A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

Wireless sensor networks (WSNs) contain numerous nodes that their main goals are to monitor and control environments. Also, sensor nodes distribute based on network usage. One of the most significant issues in this type of network is the energy consumption of sensor nodes. In fixed-sink networks, nodes which are near the sink act as an interface to transfer data of other nodes to sink. This causes the energy consumption of sensors reduces rapidly. Therefore, the lifetime of the network declines. Sensor nodes owing to their weaknesses are susceptible to several threats, one of which is denial-of-sleep attack (DoSA) threatening WSN. Hence, the DoSA refers to the energy loss in these nodes by maintaining the nodes from entering energy-saving and sleep mode. In this paper, a hybrid approach is proposed based on mobile sink, firefly algorithm based on leach, and Hopfield neural network (WSN-FAHN). Thus, mobile sink is applied to both improve energy consumption and increase network lifetime. Firefly algorithm is proposed to cluster nodes and authenticate in two levels to prevent from DoSA. In addition, Hopfield neural network detects the direction route of the sink movement to send data of CH. Furthermore, here WSN-FAHN technique is assessed through wide simulations performed in the NS-2 environment. The WSN-FAHN procedure superiority is demonstrated by simulation outcomes in comparison with contemporary schemes based on performance metrics like packet delivery ratio (PDR), average throughput, detection ratio, and network lifetime while decreasing the average residual energy.

[1]  Christoph Meinel,et al.  Countering Three Denial-of-Sleep Attacks on ContikiMAC , 2017, EWSN.

[2]  Shahram Behzad,et al.  An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..

[3]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[4]  Vikas Juneja,et al.  Security Against Vampire Attack in ADHOC Wireless Sensor Network: Detection and Prevention Techniques , 2018 .

[5]  Shahram Behzad,et al.  Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .

[6]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[7]  Reza Fotohi,et al.  An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.

[8]  Reza Fotohi,et al.  A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.

[9]  Reza Fotohi,et al.  An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .

[10]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[11]  Lindsay N. Childs RSA Cryptography and Prime Numbers , 2019 .

[12]  Jayashree Agarkhed,et al.  Detection of Intruder using KMP Pattern Matching Technique in Wireless Sensor Networks , 2018 .

[13]  Muhammad Mahtab Alam,et al.  Validation of Wired and Wireless Interconnected Body Sensor Networks , 2019, Sensors.

[14]  Xin-She Yang,et al.  Firefly Algorithms for Multimodal Optimization , 2009, SAGA.

[15]  Laura Gheorghe,et al.  Storm Control Mechanism in Wireless Sensor Networks , 2010, 9th RoEduNet IEEE International Conference.

[16]  V. Sumathy,et al.  Swarm Based Defense Technique for Denial-of-Sleep Attacks in Wireless Sensor Networks , 2013 .

[17]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[18]  Yen-Chieh Ouyang,et al.  A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[19]  Gürsel Serpen,et al.  Adaptive and intelligent wireless sensor networks through neural networks: an illustration for infrastructure adaptation through Hopfield network , 2016, Applied Intelligence.

[20]  Mahalakshmi Gunasekaran,et al.  GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN , 2017, Secur. Commun. Networks.

[21]  G. Mahalakshmi,et al.  DENIAL OF SLEEP ATTACK DETECTION USING MOBILE AGENT IN WIRELESS SENSOR NETWORKS , 2018 .

[22]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[23]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[24]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[25]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .

[26]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[27]  Gerhard P. Hancke,et al.  Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.

[28]  Christoph Meinel,et al.  Denial-of-sleep defenses for IEEE 802.15.4 coordinated sampled listening (CSL) , 2019, Comput. Networks.

[29]  Rituparna Chaki,et al.  AMC Model for Denial of Sleep Attack Detection , 2012, ArXiv.

[30]  Shahram Jamali,et al.  Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .

[31]  Annapurna Singh,et al.  A Novel SVM Based IDS for Distributed Denial of Sleep Strike in Wireless Sensor Networks , 2019, Wirel. Pers. Commun..

[32]  G. Padmavathi,et al.  Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique , 2016 .

[33]  Rituparna Chaki,et al.  Lightweight Hierarchical Model for HWSNET , 2011, ArXiv.

[34]  Sugata Sanyal,et al.  Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012, ArXiv.

[35]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .