Efficient Multipath Routing and Anomaly Detection with a Token-Managed Certificateless Authentication Scheme (TM-AD) in WSNs

Sangeethapriya J., Michael Arock, Srinivasulu Reddy Uyyala

Abstract


Wireless Sensor Networks (WSNs) are crucial for diverse Internet of Things (IoT) applications, but their inherent resource constraints and distributed nature expose them to significant security vulnerabilities. A primary challenge is the effective and timely detection and mitigation of malicious or misbehaving nodes, which can disrupt network operations, compromise data, and reduce network lifespan. Existing approaches often face obstacles in efficiently addressing these threats. This paper proposes the Token Manager-based Attack Detection (TM-AD) scheme, to enhance WSN security and operational efficiency. The TM-AD system features a "Token Manager" (TM), a dedicated entity responsible for continuous network monitoring, assessing node behavior based on defined parameters, and managing node participation through a token-based mechanism. Upon identifying malicious or anomalous activity, TM-AD facilitates uninterrupted network transmission by orchestrating the replacement of compromised nodes with designated "replacement nodes." The efficacy of the proposed TM-AD system is evaluated through comparative analysis. At 100 network nodes, TM-AD achieved a 100% attack detection rate and 100% network throughput, alongside a reduction in routing overhead of up to 43.8% and in end-to-end delay of up to 74.7% compared to benchmark schemes. These results affirm that TM-AD effectively identifies malicious nodes and significantly enhances network performance across these key metrics, thereby ensuring a more robust and reliable WSN operation.


Full Text:

PDF

References


D. He, N. Kumar, and J.-H. Lee, “Privacy-preserving data aggregation scheme against internal attackers in smart grids,” Wireless Networks, vol. 22, no. 2, pp. 491–502, 2016.

N. Kumar, K. Kaur, S. C. Misra, and R. Iqbal, “An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud,” Peer-to-Peer Networking and Applications, vol. 9, no. 5, pp. 824–840, 2016.

S. Roy, A. K. Das, S. Chatterjee, N. Kumar, S. Chattopadhyay, and J. J. P. C. Rodrigues, “Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing-based healthcare applications,” IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 457–468, 2019.

N. Temene, C. Sergiou, C. Georgiou, and V. Vassiliou, “A survey on mobility in wireless sensor networks,” Ad Hoc Networks, vol. 125, article 102726, 2022.

R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, N. Kumar, and M. M. Hassan, “A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 16492–16503, 2022.

M. Mahdavisharif, S. Jamali, and R. Fotohi, “Big data-aware intrusion detection system in communication networks: a deep learning approach,” Journal of Grid Computing, vol. 19, no. 4, pp. 1–28, 2021.

L. Feng and B. Liu, “Low-energy data fusion privacy protection algorithm for three-dimensional wireless sensor network,” Mobile Information Systems, vol. 2022, Article ID 3580607, 10 pages, 2022.

K. Pramod, S. Pierluigi, and C. Domenico, “Distributed detection in wireless sensor networks under multiplicative fading via generalized score tests,” IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9059–9071, 2021.

I. Nasurulla and R. Kaniezhil, “Integration of fault-tolerant feature to OMIEEPB routing protocol in wireless sensor network,” International Journal of Intelligent Computing and Cybernetics, vol. 15, no. 3, pp. 414–424, 2022.

V. S. Lakshmi and P. P. Deepthi, “A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks,” International Journal of Communication Systems, vol. 32, no. 1, article e3832, 2019.

X. Zhang, L. Zhao, X. Gao, and X. Zhang, “A data-sharing model based on blockchain for power grid big data,” Journal of Physics: Conference Series, vol. 1792, no. 1, article 012051, 2021.

S. Jiang, M. Li, and Z. Tang, “A new scheme for sourcelocation privacy in wireless sensor networks,” International Journal of Network Security, vol. 20, no. 5, pp. 879–888, 2018.

M. K. Alam, A. A. Aziz, S. A. Latif, and A. A. Aziz, “Error-control truncated SVD technique for in-network data compression in wireless sensor networks,” IEEE Access, vol. 9, pp. 13829–13844, 2021.

P. Giri, K. Ng, and W. Phillips, “Wireless sensor network system for landslide monitoring and warning,” IEEE Transactions on Instrumentation and Measurement, vol. 68, no. 4, pp. 1210– 1220, 2019.

T. H. Kim, R. Goyat, M. K. Rai et al., “A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks,” IEEE Access, vol. 7, pp. 184133–184144, 2019.

Z. Abubaker, N. Javaid, A. Almogren, M. Akbar, M. Zuair, and J. Ben-Othman, “Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks,” Computer Networks, vol. 204, article 108691, 2022.

C. Ming, C. Xiaoting, D. Wensheng, and G. Jiahui, “A secure blockchain-based group key agreement protocol for IoT,” The Journal of Supercomputing, vol. 77, no. 8, pp. 9046–9068, 2021.

Gebrekiros Gebreyesus Gebremariam, J. Panda, S. Indu, "Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning", Wireless Communications and Mobile Computing, vol. 2023, Article ID 8068038, 27 pages, 2023.

Lusheng Shi, Kai Li, Huibo Zhu, "Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection", Journal of Applied Mathematics, vol. 2023, Article ID 1046050, 10 pages, 2023.




DOI: https://doi.org/10.31449/inf.v49i4.8970

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.