A method for detecting intrusions in wireless sensor networks based on specification rules and an artificial neural network

Keywords: wireless sensor networks, intrusion detection, specification rules, artificial intelligence, neural network, machine learning, game theory, metrics, Nash equilibrium, database, cybersecurity

Abstract

A probabilistic (stochastic) monitoring strategy based on Nash's Bayesian equilibrium was used, which allowed BB agents to automatically optimize their behavior depending on the current threat level and their own resources, as well as dynamically change their strategies, ensuring the flexibility and adaptability of the system to changes in the behavior of malicious nodes. Specification rules have been developed based on a combination of sensor node indicators that affect the quality of information transmission. The status of nodes is tracked by intrusion detection agents that passively monitor the network. A multilayer neural network is used to dynamically update the threshold values of sensor node indicators in the specification rule database used by intrusion detection agents. A method for detecting intrusions in wireless sensor networks has been developed and formalized by combining a probabilistic strategy for monitoring the status of a sensor node by intrusion detection agents based on Nash equilibrium, rules for combining sensor node indicators, and detection of anomalous nodes using a multilayer neural network. This made it possible to adaptively track anomalies and detect network-level attacks, preventing the dangerous influence of malicious nodes by blocking them.

References

1 Машталір В., Жук О., Міненко Л., Артюх С. Концептуальні підходи застосування бездротових сенсорних мереж арміями передових країн світу. Сучасні інформаційні технології у сфері безпеки та оборони. 2023. Т. 47, № 2. С. 96–112.
2. Артюх С., Жук О., Чернега В. Класифікація атак у безпроводових сенсорних мережах тактичної ланки управління військами. Сучасні інформаційні технології у сфері безпеки та оборони. 2023. Т. 48, № 3. С. 11–19.
3. Zhou L., Chao H.-C. Multimedia traffic security architecture for the internet of things. IEEE Network. 2011. Т. 25, № 3. С. 35–40.
4. A survey on key management mechanisms for distributed Wireless Sensor Networks / M. A. Simplício та ін. Computer Networks. 2010. Т. 54, № 15. С. 2591–2612.
5. Chen R.-C., Hsieh C.-F., Huang Y.-F. A new method for intrusion detection on hierarchical wireless sensor networks. the 3rd International Conference, м. Suwon, Korea, 15–16 січ. 2009 р. New York, New York, USA, 2009.

Abstract views: 23
PDF Downloads: 12
Published
2025-09-19
How to Cite
Artіukh S. (2025). A method for detecting intrusions in wireless sensor networks based on specification rules and an artificial neural network. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (60), 344-357. https://doi.org/10.36910/6775-2524-0560-2025-60-37
Section
Telecommunications and radio engineering