A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks

Abstract Internet of Things (IoT) has advanced its pervasiveness across the globe for the development of smart networks. It is aimed to deploy network edge that enables smart services and computation for the IoT devices. In addition, this deployment would not only improve the user experience but also provide service resiliency in case of any catastrophes. In IoT applications, the edge computing exploits distributed architecture and closeness of end-users to provide faster response and better quality of service. However, the security concern is majorly addressed to resist the vulnerability of attacks (VoA). Existing methodologies deal only with static wireless sensor web to deduce the intrusions in which the sensor nodes are deployed in a uniform manner to retain the constancy. Since the sensor nodes are constantly being in question through different transmission regions with several levels of velocities, selection of sensor monitoring nodes or guard nodes has become a challenging job in recent research. In addition, the adversaries are also moving from one location to another to explore its specific chores around the network. Thus, to provide flexible security, we propose a secure routing and monitoring protocol with multi-variant tuples using Two-Fish (TF) symmetric key approach to discover and prevent the adversaries in the global sensor network. The proposed approach is designed on the basis of the Authentication and Encryption Model (ATE). Using Eligibility Weight Function (EWF), the sensor guard nodes are selected and it is hidden with the help of complex symmetric key approach. A secure hybrid routing protocol is chosen to be built by inheriting the properties of both Multipath Optimized Link State Routing (OLSR) and Ad hoc On-Demand Multipath Distance Vector (AOMDV) protocols. The result of the proposed approach is shown that it has a high percentage of monitoring nodes in comparison with the existing routing schemes. Moreover, the proposed routing mechanism is resilient to multiple mobile adversaries; and hence it ensures multipath delivery.

[1]  Sana Hoor Jokhio,et al.  Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[2]  Sisi Liu,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2010, IEEE Trans. Mob. Comput..

[3]  Piya Techateerawat,et al.  Energy Efficiency of Intrusion Detection Systems in Wireless Sensor Networks , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.

[4]  Ahmed Helmy,et al.  The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks , 2003, Ad Hoc Networks.

[5]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[6]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[7]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[8]  Peter Friess,et al.  Internet of Things Applications - From Research and Innovation to Market Deployment , 2014 .

[9]  Dehai Zhang,et al.  TARCS: A Topology Change Aware-Based Routing Protocol Choosing Scheme of FANETs , 2019 .

[10]  Chen Zhigang,et al.  A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks , 2010, 2010 International Forum on Information Technology and Applications.

[11]  Wei Wei,et al.  The interactive core of a random wireless sensor network model , 2012, 2012 International Conference on Computer Distributed Control and Intelligent Environmental Monitoring.

[12]  Kun Fang,et al.  Ant colony optimization based polymorphism-aware routing algorithm for ad hoc UAV network , 2016, Multimedia Tools and Applications.

[13]  Prabir Bhattacharya,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .

[14]  Muhammad Ahsan Latif,et al.  Cyber Security Threats Detection in Internet of Things Using Deep Learning Approach , 2019, IEEE Access.

[15]  Yi Liang,et al.  A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.

[16]  Alaauldin Ibrahim,et al.  Integrated comparison of energy efficient routing protocols in wireless sensor network: A survey , 2011, 2011 IEEE Symposium on Business, Engineering and Industrial Applications (ISBEIA).

[17]  Ehssan Sakhaee,et al.  Aeronautical ad hoc networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[18]  Lidong Wang,et al.  Big Data Analytics for Network Intrusion Detection: A Survey , 2017 .

[19]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[20]  Kah Phooi Seng,et al.  A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..

[21]  Azzedine Boukerche,et al.  A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks , 2008, Comput. Networks.

[22]  Pietro Manzoni,et al.  ANEJOS: a Java based simulator for ad hoc networks , 2001, Future Gener. Comput. Syst..

[23]  Mohammad Saiful Islam Mamun,et al.  Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network , 2010, ArXiv.

[24]  Rung Ching Chen,et al.  An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks , 2010, J. Networks.

[25]  Fadi Al-Turjman,et al.  A Hash-Based RFID Authentication Mechanism for Context-Aware Management in IoT-Based Multimedia Systems , 2019, Sensors.

[26]  Fadi Al-Turjman,et al.  A Survey on Multipath Routing Protocols for QoS Assurances in Real-Time Wireless Multimedia Sensor Networks , 2017, IEEE Communications Surveys & Tutorials.

[27]  Fadi Al-Turjman,et al.  Smart parking in IoT-enabled cities: A survey , 2019, Sustainable Cities and Society.

[28]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[29]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[30]  Damla Turgut,et al.  Lightweight routing with dynamic interests in wireless sensor and actor networks , 2013, Ad Hoc Networks.

[31]  Neeraj Kumar,et al.  Fog computing for Healthcare 4.0 environment: Opportunities and challenges , 2018, Comput. Electr. Eng..

[32]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[33]  Jie Li,et al.  A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks , 2009, 2009 Fourth International Conference on Frontier of Computer Science and Technology.

[34]  Fadi Al-Turjman,et al.  Intelligence and security in big 5G-oriented IoNT: An overview , 2020, Future Gener. Comput. Syst..

[35]  Mojtaba Alizadeh,et al.  The application of internet of things in healthcare: a systematic literature review and classification , 2018, Universal Access in the Information Society.

[36]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[37]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[38]  Marisol García-Valls,et al.  Accelerating smart eHealth services execution at the fog computing infrastructure , 2020, Future Gener. Comput. Syst..

[39]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[40]  K. Q. Yan,et al.  A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks , 2009 .

[41]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[42]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[43]  Yuxin Mao A semantic-based intrusion detection framework for wireless sensor network , 2010, INC2010: 6th International Conference on Networked Computing.

[44]  Othman Ibrahim,et al.  Secure Multipath Routing Protocols in Wireless Sensor Networks: A Security Survey Analysis , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.

[45]  YuHua Yuan,et al.  An Optimized Ad-hoc On-demand Multipath Distance Vector(AOMDV) Routing Protocol , 2005, 2005 Asia-Pacific Conference on Communications.

[46]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[47]  Ahmed Yassin Al-Dubai,et al.  New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks , 2015, J. Comput. Syst. Sci..

[48]  Geng Yang,et al.  A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[49]  Zeljko Zilic,et al.  Mobility and Direction Aware Ad-hoc on Demand Distance Vector Routing Protocol , 2016, FNC/MobiSPC.

[50]  Yi Zheng,et al.  A mobility and load aware OLSR routing protocol for UAV mobile ad-hoc networks , 2014 .

[51]  Mohamed Mostafa Abdel-Azim,et al.  A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[52]  Dimitrios D. Vergados,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[53]  Victor I. Chang,et al.  Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..

[54]  Fadi Al-Turjman,et al.  An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..

[55]  Elaine B. Barker,et al.  Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.

[56]  Chia-Fen Hsieh,et al.  Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology , 2010 .

[57]  Abderrezak Rachedi,et al.  muDog: Smart Monitoring Mechanism for Wireless Sensor Networks Based on IEEE 802.15.4 MAC , 2011, 2011 IEEE International Conference on Communications (ICC).

[58]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[59]  Xiaodong Wang,et al.  DIDS: A dynamic model of intrusion detection system in wireless sensor networks , 2008, 2008 International Conference on Information and Automation.