Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol

Wireless sensor networks (WSNs) have been vastly employed in the collection and transmission of data via wireless networks. This type of network is nowadays used in many applications for surveillance activities in various environments due to its low cost and easy communications. In these networks, the sensors use a limited power source which after its depletion, since it is non-renewable, network lifetime ends. Due to the weaknesses in sensor nodes, they are vulnerable to many threats. One notable attack threating WSN is Denial of Sleep (DoS). DoS attacks denotes the loss of energy in these sensors by keeping the nodes from going into sleep and energy-saving mode. In this paper, the Abnormal Sensor Detection Accuracy (ASDA-RSA) method is utilised to counteract DoS attacks to reducing the amount of energy consumed. The ASDA-RSA schema in this paper consists of two phases to enhancement security in the WSNs. In the first phase, a clustering approach based on energy and distance is used to select the proper cluster head and in the second phase, the RSA cryptography algorithm and interlock protocol are used here along with an authentication method, to prevent DoS attacks. Moreover, ASDA-RSA method is evaluated here via extensive simulations carried out in NS-2. The simulation results indicate that the WSN network performance metrics are improved in terms of average throughput, Packet Delivery Ratio (PDR), network lifetime, detection ratio, and average residual energy.

[1]  Shahram Behzad,et al.  Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .

[2]  Shahram Jamali,et al.  Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .

[3]  Huirong Fu,et al.  Intrusion Detection System for Wireless Sensor Networks , 2008, Security and Management.

[4]  Chen Chen,et al.  New Method of Energy Efficient Subcarrier Allocation Based on Evolutionary Game Theory , 2018, Mob. Networks Appl..

[5]  De-gan Zhang,et al.  Novel approach of distributed & adaptive trust metrics for MANET , 2019, Wirel. Networks.

[6]  Ren-Hung Hwang,et al.  Energy Depletion Attacks in Low Power Wireless Networks , 2019, IEEE Access.

[7]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[8]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[9]  Yang Xiang,et al.  A novel organizing scheme of single topic user group based on trust chain model in social network , 2018, Int. J. Commun. Syst..

[10]  Reza Fotohi,et al.  A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.

[11]  Vladimir Getov,et al.  Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks , 2018, 2018 UKSim-AMSS 20th International Conference on Computer Modelling and Simulation (UKSim).

[12]  Ting Zhang,et al.  Novel reliable routing method for engineering of internet of vehicles based on graph theory , 2018, Engineering Computations.

[13]  Guang Li,et al.  An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks , 2014, IEEE Transactions on Industrial Informatics.

[14]  Yu-ya Cui,et al.  A New Algorithm of the Best Path Selection Based on Machine Learning , 2019, IEEE Access.

[15]  Yue Dong,et al.  A kind of effective data aggregating method based on compressive sensing for wireless sensor network , 2018, EURASIP Journal on Wireless Communications and Networking.

[16]  VaradharajanVijay,et al.  Intrusion detection techniques in cloud environment , 2017 .

[17]  Xiao-huan Liu,et al.  Dynamic Analysis for the Average Shortest Path Length of Mobile Ad Hoc Networks Under Random Failure Scenarios , 2019, IEEE Access.

[18]  Rituparna Chaki,et al.  Lightweight Hierarchical Model for HWSNET , 2011, ArXiv.

[19]  Xiang Wang,et al.  A Novel Approach to Mapped Correlation of ID for RFID Anti-Collision , 2014, IEEE Transactions on Services Computing.

[20]  Xiang Wang,et al.  Novel Quick Start (QS) method for optimization of TCP , 2016, Wirel. Networks.

[21]  Ting Zhang,et al.  Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education , 2017, J. Netw. Comput. Appl..

[22]  Shahram Behzad,et al.  Queue based Job Scheduling algorithm for Cloud computing , 2013 .

[23]  Yue Dong,et al.  Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning , 2018, J. Netw. Comput. Appl..

[24]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[25]  Xiao-dan Zhang,et al.  Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application , 2012, Enterp. Inf. Syst..

[26]  G. Padmavathi,et al.  Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .

[27]  Yen-Chieh Ouyang,et al.  A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[28]  Reza Fotohi,et al.  A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms , 2020, The Journal of Supercomputing.

[29]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[30]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[31]  Gerhard P. Hancke,et al.  Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.

[32]  Lindsay N. Childs RSA Cryptography and Prime Numbers , 2019 .

[33]  Reza Fotohi,et al.  A Cluster Based Job Scheduling Algorithm for Grid Computing , 2013 .

[34]  Si Liu,et al.  Novel PEECR-based clustering routing approach , 2017, Soft Comput..

[35]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[36]  Christoph Meinel,et al.  Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) , 2019, Comput. Networks.

[37]  Vikas Juneja,et al.  Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques , 2018 .

[38]  Xiaodan Zhang,et al.  A Kind of Novel Method of Power Allocation With Limited Cross-Tier Interference for CRN , 2019, IEEE Access.

[39]  Shahram Jamali,et al.  A Simulative Comparison of DSDV and OLSR Routing Protocols , 2012 .

[40]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .

[41]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[42]  Guoqiang Mao,et al.  New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Intelligent Transportation Systems.

[43]  Shahram Jamali,et al.  Defense against SYN-Flood Denial of Service Attacks Based on Learning Automata , 2012, ArXiv.

[44]  Shahram Jamali,et al.  Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .

[45]  C. A. Clarotti,et al.  Statistical reliability practice from sampling theory to stochastic filtering , 1989 .

[46]  Nathalie Mitton,et al.  Denial-of-Sleep Attacks against IoT Networks , 2019, 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT).

[47]  Reza Fotohi,et al.  Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication , 2020, The Journal of Supercomputing.

[48]  Vijay Varadharajan,et al.  Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..

[49]  Laura Gheorghe,et al.  Storm Control Mechanism in Wireless Sensor Networks , 2010, 9th RoEduNet IEEE International Conference.

[50]  V. Sumathy,et al.  Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks , 2013 .

[51]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[52]  Gulshan Kumar,et al.  Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks , 2017, J. Netw. Comput. Appl..

[53]  Reza Fotohi,et al.  An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.

[54]  De-gan Zhang,et al.  A kind of novel method of service-aware computing for uncertain mobile applications , 2013, Math. Comput. Model..

[55]  Luci Pirmez,et al.  Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques , 2012, International Journal of Wireless Information Networks.

[56]  De-gan Zhang,et al.  A Low Duty Cycle Efficient MAC Protocol Based on Self-Adaption and Predictive Strategy , 2018, Mob. Networks Appl..

[57]  Mahalakshmi Gunasekaran,et al.  GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.

[58]  Ramjee Prasad,et al.  GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network , 2018, Wirel. Pers. Commun..

[59]  Shahram Jamali,et al.  Defense against Black Hole Attacks on AODV Routing Protocol Using Fuzzy Logic , 2017 .

[60]  Ting Zhang,et al.  Novel self-adaptive routing service algorithm for application in VANET , 2018, Applied Intelligence.

[61]  Christoph Meinel,et al.  Countering Three Denial-of-Sleep Attacks on ContikiMAC , 2017, EWSN.

[62]  De-gan Zhang A new approach and system for attentive mobile learning based on seamless migration , 2010, Applied Intelligence.

[63]  Shahram Behzad,et al.  An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..

[64]  Wendi B. Heinzelman,et al.  Energy-Harvesting Wireless Sensor Networks (EH-WSNs) , 2018, ACM Trans. Sens. Networks.

[65]  Ting Zhang,et al.  Novel dynamic source routing protocol (DSR) based on genetic algorithm‐bacterial foraging optimization (GA‐BFO) , 2018, Int. J. Commun. Syst..

[66]  Rituparna Chaki,et al.  AMC Model for Denial of Sleep Attack Detection , 2012, ArXiv.

[67]  Reza Fotohi,et al.  NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things , 2020, The Journal of Supercomputing.

[68]  De-gan Zhang,et al.  New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network , 2015 .

[69]  A. Pravin Renold,et al.  Energy efficient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network , 2019, Pervasive Mob. Comput..

[70]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .