DHOA-ANFIS: A Hybrid Technique to Detect Routing Attacks in Wireless Body Area Network | Wireless Personal Communications Skip to main content

Advertisement

Log in

DHOA-ANFIS: A Hybrid Technique to Detect Routing Attacks in Wireless Body Area Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless Body Area Network (WBAN) has become a reality where patient health conditions can be monitored remotely. Lightweight small sensor devices gather the health parameters and transmit the data to a remotely located medical facility. These kinds of resource-constrained networks are prone to several routing attacks, which can disrupt the whole network. Cryptographic approaches are inefficient in fighting against routing attacks, while Machine Learning based Intrusion Detection System (IDS) can identify typical and uncommon security attacks. For this purpose, a dataset has a significant role to play. This paper focuses on building a specialized dataset and an accurate Intrusion Detection Model for WBAN. A simulation has been performed using E-HARP routing protocol to simulate four routing attacks, such as Wormhole, Blackhole, Byzantine, and Scheduling attack, in addition to regular data transmission (without attack). Deer Hunting Optimization Algorithm (DHOA) and Adaptive Neuro Fuzzy inference System (ANFIS) have been merged to model a highly accurate Intrusion Detection Model. A specialized dataset has been used to train and test the hybrid DHOA-ANFIS model. The proposed model has been evaluated and compared with similar hybrid models such as CSO-ANFIS, PSO-ANFIS, BA-ANFIS, GA-ANFIS, and ABC-ANFIS. The proposed model achieves the highest overall accuracy in experiments, demonstrating its superiority over competing models. It has obtained an overall accuracy of 97.70%, a Detection Rate of 97.03%, a Precision of 96.20%, and the lowest False Alarm Rate of 0.90%. The Proposed model also outperforms state-of-the-art related works on designing machine learning based IDS for WBAN and IoT based healthcare.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Fig. 5
Fig. 6
Fig. 7
Algorithm 2
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

Available on request.

References

  1. Saif, S., Das, P., Biswas, S., Khari, M., & Shanmuganathan, V. (2022). HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems, p. 104622.

  2. Ullah, Z., Ahmed, I., Khan, F. A., Asif, M., Nawaz, M., Ali, T., Khalid, M., & Niaz, F. (2019). Energy-efficient harvested-aware clustering and cooperative routing protocol for WBAN (E-HARP). IEEE Access, 7, 100036–100050.

    Article  Google Scholar 

  3. Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: a seamless and authorized multimedia streaming framework for WMSN-Based IoMT. IEEE Internet of Things Journal, 6(2), 1576–1583.

    Article  Google Scholar 

  4. Yahya, A., Islam, S. U., Zahid, M., Ahmed, G., Raza, M., Pervaiz, H., & Yang, F. (2019). Cooperative routing for energy efficient underwater wireless sensor networks. IEEE Access, 9, 141888–141899.

    Article  Google Scholar 

  5. Khan, M. D., Ullah, Z., Ahmad, A., Hayat, B., Almogren, A., Kim, K. H., & Ali, M. (2020). Energy harvested and cooperative enabled efficient routing protocol (EHCRP) for IoT-WBAN. Sensors, 20(21), 6267.

    Article  Google Scholar 

  6. Geetha, M., & Ganesan, R. (2021). CEPRAN-cooperative energy efficient and priority based reliable routing protocol with network coding for WBAN. Wireless Personal Communications, 117, 3153–3171.

    Article  Google Scholar 

  7. Ahmed, S., Javaid, N., Yousaf, S., Ahmad, A., Sandhu, M. M., Imran, M., Khan, Z. A., & Alrajeh, N. (2015). Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks. Computers in Human Behavior, 51, 1205–1215.

    Article  Google Scholar 

  8. Ullah, Z., Ahmed, I., Ali, T., Ahmad, N., Niaz, F., & Cao, Y. (2019). Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks. IEEE Access, 7, 33906–33921.

    Article  Google Scholar 

  9. Ahmed, S., Javaid, N., Yousaf, S., Ahmad, A., Sandhu, M. M., Imran, M., et al. (2015). Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks. Computers in Human Behavior, 51, 1205–1215.

