+using+Data+Mining+Algorithms%3A+Comparative+Evaluation+Based+on+Attacks+Detection&rft.jtitle=International+journal+of+advanced+computer+science+%26+applications&rft.au=EL%2C+YOUSEF&rft.au=TOUMANARI%2C+AHMED&rft.au=BOUIRDEN%2C+ANOUAR&rft.au=EL%2C+NADYA&rft.date=2015-01-01&rft.issn=2158-107X&rft.eissn=2156-5570&rft.volume=6&rft.issue=9&rft_id=info:doi/10.14569%2FIJACSA.2015.060922&rft.externalDBID=n%2Fa&rft.externalDocID=10_14569_IJACSA_2015_060922
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-107X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-107X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-107X&client=summon