← Back to Articles
⚠️
IEEE Published Article
This article is published by IEEE and the copyright belongs to IEEE. Please click here to access the full text.

Augmenting Cybersecurity in WSN: AI-Based Clone Attacks Recognition Framework

View PDF

Abstract

Applications such as industrial automation, healthcare, and environmental monitoring need the use of wireless sensor networks (WSNs). However, due to their dispersed organizational makeup, they have become vulnerable to security risks, particularly clone assaults. To protect confidentiality, availability, and confidentiality, several attacks must be recognized and prevented. This project aims to offer an effective method for identifying and averting clone assaults. To identify cloned both nationally and internationally use a low-cost verification process. In this study, we offer a new adaptive sea-horse optimized light gradient boosting machine (ASHO-LGBM) technique for protecting the network against node identity duplicates. The ASHO approach is used in the ASHO-LGBM framework to improve the recognition accuracy of the light gradient boosting machine (LGBM) characteristics. The replications with the nodes intrusion detection (ID) are used to choose a most trustworthy communication mode. The procedure is intended to be implemented and used for gathering data through an internet component. Using a Python tool, the suggested technique is simulated and its delay, packet delivery ratio, packet drop, and energy are evaluated. When compared to other approaches, the study’s results show that the ASHO-LGBM strategy’s performance analysis achieves the highest accuracy rate.

Keywords

Wireless sensor networks (WSNs) cybersecurity attacks recognition adaptive sea-horse optimized light gradient boosting machine (ASHO-LGBM)

Authors

S. C. V. Bhaskar
Department of IT, MVSR Engineering College, Hyderabad, Telangana, India
G. Kalyani
Big Data Analytics, Karpaga Vinayaga College of Engineering and Technology, Chengalpattu, Tamil Nadu, India
R. Al-Fatlawy
Department of Computer Technical Engineering, College of Technical Engineering, The Islamic University, Najaf, Iraq
F. Alsalamy
Medical Laboratories Techniques Department, Al-Mustaqbal University, Hillah, Iraq
W. H. M. Kurdi
Department of Computer Science, Altoosi University College, 2, Iraq
H. M. Al-Aboudy
Department of Computer Techniques Engineering, Mazaya University College, DhiQar, Iraq
G. Sujatha
Department of ECE, Arunai Engineering College, Tiruvannamalai, Tamil Nadu, India

Publication Details

Type
proceedings
Publisher
IEEE
Volume
Issue
ISSN
Citations
0
Views
8