    Article  Google Scholar 

  10. Anwar, M., Abdullah, A., Altameem, A., Qureshi, K., Masud, F., Faheem, M., et al. (2018). Green communication for wireless body area networks: energy aware link efficient routing approach. Sensors, 18, 3237.

    Article  Google Scholar 

  11. Ha, I. (2016). Even energy consumption and backside routing: An improved routing protocol for effective data transmission in wireless body area networks. International Journal of Distributed Sensor Networks, 12, 1550147716657932.

    Article  Google Scholar 

  12. Jang, J. S. R. (1993). ANFIS: Adaptive-network-based fuzzy inference system. IEEE Transactions on Systems, Man, and Cybernetics, 23, 665–685.

    Article  Google Scholar 

  13. Al-Qaness, M. A., Fan, H., Ewees, A. A., Yousri, D., & Abd Elaziz, M. (2021). Improved ANFIS model for forecasting Wuhan City air quality and analysis COVID-19 lockdown impacts on air quality. Environmental Research, 194, 110607.

    Article  Google Scholar 

  14. Saif, S., Das, P., & Biswas, S. (2021). A hybrid model based on mba-anfis for covid-19 confirmed cases prediction and forecast. Journal of The Institution of Engineers (India): Series B, pp. 1-14.

  15. Jafari, S. M., Zahiri, A. R., Hadad, O. B., & Tabari, M. M. R. (2021). A hybrid of six soft models based on ANFIS for pipe failure rate forecasting and uncertainty analysis: A case study of Gorgan city water distribution network. Soft Computing, 25(11), 7459–7478.

    Article  Google Scholar 

  16. Duraisamy, A., & Subramaniam, M. (2021). Attack detection on IoT based smart cities using IDS based MANFIS classifier and secure data transmission using IRSA encryption. Wireless Personal Communications, 119, 1913–1934.

    Article  Google Scholar 

  17. Manimurugan, S., Majdi, A. Q., Mohmmed, M., Narmatha, C., & Varatharajan, R. (2020). Intrusion detection in networks using crow search optimization algorithm with adaptive neuro-fuzzy inference system. Microprocessors and Microsystems, 79, 103261.

    Article  Google Scholar 

  18. Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2019). Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Computer Science, 151, 1176–1181.

    Article  Google Scholar 

  19. Ly, H. B., Pham, B. T., Dao, D. V., Le, V. M., Le, L. M., & Le, T. T. (2019). Improvement of ANFIS model for prediction of compressive strength of manufactured sand concrete. Applied Sciences, 9(18), 3841.

    Article  Google Scholar 

  20. Brammya, G., Praveena, S., Ninu Preetha, N. S., Ramya, R., Rajakumar, B. R., & Binu, D. (2019). Deer hunting optimization algorithm: a new nature-inspired meta-heuristic paradigm. The Computer Journal, bxy133.

  21. Agarwal, G., & Om, H. (2021). Performance of deer hunting optimization based deep learning algorithm for speech emotion recognition. Multimedia Tools and Applications, 80(7), 9961–9992.

    Article  Google Scholar 

  22. Divya, D., & Ganeshbabu, T. R. (2020). Fitness adaptive deer hunting-based region growing and recurrent neural network for melanoma skin cancer detection. International Journal of Imaging Systems and Technology, 30(3), 731–752.

    Article  Google Scholar 

  23. Shambharkar, P. G., & Doja, M. N. (2020). Movie trailer classification using deer hunting optimization based deep convolutional neural network in video sequences. Multimed Tools Appl, 79, 21197–21222.

    Article  Google Scholar 

  24. Thamilarasu, G. (2016). iDetect: An intelligent intrusion detection system for wireless body area networks. International Journal of Security and Networks, 11(1–2), 82–93.

    Article  Google Scholar 

  25. Latif, R., Abbas, H., Latif, S., & Masood, A. (2015). EVFDT: an enhanced very fast decision tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network. Mobile Information Systems, 2015.

  26. Saif, S., Karmakar, K., Biswas, S., & Neogy, S. (2022). MLIDS: Machine learning enabled intrusion detection system for health monitoring framework using BA-WSN. International Journal of Wireless Information Networks, 29(4), 491–502.

