A deep learning approach to predict the number of -barriers for intrusion detection over a circular region using wireless sensor networks

Abhilash Singh J. Amutha Jaiprakash Nagar Sandeep Sharma Fluvial Geomorphology and Remote Sensing Laboratory, Indian Institute of Science Education and Research Bhopal, India University School of ICT, Gautam Buddha University, Greater Noida, India Subir Chowdhury School of Quality and Reliability, Indian Institute of Technology Kharagpur, India Madhav Institute of Technology and Science, Gwalior, Madhya Pradesh, India
Abstract

Wireless Sensor Networks (WSNs) is a promising technology with enormous applications in almost every walk of life. One of the crucial applications of WSNs is intrusion detection and surveillance at the border areas and in the defense establishments. The border areas are stretched in hundreds to thousands of miles, hence, it is not possible to patrol the entire border region. As a result, an enemy may enter from any point absence of surveillance and cause the loss of lives or destroy the military establishments. WSNs can be a feasible solution for the problem of intrusion detection and surveillance at the border areas. Detection of an enemy at the border areas and nearby critical areas such as military cantonments is a time-sensitive task as a delay of few seconds may have disastrous consequences. Therefore, it becomes imperative to design systems that are able to identify and detect the enemy as soon as it comes in the range of the deployed system. In this paper, we have proposed a deep learning architecture based on a fully connected feed-forward Artificial Neural Network (ANN) for the accurate prediction of the number of -barriers for fast intrusion detection and prevention. We have trained and evaluated the feed-forward ANN model using four potential features, namely area of the circular region, sensing range of sensors, the transmission range of sensors, and the number of sensor for Gaussian and uniform sensor distribution. These features are extracted through Monte Carlo simulation. In doing so, we found that the model accurately predicts the number of -barriers for both Gaussian and uniform sensor distribution with correlation coefficient (R = 0.78) and Root Mean Square Error (RMSE = 41.15) for the former and R = 0.79 and RMSE = 48.36 for the latter. Further, the proposed approach outperforms the other benchmark algorithms in terms of accuracy and computational time complexity.

keywords:
WSNs, Binary Sensing Model, Gaussian distribution, uniform distribution, Barrier Coverage, Deep learning
journal: Expert Systems with Applications

1 Introduction

The unquenchable thirst of people for political and military power is compelling them to extend their boundaries and grab other people’s natural resources. In order to achieve this goal, they may try different techniques such as gaining information about the military establishments, the number of military personnel at a given place, regions of natural resources, and the vulnerabilities of authorities that they can exploit. In addition, illegal immigration, smuggling of drugs, and other banned commodities across the boundaries are immediate concerns that must be dealt with immediately. Therefore, it is crucial to identify an intruder or an unauthorised activity accurately in a timely manner as they all are time-sensitive issues that may result in havoc if not prevented in time. Furthermore, encroachment in the border areas and unauthorised entry in the prohibited regions is a serious issue making border surveillance mandatory.

It is a well-known fact that most real-life problems can be solved with the help of suitable technologies. Fortunately, WSNs are widely used and is a popular technology that can resolve the concerned issue (Keung et al., 2012; Huang et al., 2018; Singh et al., 2021c, 2019). WSNs are widely deployed for various military applications such as intrusion detection in border areas, combat monitoring, an unauthorised access to prohibited areas, land mines detection, battlefield surveillance, reconnaissance, and so on (Si et al., 2020; Sharma and Nagar, 2020; Kandris et al., 2020; Amutha et al., 2020).

Researchers have proposed various border surveillance and intrusion detection techniques using WSNs (Mostafaei et al., 2018; Amutha et al., 2021a; Benahmed and Benahmed, 2019; Aseeri et al., 2017; Karthick et al., 2019; Karanja and Badru, 2021; Arjun et al., 2019; Gavel et al., 2021). The proposed techniques use either simulations or Internet of Things (IoT) methods to validate their techniques. However, simulation methods for the validation of proposed techniques have high time complexity, i.e., the time taken to obtain a single output at a given value of sensor and sensing range is in several hours. Also, IoT devices are very expensive and require a huge amount of financial investment. The high time complexity and financial issues can be minimised to a negligible level using machine learning approaches to validate and predict the performance of WSNs before their actual deployment in a given region (Mishra et al., 2018; Singh et al., 2021b; Kotiyal et al., 2021). However, the accurate and timely detection and prevention of intrusion through machine learning approaches is still an ill-posed problem that has been insufficiently investigated. To address this issue, we propose a deep learning architecture for accurate and timely intrusion detection and prevention.

In this paper, we proposed a fully connected feed-forward ANN architecture for the prediction of the number of -barriers for accurate intrusion detection and prevention in WSNs using potential features. We have extracted four features, namely area of the circular region, sensing range of sensors, the transmission range of sensors, and the number of sensors through the Monte Carlo simulation approach. Afterward, we used these features to trained and evaluated the performance of the feed-forward ANN model using R, RMSE, bias, and computational time complexity as performance metrics.

Further, the rest of the paper is divided into seven sections. In Section 2, we have discussed the related works. In Section 3, we have presented the system model. In this section, we have discussed the sensor distribution models and the sensing model. In Section 4, we have discussed the simulation experiment. In Section 5, we have discussed the machine learning model. In this section, we have discussed the feature importance, feature sensitivity, and model setup. In Section 6, we have presented the results. Lastly, in Section 7 and 8, we have presented the discussion and conclusion of this study, respectively.

2 Related Works

Deep learning is a subset of machine learning algorithms which has been applied for intrusion detection using WSNs (Lee et al., 2021; Amutha et al., 2021b; Singh et al., 2022a; Sood et al., 2022; Singh et al., 2022b). It is also employed for pattern matching and network security where it identifies the malicious activities occurring in the network and is termed as Network Intrusion Detection System (NIDS). The accuracy of the NIDS can be improved with the help of Recurrent Neural Network IDS (RNNIDS) (Sohi et al., 2021) which is capable to identify the complex patterns resulting in an enhanced intrusion detection rate. Authors in Yin et al. (2017) have proposed an RNNs approach which examines the system behaviour, type of intrusion, and the impact of intrusion on the intrusion detection accuracy with the help of learning rate and the number of neurons. The major limitation of RNNIDS is that it fails to minimise the false positives; thus, not able to achieve the maximum detection rate. This issue has been dealt with the help of a deep learning architecture that combines classifiers with Convolution Neural Networks (CNN) having Long Short Term Memory (LSTM), thus, offering maximum detection rate (Pektaş and Acarman, 2019). Here, the CNN acquires spatial information, and the LSTM acquires temporal features from the received packets in the network. The optimal parameters in the feature space are obtained by employing an estimator known as tree-structured Parzen. This method focuses on generating flow-based statistical features rather than data-set features. Although the abnormal traffic can be detected with an accuracy rate of 99.09 % and false alarm rate 0.0227, it fails to compute the computational time complexity of flow-based intrusion detection method.

A deep learning approach that uses an auto-encoder strategy exhibits an improvement in the time complexity by 18.12% (Abbasi et al., 2021). This strategy uses multi-layer perception to replace the detection of hierarchical features and unsupervised feature learning. Thus, it enhances the pattern matching mechanism for intrusion detection with the help of Deep Learning-based Feature Extraction (DLFE), which is an Optimisation of Pattern Matching (OPM) approaches. Another approach called Scale-Hybrid-IDS-AlertNet (SHIA) (Vinayakumar et al., 2019) performs data computation at the network and the host-level for the intrusion detection and to deliver the relevant alert notifications to the controller automatically. A Deep Neural Network (DNN) can render an effective IDS that can detect and classify the intruders crossing the Region of Interest (RoI). Here, the performance of SHIA is measured in terms of multi-class classification of the DNN, accuracy, True Positive Rate (TPR), and False-Positive Rate (FPR). Although SHIA is scalable and shows improved performance in handling large data-sets of real-time systems, it does not compute the number of -barriers and incurs high computational cost.

Despite having a high computational complexity, ensemble-based techniques have a high level of accuracy as compared to the base models. An ensemble based DNN framework for the continuous analysis of intrusion detection along with the ability to learn hierarchical data-sets automatically has been proposed in Folino et al. (2021). Here, a log-stream of an intrusion detection system maintains an ensemble that contains classifiers trained on discrete chunks of the data-set instance and a combiner model. The combiner model performs reasoning on the instance parameters and classifier predictions; after that, the efficacy is computed in terms of data scarcity and accuracy that allows to analyse the divers ensemble aggregation strategies. This ensemble approach utilises the unstructured data that does not comply with the transfer learning strategies and is found in the log-stream of NIDS.

Barrier coverage using WSNs plays a crucial role for the detection of an unauthorised personnel or object trying to enter the prohibited region. Barriers are formed by the sensors deployed over the entire given RoI. The early depletion of sensor’s energy leads to the failure of the sensors causing blind spots in the barriers. To overcome this issue, authors in Saraereh et al. (2021) have proposed a set-based max-flow procedure for the re-deployment of mobile sensors. This method determines the vulnerable locations and deploys the mobile sensors which strengthens and prolongs the longevity of the barrier. Although the algorithm exhibits higher efficiency in terms of the computation time, it fails to predict the number of -barriers for the IDS. In Nagar and Sharma (2018), the authors have derived an analytical closed-form expression using mobile sensors for the -barrier coverage probability of a WSN. Here, they have calculated the total area covered by an intruder traveling at a given angle to cross the RoI, Then, this total area is utilised to obtain the closed-form expression for the -barrier coverage probability of the WSN. In an another work presented in Singh et al. (2021b), the authors have employed three machine learning approaches, namely Gaussian Process Regression (GPR), Scaling GPR (S-GPR), and Center mean GPR (C-GPR) to predict the -barrier coverage probability of a WSN. The proposed GPR technique quickly detects and prevents any intrusion taking place at any location in the RoI. A three-level hierarchy scheme to detect a mobile intruder in distributed WSNs is proposed in Sharma and Chauhan (2020) improving the precision of intrusion detection. To maximise the probability of intrusion detection, the authors have used divers sensing techniques, -mean clustering, and the Likelihood Ratio Test (LRT) methods. The LRT fusion rule used in this scheme is efficient in terms of metrics like detection probability and false alarm rate at a given number of sensors and the speed of the mobile intruder.

The algorithms and strategies proposed in the literature fail to accurately predict the number of -barriers for the intrusion detection. Hence, the overall aim of this study is to overcome the limitation of the previous studies in terms of accuracy and computational time complexity using a deep learning approach.

3 System Model

This section briefly discusses sensor distribution models, sensing range model, and the performance metric, namely the number of -barriers.

3.1 Sensor Distribution Model

The choice of sensor distribution model depends on the required application. In this work, we consider two-sensor distribution models; (i) Gaussian distribution model and (ii) uniformly distribution model.

Figure 1: Illustration of (a) Gaussian sensor distribution and (b) Uniform sensor distribution. The blue-filled circles represent sensors.

3.1.1 Gaussian Sensor Distribution Model

In this model, a finite number of sensors are installed in a finite circular region of radius meters following a 2D Gaussian distribution, also known as a normal distribution (Fig. 1a). Thus, the Probability Density Function (PDF) for a location to be installed with a sensor is given by Wang et al. (2008)

(1)

where, represents the centre of the circular region, and are the standard deviations of and location coordinates respectively. Furthermore, the location of a sensor inside the circular region represented by can also be modeled with the help of position coordinates if

(2)

3.1.2 Uniform Sensor Distribution Model

In this model, a finite number of sensors are distributed uniformly and randomly inside a finite circular region (denoted by ) of radius meters (Fig. 1b). The position of a random sensor within the circular region is represented by , where, , denotes the distance of the sensor from the center of the circular region, and , denotes the angle between the x-axis and the line that passes through the sensor location. The resulting sensor distribution probability density function is given by

(3)

Furthermore, the probability that a sensor is located at an arbitrary position inside the circular region is given by

(4)

3.2 Binary Sensing Range Model

The binary sensing range model is one of the most widely employed sensing range models for estimating the performance of WSNs (Laranjeira and Rodrigues, 2014; Nagar et al., 2020). A point denoted by inside the 2D circular region will be covered by a sensor located at , if the Euclidean distance of point from the sensor is less than or equal to the sensing range of the sensor. Mathematically, it can be represented as

(5)

3.3 Coverage Graph

Coverage is the measure of how well the sensors are monitoring the RoI in which they are deployed. The -coverage ensures that each point in the target RoI is covered by at least distinct sensors, where is a positive integer having a typically value greater than one. A connected -coverage is achieved when each point in the RoI is covered by at least distinct sensors and each sensor is able to communicate with each other. An optimal -coverage of the network is obtained when each point within the RoI is covered by at least distinct sensor without any overlapping area. A Coverage Graph (CG) is denoted by CG(N)=(V, E), where V denotes the number of vertices and E denotes the number of edges. Here, each vertex represents a sensor and an edge represents a link between any two sensors if and only if they fall in the coverage of each other. To construct a CG for a circular RoI, we have built sensor-disjoint cycles within the entire RoI. A WSN rendering two-barrier coverage inside a circular RoI is shown in Fig. 2a, and its respective CG is depicted in Fig. 2b.

Figure 2: Illustration of (a) 2-Barrier coverage and (b) Coverage graph.

3.4 Barrier and Barrier Path

A barrier along the boundaries of a circular RoI can be constructed by taking the union of distinct sensor’s coverage. Any arbitrary point from where an intruder may enter the RoI is known as the point of intrusion and any possible path that an intruder may follow to reach the target point is called an intrusion path. In order to provide a guaranteed barrier coverage, there must exist at least one barrier for every possible intrusion path. In this way, any intrusion attempt can be identified and prevented in a timely manner. The maximum number of barrier paths that can be constructed for a given intrusion path without any overlapping coverage is given by equation (6).

(6)

where, N represents the total number of sensors and represents the number of sensors required to ensure barrier coverage for a possible intrusion path.

4 Simulation Experiment

Parameters Values
Simulator NS-2.35
Radius of the circular region (R) 40 to 127
Number of sensors (N) 100 to 400
Sensing range (Rs) 15 to 40
Transmission range (Rtx) 30 to 80
Mac type IEEE 802.11
Sensor’s deployment type (a) Gaussian Distribution
(b) Uniform Distribution
Sensing model Binary sensing model
Table 1: Simulation parameters.

We have obtained the simulations results using network simulator NS-2.35, which is one of the widely used network simulator to obtain the performance metrics of WSNs. Table 1 shows different network parameters and their values used to get the simulation results for the number of -barrier paths. Here, we have assumed that the any two sensors can communicate with each other if the transmission range of sensors (Rtx) is at least twice the sensing range of sensors (Rs), i.e., Rtx 2Rs

5 Machine Learning Model

Machine learning algorithms are broadly classified into supervised and unsupervised learning algorithms. In supervised machine learning, we work with labeled data sets. It is mainly used to solve either regression or classification problems. In contrast, unsupervised machine learning algorithms deal with unlabeled data sets and are mainly used to perform clustering and dimension reduction tasks.

In this study, our objective is to assess the potential of fully connected feed-forward ANN to map the number of -barriers using relevant features. To evaluate the relevancy of the selected features, we have calculated the feature importance score and performed feature sensitivity analysis.

5.1 Feature Importance

This study used the area of the RoI, sensing range, transmission range, and the number of sensors as the potential features and -barriers as the predictand. In machine learning, the selection of input features significantly affects its performance (Singh et al., 2020). Hence, before training the machine learning model, we have evaluated the relative importance of each selected feature on the predictand. In doing so, we opted regression tree ensemble technique (Torres-Barrán et al., 2019). We have first trained a regression tree ensemble model by boosting hundred regression trees using the Least Squares gradient Boosting (LSBoost) ensemble aggregation method (i.e., = 100), each with a learning rate of one (i.e., = 1), and the classical decision tree (i.e., decision stumps) has been considered as a weak learner. The LBoost algorithm trains one weak learner at a time and also detects its weak points. Based on such weak points, it generates a new weak learner (li) and evaluates its weight (i.e., ). According to (Eq. 7), the algorithm improves the current model () by emphasizing on the prior weak learner’s () weak point. After it has been trained, it integrates the weak learner into the existing model, and creates a single strong learner (, i.e., ensemble of weak learners) iteratively.

(7)

In addition, we determine the relative feature importance score by evaluating the overall variations in the node risk () due to split on each feature, and then normalising it by the total number of branch nodes (). Mathematically, it is represented as in (Eq. 8);

(8)

where, denotes the node risk of the parent and & denotes the node risk of two children. The node risk at individual node (Ri) is mathematically represented as in (Eq. 9);

(9)

where denotes the probability of node i and denotes the node i mean square error.

5.2 Feature Sensitivity

Estimating the feature importance score only tells us about the relative importance of each feature. However, it does not convey how the features are associated with the predictand, i.e., whether the predictand value increases with feature (positive impact) or decreases with features (negative impact). To evaluate this, we have performed the sensitivity analysis of the features using Partial Dependence Plot (PDP) (Singh et al., 2021b; Friedman, 2001). PDP measures the average effect of a single or more feature by marginalising the effect of all other features taken into consideration. We considered the combined impact of two features simultaneously from the input feature set (i.e., ) on the predictand by marginalising the impact of the remaining features. To do so, a subset s and a complimentary set (c) of s is extracted from the feature set ( = {k1, k2, …, kn}) where, n represents the total features. Using (Eq. 10), we can compute any prediction on .

(10)

The partial dependence of the feature in s can be determined by calculating the expectation (Ec) of Eq. 10.

(11)

where, ) indicates the marginal probability of , which is represented in Eq. 12.

(12)

Then, the partial dependency of the feature in can be determined by :

(13)

where, T represents the total number of observations.

5.3 Model Setup

In this subsection, we have discussed the architecture of the fully connected feed-forward ANN. We have discussed the working of feed-forward ANN, activation function, and the training algorithm.

5.3.1 Feed Forward ANN

Figure 3: Structure of the fully connected feed-forward ANN model having four inputs, two hidden layers having 20 neurons each, and one output (i.e., 4:20:20:1).

A Neural Network (NN) is a model which mimics the oversimplification of the brain performance that operates under a particular specific function of interest. The primary objective of the NN model is to discover a mapping function (f) which predicts a target function (f*) through training the NN using labeled training data sets. During the training phase, the network learns the range of parameters from the training data. Once we trained the model, we need to validate and test the model performance using unseen data.

A network can be subdivided into basic information-processing elements called neurons, which are the building blocks of ANN. Layers are groups of neurons, and the network is comprised of interconnections between these layers. There are diverse perspectives of linking layers together that lead to several other forms of NNs like feed-forward neural networks, recurrent neural networks, and convolutional neural networks. In general, the optimisation problem of a neural network can be represented by Equation (14), where l represents the loss function, and W the learn-able parameter. The main objective is to learn W so that the variance between the output of f can be minimised, when the input x0 and the actual output y are provided.

