SECURING WIRELESS SENSOR NETWORKS USING DEEP LEARNING-BASED APPROACH FOR ELIMINATING DATA MODIFICATION IN SENSOR NODES
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffb80733000000982b140001000200
Wireless Sensor Networks (WSNs) play a pivotal role in various domains, including environmental monitoring, surveillance, and industrial automation. However, the inherent vulnerabilities in WSNs make them susceptible to various security threats, such as data modification attacks, which can compromise the integrity and reliability of collected sensor data. To address this issue, we propose a novel approach called Residual Recurrent Transfer Learning (RRTL) to enhance the security of WSNs and eliminate data modification in sensor nodes. RRTL leverages the power of deep learning and transfer learning techniques to develop an intelligent and adaptable security framework. The proposed approach trains a deep residual recurrent neural network (RNN) model using a large dataset of normal sensor readings. This model learns the temporal patterns and dependencies in the data, enabling it to identify abnormal sensor readings that might indicate data modification attempts. To evaluate the effectiveness of RRTL, we conducted extensive experiments using a real-world WSN deployment. The results demonstrate that our approach significantly outperforms existing security mechanisms in terms of accuracy, detection rate, and false positive rate. Furthermore, RRTL exhibits robustness against adversarial attacks and dynamic environmental conditions, making it suitable for real-time applications in challenging WSN environments.

Authors
S. Karthigai1, Sushiladevi B. Vantamuri2, C. Arunpriya3, Vinod Desai4, A. Nicholas Daniel5
Navarasam Arts and Science College, India1, S.G. Balekundri Institute of Technology, India2, PSG College of Arts and Science, India3, BLDEA’s V. P. Dr. P. G. Halakatti College of Engineering and Technology, India4, Mukuba University, Zambia5

Keywords
Securing, Wireless Sensor Networks, Residual Recurrent Transfer Learning, Eliminating, Data Modification, Sensor Nodes
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
122002010001
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 14 , Issue: 2 , Pages: 2939 - 2944 )
Date of Publication :
June 2023
Page Views :
879
Full Text Views :
25

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.