Efficient Intrusion Detection Algorithms for Smart Cities-Based Wireless Sensing Technologies

The world is experiencing the new development of smart cities. Smart cities’ infrastructure in its core is based on wireless sensor networks (WSNs) and the internet of things (IoT). WSNs consist of tiny smart devices (Motes) that are restricted in terms of memory, storage, processing capabilities, and sensing and communication ranges. Those limitations pose many security issues where regular cryptography algorithms are not suitable to be used. Besides, such capabilities might be degraded in case cheap sensors are deployed with very large numbers in applications, such as smart cities. One of the major security issues in WSNs that affect the overall operation, up to network interruption, in smart cities is the sinkhole routing attack. The paper has three-fold contributions: (1) it utilizes the concept of clustering for energy saving in WSNs, (2) proposing two light and simple algorithms for intrusion detection and prevention in smart cities—threshold-based intrusion detection system (TBIDS) and multipath-based intrusion detection system (MBIDS), and (3) utilizing the cross-layer technique between the application layer and network layer for the purpose of intrusion detection. The proposed methods are evaluated against recent algorithms—S-LEACH, MS-LEACH, and ABC algorithms.

[1]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[2]  Siyuan Ma,et al.  A Charging Algorithm for the Wireless Rechargeable Sensor Network with Imperfect Charging Channel and Finite Energy Storage , 2019, Sensors.

[3]  G. Mahadevan,et al.  A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[4]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[5]  Shu-Chin Wang,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011, Expert Syst. Appl..

[6]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[7]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..

[8]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[9]  Ruirui Zhang,et al.  Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division , 2019, J. Sensors.

[10]  Qiuwei Yang,et al.  Survey of Security Technologies on Wireless Sensor Networks , 2015, J. Sensors.

[11]  Amita Malik,et al.  Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey , 2014, J. Comput. Networks Commun..

[12]  Weifa Liang,et al.  Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers , 2017, Ad Hoc Networks.

[13]  ChooKim-Kwang Raymond,et al.  Distributed denial of service (DDoS) resilience in cloud , 2016 .

[14]  Rabie A. Ramadan,et al.  VEGK: Secure Clustering for Efficient Operation in WSNs , 2013 .

[15]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[16]  Tran Duc Chung,et al.  Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review , 2020 .

[17]  Aline Carneiro Viana,et al.  Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.

[18]  Weisong Shi,et al.  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.

[19]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[20]  Yongping Zhang,et al.  SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[21]  Naixue Xiong,et al.  Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.

[22]  Riadh Dhaou,et al.  Energy-Aware Self-Organization Algorithms for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[23]  Dharma P. Agrawal,et al.  Routing in Wireless Sensor Networks Using Optimization Techniques: A Survey , 2019, Wireless Personal Communications.

[24]  Özgür Saglam,et al.  A Self Organizing Multihop Clustering Protocol for Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[25]  Milind R. Naphade,et al.  Smarter Cities and Their Innovation Challenges , 2011, Computer.

[26]  Ala Al-Fuqaha,et al.  Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications , 2015, AdHocNets 2015.

[27]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[28]  Keqin Li,et al.  Scheduling parallel tasks with energy and time constraints on multiple manycore processors in a cloud computing environment , 2017, Future Gener. Comput. Syst..

[29]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[30]  Riccardo Carotenuto,et al.  A Real-Time Decision Platform for the Management of Structures and Infrastructures , 2019, Electronics.

[31]  Luigi Coppolino,et al.  An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[32]  Yang Yang,et al.  Research of AODV Routing Protocol for Ad Hoc Networks1 , 2013 .

[33]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[34]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[35]  N. Nithiyanandam,et al.  Artificial bee colony based sinkhole detection in wireless sensor networks , 2019, Journal of Ambient Intelligence and Humanized Computing.

[36]  Mansoor Ahmed,et al.  Smart Cities: A Survey on Security Concerns , 2016 .

[37]  Jawahar Arumugam,et al.  Clustering Algorithms for Wireless Sensor Networks Survey , 2020 .

[38]  Eman Shaaban,et al.  Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.

[39]  Mohamed Abid,et al.  Wireless Sensor Network Design Methodologies: A Survey , 2020, J. Sensors.

[40]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..