(14)

In this study, we have trained a fully connected feed-forward ANN. It is a category of NN formed by organising neurons so that all neurons in each layer are linked to every other neuron in the adjacent forward layer. The data flows mainly in one direction, forward, from the input neurons to the output sensors, passing through hidden sensors (if any). Since each neuron has one activation function, the total activation function for a layer equals the total output value. The training algorithm utilises the output findings to calibrate the sensor connection weight value (Novickis et al., 2020; Moldovan et al., 2020). Any continuous function can be approximated by a feed-forward ANN with one hidden layer. However, the desired hidden size might be high, making learning unfeasible. Feed-forward ANN is well-suited towards unstructured data, such as data that is not sequential or time-dependent.

In this study, we structured a feed-forward ANN that consists of two hidden layers and one output layer as illustrated in Fig. 3. Each hidden layers consist of twenty neurons. A common bias value is added to each neuron in the hidden layers, which is followed by an activation function.

5.3.2 Activation Function

In feed-forward ANN, the activation function is one of the essential key elements of the neuron (Duch and Jankowski, 1999). It significantly impacts the performance of the neural networks by modifying the neuron output. The Universal Approximation Theorem states that a feed-forward ANN with one hidden layer and an arbitrary sigmoidal function with adequate sensors can estimate any continuous function with no restrictions on the number of sensors or rather the size of the weights. In this study, we have used the hyperbolic tangent sigmoid transfer function at each layer because it is a bipolar sigmoid function that has a positive response for positive input and a negative response for negative input. Hence, it rid the problem of negative responses for positive values. Further, as the complexity and non-linear of the problems increases (when we increase the number of sensors and the monitoring area in WSNs), the advantage of using hyperbolic tangent sigmoid transfer function becomes more apparent. The mathematical model is expressed as:

(15)

This expression is mathematically equivalent to tanh(n). However, the computational time complexity of Equation (15) is lower than tanh(n).

5.3.3 Training Algorithm

To minimise the error in the output, the values of weights and biases need to be updated. This is done with the help of a backpropagation training algorithm. In the backpropagation algorithm, the input is transmitted to the hidden layer, which then perpetuates back the sensitivity in order to minimise the error rate by updating the weights and the bias during the process. This algorithm results in low convergence, and in some cases, it also leads to over-fitting. To address these issues, and for quick convergence without over-fitting, approaches like Levenberg-Marquardt backpropagation (LM) and Bayesian Regularization (BR) backpropagation, and Scaled Conjugate Gradient (SCG) backpropagation have been developed. To minimise the sum of squares at every iteration, LM utilises the conjugate gradient backpropagation method. LM is used for curve fitting problems, while SCG is used for pattern recognition problems. Bayesian regularization backpropagation algorithm uses an objective function that incorporates the sum of squared weights and residual sum of squares in order to reduce the prediction errors for attaining the desired model.

In this study, we have used the LM backpropagation algorithm. It is a nonlinear optimisation-based approach for training ANNs, by which it uses second-order derivatives for improved convergence behavior. The LM algorithm offers the features of the steepest descent approach along with the Gauss-Newton method, which provides an invertible matrix, named Hessian matrix (H) which is shown in Equation (16):

(16)

where, represents the combination co-efficient, J and I represents the Jacobian and identity matrix respectively. The LM modification to the Gauss-Newton algorithm (Hagan and Menhaj, 1994) is represented in Equation (17):

(17)

The algorithm seems to be the steepest descent when the value of becomes high, whereas the algorithm is Gauss-Newton when the value of is minimal. The LM algorithm for the weight update rule (Mathew et al., 2018) is determined as a function of Jacobian matrix and error vector (e), which is represented in Equation (18):

(18)

We have randomly divided (using Mersenne Twister generator) the completed data set (182 5) in a 55:15:30 ratio for training, validation, and testing of the feed-forward ANN algorithm. The complete methodology is shown in Fig. 4.

Figure 4: Flowchart of the methodology.
Figure 5: Feature importance graph.

6 Results

This section presents the results of feature importance analysis, feature sensitivity analysis, and feed-forward ANN.

6.1 Feature Importance of Each Features

Once we evaluated the feature importance of each feature for both Gaussian and uniform sensor distribution, we plotted the relative importance graph for both the scenario (Fig. 5). The higher the importance score, the more important is the feature. We found that the relative importance score of the sensing range, transmission range, and sensors is the same and the maximum. In contrast, the area has the least relative importance amongst all the features for both the scenario.

6.2 Feature Sensitivity Curve

For analysing the feature sensitivity, we have plotted the surface plot of PDP considering two features at a time along with the corresponding two-dimensional plot with an axis-aligned histogram for representing the distribution of the features. For four features, we have six possible sensitivity plots. Again, we have plotted it for both the scenarios i.e., for Gaussian and uniform sensor distribution in Fig. 6 and 7 respectively.

For both scenarios, we observed that the area of the circular region has a negative impact on the number of barriers. In contrast, sensing range, transmission range, and the number of sensors positively impact the number of barriers. In a nutshell, we observed a similar trend with slight variation in the values for both scenarios.

Figure 6: Partial dependency plot for circular region considering Gaussian sensor distribution.
Figure 7: Partial dependency plot for circular region considering uniform sensor distribution.

6.3 Performance of the Fully Connected Feed-Forward ANN Model

Once we trained the feed-forward ANN model for Gaussian and Uniform distribution scenarios, we evaluated its performance by plotting a linear regression curve between the predicted and observed barriers. We have used R, RMSE, and bias as the performance metrics. A high value of R represents that the predicted values are well in accord with the observed value. A low value of RMSE represents a more accurate model. A positive value of bias shows overestimation, and a negative value of bias shows underestimation. Afterward, we have performed error and residual analysis for a robust conclusion.

Figure 8: Performance of the feed-forward ANN for Gaussian sensor distribution case (a) training accuracy, (b) validation accuracy, (c) testing accuracy, and (d) overall accuracy.

6.3.1 For Gaussian Sensor Distribution

To evaluate the performance of the trained feed-forward ANN for Gaussian sensor distribution, we have reported the training, validation, testing, and overall accuracy. For training accuracy, we feed the training data set as input to the trained feed-forward ANN and evaluated its performance. We found that the trained model work reasonably well on the training data set with R = 0.82, RMSE = 43.38, and bias = -5.11 (Fig. 8a). The presence of a small negative bias indicates that the values are slightly getting underestimated. Evaluating the model performance using the test data results in bias study and hence its performance needs to be evaluated using the unseen/new data sets. In doing so, we have first validated the trained feed-forward ANN model through validation data set (Fig. 8b). We found that the trained model performs well and results in a good fit (with R = 0.76, RMSE = 34.79, and bias = 3.99) while tuning the hyper-parameters. Afterward, we used the test data for unbiased evaluation of the trained model (Fig. 8c). We observed that the trained model perform well on the test data (with R = 0.76, RMSE = 29.86, and bias = 17.31). The predicted value accord well with the observed value with slight scattering. The presence of positive bias represents that the values are slightly overestimated during the testing phase. Finally, we combined all the data sets together (training, validation, and testing) and fed it into the trained feed-forward ANN model to calculate the model’s overall accuracy. We found that the trained model perform reasonably well on the complete data sets with R = 0.78, RMSE = 41.15, and bias = 3.02 (Fig. 8d).

Further, to analyse the error distribution during the training, validation, and testing phase, we have performed error analysis and plotted the combined error histogram using twenty bin size (Fig. 9). The combined error from the trained feed-forward ANN model ranges from -87.94 (leftmost bin) to 150.8 (rightmost bin) and follows a slightly right-skewed Gaussian distribution. The peak of the distribution lies near the zero error line indicating a more accurate model. The region left to the zero error line indicates overestimated region, and the one on the right represents an underestimated region. Overall, the number of instances in the overestimated region is higher than the underestimated region results in the overestimation of predicted values by the trained deep learning model. This statement is validated by the presence of a positive bias of 3.02 (Fig. 8d).

Furthermore, to evaluate the appropriateness of the trained model, we have performed the residual analysis and plotted the time series plot of the test data along with the corresponding residual plot. We have plotted the observed values (in blue) and predicted values (in red) along with their 95% Confidence Interval (C.I). The dashed line represents the RMSE value of the testing phase. The residuals are well scattered and do not follows any specific pattern indicating a good fit (Fig. 10).

Figure 9: Error analysis with error histogram with 20 bin size for Gaussian sensor distribution case.
Figure 10: Residual analysis of the feed-forward ANN output for Gaussian sensor distribution case.

6.3.2 For Uniform Sensor Distribution

Figure 11: Performance of the feed-forward ANN for uniform sensor distribution case (a) training accuracy, (b) validation accuracy, (c) testing accuracy, and (d) overall accuracy.

Similar to the Gaussian sensor distribution scenario, we have also evaluated the performance of the deep learning model for uniform sensor distribution. We reported the training, validation, testing, and overall accuracy of the feed-forward ANN model that we trained for uniform sensor distribution. For training accuracy, we have evaluated the model over the training data sets. In doing so, we observed that the model performs quite well over the training data sets (Fig. 11a). The predicted values are close to observed values (with R = 0.79, RMSE = 55, and bias = 3.65). However, the RMSE is high, and R is slightly low as compared with the training accuracy of the Gaussian sensor distribution. Afterward, we feed the validation data sets to the model input to report the validation accuracy. The predicted values (while tuning the hyper-parameters) are in agreement with the observed values with R = 0.81, RMSE = 34.81, and bias = 10.35 (Fig. 11b). For unbiased evaluation, we have evaluated the trained model performance over the test data set. We observed that the trained model performs well over the test data with R = 0.78, RMSE = 34.58, and bias = 19.89 (Fig. 11c). Finally, we feed the combined data into the model to report the overall accuracy.

Figure 12: Error analysis with error histogram with 20 bin size for uniform sensor distribution case.
Figure 13: Residual analysis of the feed-forward ANN output for uniform sensor distribution case.

We found that the trained model also performs well over the complete data set with R = 0.79, RMSE = 48.36, and bias 9.55 (Fig. 11d).

Further, we perform the error analysis to understand the distribution of error in a uniform sensor distribution scenario. In doing so, we plotted the combined error histogram using twenty bin size (Fig. 12). We observed a similar trend as for the Gaussian sensor distribution scenario despite the high error range. The total error ranges from -111.1 (leftmost bin) to 169 (rightmost bin) and follows a slightly right-skewed Gaussian distribution. Here also, the peak of the distribution lies near the zero error line indicating an accurate model. The total number of instances in the overestimated region is higher than the underestimated region. Due to this, a positive bias is present in the model.

Furthermore, we have performed the residual analysis and plotted the time series plot of observed-predicted values for the testing phase along with the corresponding residual plot (Fig. 13). Here, the residuals are well scattered and do not follow any particular path or pattern, indicating that the linear plot is a good fit.

7 Discussion

This study uses fully connected feed-forward ANN to predict the number of -barriers for intrusion detection in WSNs. We trained two separate feed-forward ANN models for Gaussian and uniform sensor distribution scenarios. We observed that the proposed architecture of a fully connected feed-forward ANN model gives promising results for both scenarios. Although the correlation coefficient value is nearly equal for both scenarios, the RMSE and bias value for the Gaussian sensor distribution scenario is better.

7.1 Comparing with different variant of feed-forward ANN

For an unbiased evaluation, we have generated different scenarios of the feed-forward ANN model based on the number of hidden layers used, ranging from shallow to deep feed-forward ANN model (Table 2). To do so, we have selected six different scenarios corresponding to 1, 2, 3, 4, 5, and 10 hidden layers. A feed-forward ANN model with more than ten hidden layers will result in high time complexity and eventually not an optimal solution for intrusion detection, which is a time-sensitive application. We have reported the training, validation, testing, and overall accuracy for all six scenarios. Based on the overall performance, we have categorised the performance of each scenario into poor, fair, and satisfactory. We found that the feed-forward ANN with 2, 3, and 10 layers resulted in satisfactory performance. Out of these three scenarios, feed-forward ANN with two layers (i.e., 4:20:20:1) shows the best performance.

Scenarios Training Validation Testing Overall Performance
R RMSE Bias R RMSE Bias R RMSE Bias R RMSE Bias
4:20:1
(Single layer)
Gaussian 0.40 60.66 -11.69 0.28 53.27 -17.26 0.55 61.46 19.05 0.44 59.69 -3.23 Fair
Uniform 0.51 67.08 6.44 0.53 52.25 8.81 0.53 52.25 8.81 0.56 65.06 17.31 Fair
4:20:20:1
(Two layers)
Gaussian 0.82 43.38 -5.11 0.76 34.79 3.99 0.76 29.86 17.31 0.78 41.15 3.02 Satisfactory
Uniform 0.79 55.00 3.65 0.81 34.81 10.35 0.78 34.58 19.89 0.79 48.36 9.55 Satisfactory
4:20:20:20:1
(Three layers)
Gaussian 0.81 42.94 -2.91 0.75 44.94 13.66 0.72 37.51 2.08 0.76 42.93 1.06 Satisfactory
Uniform 0.82 49.54 14.69 0.80 48.62 18.31 0.66 47.90 22.24 0.77 50.17 17.51 Satisfactory
4:20:20:20:20:1
(Four layers)
Gaussian 0.44 59.93 -10.18 0.30 58.59 -20.99 0.54 57.61 -12.55 0.47 58.74 -12.50 Fair
Uniform 0.08 78.32 -55.49 0.01 70.94 -43.85 0.12 81.12 -84.73 0.09 78.08 -62.60 Poor
4:20:20:20:20:20:1
(Five layers)
Gaussian 0.46 62.44 -24.53 0.28 67.11 -17.13 0.42 50.32 -11.17 0.43 60.00 -19.40 Fair
Uniform 0.11 83.11 -102.25 0.06 84.13 -97.75 0.08 62.41 -70.25 0.07 78.22 -91.91 Poor
4:20:20: … :20:20:1
(Ten layers)
Gaussian 0.64 48.35 25.09 0.82 46.20 9.78 0.75 45.01 22.25 0.69 47.72 21.96 Satisfactory
Uniform 0.75 47.90 0.44 0.78 59.69 -3.47 0.70 59.17 5.20 0.73 53.23 1.30 Satisfactory
Table 2: Comparison of the performance of different scenarios of feed-forward ANN.
Performance
metrics
Methods
Feed forward ANN RBN ERBN RNN LSTM Boosting EL Bagging EL (RF) BDT GRNN GPR SVR

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

Gaussian

Uniform

R 0.78 0.79 0.68 0.34 0.69 0.68 0.97 0.96 0.08 0.07 0.90 0.89 0.99 0.99 0.93 0.93 0.89 0.88 0.98 0.98 0.63 0.66
RMSE 41.15 48.36 65.67 168.51 75.12 89.68 15.71 22.27 1.16 1.42 37.31 46.00 11.37 12.63 29.29 32.90 39.66 48.80 11.49 13.72 48.44 52.22
Bias 3.02 9.55 39.19 137.51 60.11 71.11 61.45 65.36 -17.10 -20.9 59.06 69.96 53.90 62.35 57.42 63.22 60.70 71.69 53.18 61.07 18.24 20.26
Table 3: Comparison with the benchmark algorithms.

7.2 Comparison with the benchmark algorithms.

Various other findings have been reported for high intrusion detection accuracy through the machine learning approach (Safaldin et al., 2021; Nancy et al., 2020). Hence, any conclusion based on comparing different scenarios of a single algorithm may result in a biased conclusion. To ensure a fair evaluation of the proposed approach, we have compared the results of feed-forward ANN with the other benchmark algorithms using R, RMSE, and bias as the performance metrics. We have selected Radial Basis Neural Network (RBN), Exact Radial Basis Neural Network (ERBN), Recurrent Neural Network (RNN), LSTM, Boosting (Least-square boosting) Ensemble Learning (EL), Bagging EL (Random Forest), Binary Decision Tree (BDT), General Regression Neural Network (GRNN), Gaussian Process Regression (GPR), and Support Vector Regression (SVR) as potential benchmark algorithms because these algorithms are amongst best performing algorithms in the black-box and explainable based machine learning category (Lundberg et al., 2018; Zhang et al., 2020; Elias et al., 2020; Lin et al., 2020; Mansor et al., 2020; Singh et al., 2021a; Roscher et al., 2020; Belle and Papantonis, 2021). On comparing, we found that the feed-forward ANN outperforms all the benchmark algorithms in terms of R, RMSE and bias (Table 3). Other than the feed-forward ANN, SVR performs well and ranks second among the benchmark algorithms. Interestingly, we found that some benchmark algorithms show a strong correlation (i.e., high R value); however, they produce biased results. The bias values are very high, indicating that these models strongly overestimate the response variable.

Figure 14: Comparison of the computational time complexity of the feed-forward ANN with the benchmark algorithms with three different scenarios of Monte Carlo simulations. A log scale is used for the vertical axis.

7.3 Comparison of the computational time complexity

Further, we have also compared the performance of the algorithms as mentioned above in terms of computational efficiency. We have estimated and plotted the computational time complexity graph of all the three algorithms for both scenarios (Fig. 14). We observed that the feed-forward ANN algorithm exhibits the lowest, and the LSTM exhibits the highest computational time complexity. Apart from this, we have also plotted the time complexity of the Monte Carlo simulation for three different scenarios. We have estimated the time-complexity for sensors as 100, 200, and 300. We have kept the other features constant (area 5000, sensing range = 15, and transmission range = 30). We observed that the computation time-complexity of the Monte Carlo simulation increases with the number of sensors. This shows the efficacy and need of the proposed deep learning architecture to cut down the computational cost during the network setup time.

8 Conclusion

This study presented a fully connected feed-forward ANN architecture for the accurate mapping of the number of -barriers for intrusion detection using WSNs. In doing so, we have trained two separate feed-forward ANN models for both Gaussian and uniform sensor distribution using four potential features extracted through simulations. While evaluating the feature importance and feature sensitivity for Gaussian and uniform sensor distribution scenario, we observed that the sensing range, transmission range, and the number of sensors are the most relevant features amongst all which positively impact the predictand. In contrast, the area is the least important feature, and it is negatively related to the predictand. After training the models, we have evaluated their performance over the unseen data and found that both models give promising results.

Further, we have compared the performance of the feed-forward ANN with the benchmark algorithms. We found that the proposed feed-forward architecture outperforms the benchmark algorithms in terms of accuracy and computational time complexity.

This study is a step toward the accurate and time-efficient prediction of the number of -barriers for intrusion detection using WSNs. Our methodology can be used to cut down the time and cost requirement during practical network setup.

CRediT author statement

Abhilash Singh: Conceptualisation, Methodology, Software, Data Curation, Validation, Writing- Original draft preparation, Visualization, Investigation, Writing- Reviewing and Editing.
J. Amutha: Conceptualisation, Methodology, Software, Data Curation, Validation, Writing- Original draft preparation, Visualization, Writing- Reviewing and Editing.
Jaiprakash Nagar: Conceptualisation, Methodology, Data Curation, Visualization, Writing- Original draft preparation, Visualization, Writing- Reviewing and Editing.
Sandeep Sharma: Methodology, Data Curation, Visualization, Investigation, Writing- Reviewing and Editing, Supervision, Project Administration.

Data and code availability

The datasets generated during and/or analysed during the current study can be downloaded from here (Data) and the code can be downloaded from here (Code) (accessed on 25 August 2022).

Acknowledgments

The authors would like to acknowledge IISER Bhopal, MITS Gwalior and IIT Kharagpur for providing institutional support. They would like to thank to the editor and all the anonymous reviewers for providing helpful comments and suggestions.

References

  • J. S. Abbasi, F. Bashir, K. N. Qureshi, M. N. ul Islam, and G. Jeon (2021) Deep learning-based feature extraction and optimizing pattern matching for intrusion detection using finite state machine. Computers & Electrical Engineering 92, pp. 107094. Cited by: §2.
  • J. Amutha, J. Nagar, and S. Sharma (2021a) A distributed border surveillance (dbs) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments. Wireless Personal Communications 117 (3), pp. 2135–2155. Cited by: §1.
  • J. Amutha, S. Sharma, and J. Nagar (2020) WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: review, approaches and open issues. Wireless Personal Communications 111 (2), pp. 1089–1115. Cited by: §1.
  • J. Amutha, S. Sharma, and S. K. Sharma (2021b) Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: review, taxonomy, research findings, challenges and future directions. Computer Science Review 40, pp. 100376. Cited by: §2.
  • D. Arjun, P. Indukala, and K. U. Menon (2019) PANCHENDRIYA: a multi-sensing framework through wireless sensor networks for advanced border surveillance and human intruder detection. In 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 295–298. Cited by: §1.
  • M. Aseeri, M. Ahmed, M. Shakib, O. Ghorbel, and H. Shaman (2017) Detection of attacker and location in wireless sensor network as an application for border surveillance. International Journal of Distributed Sensor Networks 13 (11), pp. 1550147717740072. Cited by: §1.
  • V. Belle and I. Papantonis (2021) Principles and practice of explainable machine learning. Frontiers in big Data, pp. 39. Cited by: §7.2.
  • T. Benahmed and K. Benahmed (2019) Optimal barrier coverage for critical area surveillance using wireless sensor networks. International Journal of Communication Systems 32 (10), pp. e3955. Cited by: §1.
  • W. Duch and N. Jankowski (1999) Survey of neural transfer functions. Neural computing surveys 2 (1), pp. 163–212. Cited by: §5.3.2.
  • I. Elias, J. d. J. Rubio, D. I. Martinez, T. M. Vargas, V. Garcia, D. Mujica-Vargas, J. A. Meda-Campaña, J. Pacheco, G. J. Gutierrez, and A. Zacarias (2020) Genetic algorithm with radial basis mapping network for the electricity consumption modeling. Applied Sciences 10 (12), pp. 4239. Cited by: §7.2.
  • F. Folino, G. Folino, M. Guarascio, F. S. Pisani, and L. Pontieri (2021) On learning effective ensembles of deep neural networks for intrusion detection. Information Fusion 72, pp. 48–69. Cited by: §2.
  • J. H. Friedman (2001) Greedy function approximation: a gradient boosting machine. Annals of statistics, pp. 1189–1232. Cited by: §5.2.
  • S. Gavel, A. S. Raghuvanshi, and S. Tiwari (2021) Maximum correlation based mutual information scheme for intrusion detection in the data networks. Expert Systems with Applications, pp. 116089. Cited by: §1.
  • M. T. Hagan and M. B. Menhaj (1994) Training feedforward networks with the marquardt algorithm. IEEE transactions on Neural Networks 5 (6), pp. 989–993. Cited by: §5.3.3.
  • H. Huang, T. Gong, R. Zhang, L. Yang, J. Zhang, and F. Xiao (2018) Intrusion detection based on -coverage in mobile sensor networks with empowered intruders. IEEE Transactions on Vehicular Technology 67 (12), pp. 12109–12123. Cited by: §1.
  • D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras (2020) Applications of wireless sensor networks: an up-to-date survey. Applied System Innovation 3 (1), pp. 14. Cited by: §1.
  • S. Karanja and R. Badru (2021) Development of a low cost wireless sensor network for surveillance along kenya-somalia border. Preprint. Cited by: §1.
  • R. Karthick, A. M. Prabaharan, and P. Selvaprasanth (2019) Internet of things based high security border surveillance strategy. Asian Journal of Applied Science and Technology (AJAST) Volume 3, pp. 94–100. Cited by: §1.
  • G. Y. Keung, B. Li, and Q. Zhang (2012) The intrusion detection in mobile sensor network. IEEE/ACM Transactions On Networking 20 (4), pp. 1152–1161. Cited by: §1.
  • V. Kotiyal, A. Singh, S. Sharma, J. Nagar, and C. Lee (2021) ECS-nl: an enhanced cuckoo search algorithm for node localisation in wireless sensor networks. Sensors 21 (11), pp. 3576. Cited by: §1.
  • L. A. Laranjeira and G. N. Rodrigues (2014) Border effect analysis for reliability assurance and continuous connectivity of wireless sensor networks in the presence of sensor failures. IEEE Transactions on Wireless Communications 13 (8), pp. 4232–4246. Cited by: §3.2.
  • S. Lee, M. Mohammadi, S. Rashidi, A. M. Rahmani, M. Masdari, M. Hosseinzadeh, et al. (2021) Towards secure intrusion detection systems using deep learning techniques: comprehensive analysis and review. Journal of Network and Computer Applications, pp. 103111. Cited by: §2.
  • H. Lin, Q. Dai, L. Zheng, H. Hong, W. Deng, and F. Wu (2020) Radial basis function artificial neural network able to accurately predict disinfection by-product levels in tap water: taking haloacetic acids as a case study. Chemosphere 248, pp. 125999. Cited by: §7.2.
  • S. M. Lundberg, B. Nair, M. S. Vavilala, M. Horibe, M. J. Eisses, T. Adams, D. E. Liston, D. K. Low, S. Newman, J. Kim, et al. (2018) Explainable machine-learning predictions for the prevention of hypoxaemia during surgery. Nature biomedical engineering 2 (10), pp. 749–760. Cited by: §7.2.
  • M. Mansor, S. Z. Mohd Jamaludin, M. S. Mohd Kasihmuddin, S. A. Alzaeemi, M. F. Md Basir, S. Sathasivam, et al. (2020) Systematic boolean satisfiability programming in radial basis function neural network. Processes 8 (2), pp. 214. Cited by: §7.2.
