• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks


Abstract

Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
N. Nithiyanandam, C. Mahesh, S. Raja, S. Jeyapriyanga, T. S. B. Priya, "Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks," KSII Transactions on Internet and Information Systems, vol. 17, no. 6, pp. 1706-1727, 2023. DOI: 10.3837/tiis.2023.06.010.

[ACM Style]
N. Nithiyanandam, C. Mahesh, S.P. Raja, S. Jeyapriyanga, and T. Selva Banu Priya. 2023. Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks. KSII Transactions on Internet and Information Systems, 17, 6, (2023), 1706-1727. DOI: 10.3837/tiis.2023.06.010.

[BibTeX Style]
@article{tiis:50772, title="Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks", author="N. Nithiyanandam and C. Mahesh and S.P. Raja and S. Jeyapriyanga and T. Selva Banu Priya and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2023.06.010}, volume={17}, number={6}, year="2023", month={June}, pages={1706-1727}}