    Article  Google Scholar 

  27. Hady, A. A., Ghubaish, A., Salman, T., Unal, D., & Jain, R. (2020). Intrusion detection system for healthcare systems using medical and network data: A comparison study. IEEE Access, 8, 106576–106584.

    Article  Google Scholar 

  28. Halimaa, A., & Sundarakantham, K. (2019, April). Machine learning based intrusion detection system. In 2019 3rd International conference on trends in electronics and informatics (ICOEI) (pp. 916–920). IEEE.

  29. Sherasiya, T., & Upadhyay, H. (2016). Intrusion detection system for internet of things. Int. J. Adv. Res. Innov. Ideas Educ.(IJARIIE), 2(3).

  30. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for internet of things. Future Generation Computer Systems, 82, 761–768.

    Article  Google Scholar 

  31. Begli, M., Derakhshan, F., & Karimipour, H. (2019). A layered intrusion detection system for critical infrastructure using machine learning. In 2019 IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE) (pp. 120–124). IEEE.

  32. Iwendi, C., Anajemba, J. H., Biamba, C., & Ngabo, D. (2021). Security of things intrusion detection system for smart healthcare. Electronics, 10(12), 1375.

    Article  Google Scholar 

  33. Devi, P. P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316–322.

    Article  Google Scholar 

  34. Mitchell, R., & Chen, I. R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications, 42, 1–23.

    Article  Google Scholar 

  35. Hossein, K. M., Esmaeili, M. E., Dargahi, T., Khonsari, A., & Conti, M. (2021). BCHealth: A novel Blockchain-based privacy-preserving architecture for Iot healthcare applications. Computer Communications, 180, 31–47.

    Article  Google Scholar 

  36. Tang, D., Wang, X., Yan, Y., Zhang, D., & Zhao, H. (2022). ADMS: An online attack detection and mitigation system for LDoS attacks via SDN. Computer Communications, 181, 454–471.

    Article  Google Scholar 

  37. Almohamad, T. A., Salleh, M. F. M., Mahmud, M. N., Karaş, İR., Shah, N. S. M., & Al-Gailani, S. A. (2021). Dual-determination of modulation types and signal-to-noise ratios using 2D-ASIQH features for next generation of wireless communication systems. IEEE Access, 9, 25843–25857.

    Article  Google Scholar 

  38. Almohamad, T. A., Salleh, M. F. M., Mahmud, M. N., & Sa’D, A. H. Y. (2018). Simultaneous determination of modulation types and signal-to-noise ratios using feature-based approach. IEEE access, 6, 9262–9271.

    Article  Google Scholar 

  39. Abbas, H., Latif, R., Latif, S., & Masood, A. (2016). Performance evaluation of enhanced very fast decision tree (EVFDT) mechanism for distributed denial-of-service attack detection in health care systems. Annals of Telecommunications, 71, 477–487.

    Article  Google Scholar 

  40. Odesile, A., & Thamilarasu, G. (2017). Distributed intrusion detection using mobile agents in wireless body area networks. In 2017 Seventh International Conference on Emerging Security Technologies (EST) (pp. 144-149). IEEE.

  41. He, D., Qiao, Q., Gao, Y., Zheng, J., Chan, S., Li, J., & Guizani, N. (2019). Intrusion detection based on stacked autoencoder for connected healthcare systems. IEEE Network, 33(6), 64–69.

    Article  Google Scholar 

  42. Kore, A., & Patil, S. (2020). IC-MADS: IoT enabled cross layer man-in-middle attack detection system for smart healthcare application. Wireless Personal Communications, 113, 727–746.

    Article  Google Scholar 

  43. Safaldin, M., Otair, M., & Abualigah, L. (2021). Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12, 1559–1576.

    Article  Google Scholar 

Download references

Acknowledgements

Not Applicable

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

Manuscript is written by Sohail Saif, Experiments are performed by Priya Das and All the figures are prepared by Suparna Biswas.

Corresponding author

Correspondence to Sohail Saif.

Ethics declarations

Conflict of interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

Not Applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saif, S., Das, P. & Biswas, S. DHOA-ANFIS: A Hybrid Technique to Detect Routing Attacks in Wireless Body Area Network. Wireless Pers Commun 133, 453–480 (2023). https://doi.org/10.1007/s11277-023-10774-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10774-w

Keywords

Navigation