  • J. Mathew, J. Griffin, M. Alamaniotis, S. Kanarachos, and M. E. Fitzpatrick (2018) Prediction of welding residual stresses using machine learning: comparison between neural networks and neuro-fuzzy systems. Applied Soft Computing 70, pp. 131–146. Cited by: §5.3.3.
  • P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli (2018) A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials 21 (1), pp. 686–728. Cited by: §1.
  • A. Moldovan, A. Caţaron, and R. Andonie (2020) Learning in feedforward neural networks accelerated by transfer entropy. Entropy 22 (1), pp. 102. Cited by: §5.3.1.
  • H. Mostafaei, M. U. Chowdhury, and M. S. Obaidat (2018) Border surveillance with wsn systems in a distributed manner. IEEE Systems Journal 12 (4), pp. 3703–3712. Cited by: §1.
  • J. Nagar, S. K. Chaturvedi, and S. Soh (2020) An analytical model to estimate the performance metrics of a finite multihop network deployed in a rectangular region. Journal of Network and Computer Applications 149, pp. 102466. Cited by: §3.2.
  • J. Nagar and S. Sharma (2018) K-barrier coverage-based intrusion detection for wireless sensor networks. In Cyber Security, pp. 373–385. Cited by: §2.
  • P. Nancy, S. Muthurajkumar, S. Ganapathy, S. S. Kumar, M. Selvi, and K. Arputharaj (2020) Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications 14 (5), pp. 888–895. Cited by: §7.2.
  • R. Novickis, D. J. Justs, K. Ozols, and M. Greitāns (2020) An approach of feed-forward neural network throughput-optimized implementation in fpga. Electronics 9 (12), pp. 2193. Cited by: §5.3.1.
  • A. Pektaş and T. Acarman (2019) A deep learning method to detect network intrusion through flow-based features. International Journal of Network Management 29 (3), pp. e2050. Cited by: §2.
  • R. Roscher, B. Bohn, M. F. Duarte, and J. Garcke (2020) Explainable machine learning for scientific insights and discoveries. Ieee Access 8, pp. 42200–42216. Cited by: §7.2.
  • M. Safaldin, M. Otair, and L. Abualigah (2021) Improved binary gray wolf optimizer and svm for intrusion detection system in wireless sensor networks. Journal of ambient intelligence and humanized computing 12 (2), pp. 1559–1576. Cited by: §7.2.
  • O. A. Saraereh, A. Ali, L. Al-Tarawneh, and I. Khan (2021) A robust approach for barrier-reinforcing in wireless sensor networks. Journal of Parallel and Distributed Computing 149, pp. 186–192. Cited by: §2.
  • A. Sharma and S. Chauhan (2020) Sensor fusion for distributed detection of mobile intruders in surveillance wireless sensor networks. IEEE Sensors Journal 20 (24), pp. 15224–15231. Cited by: §2.
  • S. Sharma and J. Nagar (2020) Intrusion detection in mobile sensor networks: a case study for different intrusion paths. Wireless Personal Communications, pp. 1–21. Cited by: §1.
  • P. Si, J. Ma, F. Tao, Z. Fu, and L. Shu (2020) Energy-efficient barrier coverage with probabilistic sensors in wireless sensor networks. IEEE Sensors Journal 20 (10), pp. 5624–5633. Cited by: §1.
  • A. Singh, J. Amutha, J. Nagar, S. Sharma, and C. Lee (2022a) AutoML-id: automated machine learning model for intrusion detection using wireless sensor network. Scientific Reports 12 (1), pp. 1–14. Cited by: §2.
  • A. Singh, J. Amutha, J. Nagar, S. Sharma, and C. Lee (2022b) Lt-fs-id: log-transformed feature learning and feature-scaling-based machine learning algorithms to predict the k-barriers for intrusion detection using wireless sensor network. Sensors 22 (3), pp. 1070. Cited by: §2.
  • A. Singh, K. Gaurav, A. K. Rai, and Z. Beg (2021a) Machine learning to estimate surface roughness from satellite images. Remote Sensing 13 (19), pp. 3794. Cited by: §7.2.
  • A. Singh, V. Kotiyal, S. Sharma, J. Nagar, and C. Lee (2020) A machine learning approach to predict the average localization error with applications to wireless sensor networks. IEEE Access 8, pp. 208253–208263. Cited by: §5.1.
  • A. Singh, J. Nagar, S. Sharma, and V. Kotiyal (2021b) A gaussian process regression approach to predict the k-barrier coverage probability for intrusion detection in wireless sensor networks. Expert Systems With Applications 172, pp. 114603. Cited by: §1, §2, §5.2.
  • A. Singh, S. Sharma, J. Singh, and R. Kumar (2019) Mathematical modelling for reducing the sensing of redundant information in wsns based on biologically inspired techniques. Journal of Intelligent & Fuzzy Systems 37 (5), pp. 6829–6839. Cited by: §1.
  • A. Singh, S. Sharma, and J. Singh (2021c) Nature-inspired algorithms for wireless sensor networks: a comprehensive survey. Computer Science Review 39, pp. 100342. Cited by: §1.
  • S. M. Sohi, J. Seifert, and F. Ganji (2021) RNNIDS: enhancing network intrusion detection systems through deep learning. Computers & Security 102, pp. 102151. Cited by: §2.
  • T. Sood, S. Prakash, S. Sharma, A. Singh, and H. Choubey (2022) Intrusion detection system in wireless sensor network using conditional generative adversarial network. Wireless Personal Communications, pp. 1–21. Cited by: §2.
  • A. Torres-Barrán, Á. Alonso, and J. R. Dorronsoro (2019) Regression tree ensembles for wind energy and solar radiation prediction. Neurocomputing 326, pp. 151–160. Cited by: §5.1.
  • R. Vinayakumar, M. Alazab, K. Soman, P. Poornachandran, A. Al-Nemrat, and S. Venkatraman (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7, pp. 41525–41550. Cited by: §2.
  • D. Wang, B. Xie, and D. P. Agrawal (2008) Coverage and lifetime optimization of wireless sensor networks with gaussian distribution. IEEE Transactions on Mobile Computing 7 (12), pp. 1444–1458. Cited by: §3.1.1.
  • C. Yin, Y. Zhu, J. Fei, and X. He (2017) A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5, pp. 21954–21961. Cited by: §2.
  • D. Zhang, N. Zhang, N. Ye, J. Fang, and X. Han (2020) Hybrid learning algorithm of radial basis function networks for reliability analysis. IEEE Transactions on Reliability. Cited by: §7.2.