IJCNIS Vol. 17, No. 6, 8 Dec. 2025
Cover page and Table of Contents: PDF (size: 1561KB)
PDF (1561KB), PP.148-163
Views: 0 Downloads: 0
Modified DBSCAN, OOA, Hybrid LSTM-XGBOOST, WSN, Military Sector
Military tasks constitute the most important and significant applications of WSNs. In military, Sensor node deployment increases activities, efficient operation, saves loss of life, and protects national sovereignty. Usually, the main difficulties in military missions are energy consumption and security in the network. Another major security issues are hacking or masquerade attack. To overcome the limitations, the proposed method modified DBSCAN with OSPREY optimization Algorithm (OOA) using hybrid classifier Long Short-Term Memory (LSTM) with Extreme Gradient Boosting (XGBOOST) to detect attack types in the WSN military sector for enhancing security. First, nodes are deployed and modified DBSCAN algorithm is used to cluster the nodes to reduce energy consumption. To select the cluster head optimally by using the OSPREY optimization Algorithm (OOA) based on small distance and high energy for transfer data between the base station and nodes. Hybrid LSTM-XGBOOST classifier utilized to learn the parameter and predict the four assault types such as scheduling, flooding, blackhole and grayhole assault. Classification and network metrics including Packet Delivery Ratio (PDR), Throughput, Average Residual Energy (ARE), Packet Loss Ratio (PLR), Accuracy and F1_score are used to evaluate the performance of the model. Performance results show that PDR of 94.12%, 3.2 Mbps throughput at 100 nodes, ARE of 8.94J, PLR of 5.88%, accuracy of 96.14%, and F1_score of 95.04% are achieved. Hence, the designed model for assault prediction types in WSN based on modified DBSCAN clustering with a hybrid classifier yields better results.
R. Preethi, "Assault Type Detection in WSN Based on Modified DBSCAN with Osprey Optimization Using Hybrid Classifier LSTM with XGBOOST for Military Sector", International Journal of Computer Network and Information Security(IJCNIS), Vol.17, No.6, pp.148-163, 2025. DOI:10.5815/ijcnis.2025.06.10
[1]G. Rajakumaran, N. Venkataraman, and R. R. Mukkamala, “Denial of service attack prediction using gradient descent algorithm,” SN Computer Science, vol. 1, pp. 1-8, 2020.
[2]D. Suhag, S. S. Gaur, and A. K. Mohapatra, “A proposed scheme to achieve node authentication in military applications of wireless sensor network,” Journal of Statistics and Management Systems, vol. 22(2), pp. 347-362, 2019.
[3]S. Kausar Fatima, S. Gauhar Fatima, S. Abdul Sattar, and D. K. A. Sheela, “An advanced data security method in WSN,” International Journal of Advanced Research in Engineering and Technology, vol. 10(2), pp. 263-270, 2019
[4]M. A. Elsadig, A. Altigani, and M. A. A. Baraka, “Security issues and challenges on wireless sensor networks,” Int. J. Adv. Trends Comput. Sci. Eng, vol. 8(4), pp. 1551-1559, 2019.
[5]E. Suryaprabha, and N. M. Saravana Kumar, “Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network,” Soft Computing, vol. 24(14), pp. 10681-10691, 2020.
[6]S. Karthick, “TDP: A Novel Secure and Energy Aware Routing Protocol for Wireless Sensor Networks,” International Journal of Intelligent Engineering and Systems, vol. 11(2), pp. 76-84, 2018.
[7]C. Anand, and N. Vasuki, “Trust based DoS attack detection in wireless sensor networks for reliable data transmission,” Wireless Personal Communications, vol. 121(4), pp. 2911-2926, 2021.
[8]L. Alsulaiman, and S. Al-Ahmadi, “Performance evaluation of machine learning techniques for DOS detection in wireless sensor network,” arXiv preprint arXiv:2104.01963, 2021.
[9]S. Salmi, and L. Oughdir, “Cnn-lstm based approach for dos attacks detection in wireless sensor networks,” International Journal of Advanced Computer Science and Applications, vol. 13(4), 2022.
[10]D. Hemanand, G. V. Reddy, S. S. Babu, K. R. Balmuri, T. Chitra, and S. Gopalakrishnan, “An intelligent intrusion detection and classification system using CSGO-LSVM model for wireless sensor networks (WSNs),” International Journal of Intelligent Systems and Applications in Engineering, vol. 10(3), pp. 285-293, 2022.
[11]M. A. Rezvi, S. Moontaha, K. A. Trisha, S. T. Cynthia, and S. Ripon, “Data mining approach to analyzing intrusion detection of wireless sensor network,” Indonesian J. Electric. Eng. Comput. Sci, vol. 21(1), pp. 516-523, 2021.
[12]X. Tan, S. Su, Z. Huang, X. Guo, Z. Zuo, X. Sun, and L. Li, “Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm,” Sensors, vol. 19(1), pp. 203, 2019.
[13]N. M. Alruhaily, and D. M. Ibrahim, “A multi-layer machine learning-based intrusion detection system for wireless sensor networks,” International Journal of Advanced Computer Science and Applications, vol. 12(4), pp. 281-288, 2021.
[14]D. Srinivas, “Adaptive Density-Based Localization Algorithm Using Particle Swarm Optimization and DBSCAN Clustering Approach,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12(11), pp. 5053-5062, 2021.
[15]Y. Liu, and Y. Wu, “Employ DBSCAN and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks,” IEEE Access, vol. 9, pp. 77090-77105, 2021.
[16]M. Dehghani, and P. Trojovský, “Osprey optimization algorithm: A new bio-inspired metaheuristic algorithm for solving engineering optimization problems,” Frontiers in Mechanical Engineering, vol. 8, pp. 1126450, 2023.
[17]M. Turkoglu, D. Hanbay, and A. Sengur, “Multi-model LSTM-based convolutional neural networks for detection of apple diseases and pests,” Journal of Ambient Intelligence and Humanized Computing, pp. 1-11, 2019.
[18]A. Gouveia, and M. Correia, “Network intrusion detection with XGBoost,” Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS), vol. 137, 2020.
[19]KIRAN,(2019)Kaggle:[https://www.kaggle.com/datasets/kiranmahesh/nslkdd?select=kdd].Acessed on 16-10-2023.