Efficient Multipath Routing and Anomaly Detection with a Token-Managed Certificateless Authentication Scheme (TM-AD) in WSNs
Abstract
Wireless Sensor Networks (WSNs) are crucial for diverse Internet of Things (IoT) applications, but their inherent resource constraints and distributed nature expose them to significant security vulnerabilities. A primary challenge is the effective and timely detection and mitigation of malicious or misbehaving nodes, which can disrupt network operations, compromise data, and reduce network lifespan. Existing approaches often face obstacles in efficiently addressing these threats. This paper proposes the Token Manager-based Attack Detection (TM-AD) scheme, to enhance WSN security and operational efficiency. The TM-AD system features a "Token Manager" (TM), a dedicated entity responsible for continuous network monitoring, assessing node behavior based on defined parameters, and managing node participation through a token-based mechanism. Upon identifying malicious or anomalous activity, TM-AD facilitates uninterrupted network transmission by orchestrating the replacement of compromised nodes with designated "replacement nodes." The efficacy of the proposed TM-AD system is evaluated through comparative analysis. At 100 network nodes, TM-AD achieved a 100% attack detection rate and 100% network throughput, alongside a reduction in routing overhead of up to 43.8% and in end-to-end delay of up to 74.7% compared to benchmark schemes. These results affirm that TM-AD effectively identifies malicious nodes and significantly enhances network performance across these key metrics, thereby ensuring a more robust and reliable WSN operation.References
D. He, N. Kumar, and J.-H. Lee, “Privacy-preserving data aggregation scheme against internal attackers in smart grids,” Wireless Networks, vol. 22, no. 2, pp. 491–502, 2016.
N. Kumar, K. Kaur, S. C. Misra, and R. Iqbal, “An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud,” Peer-to-Peer Networking and Applications, vol. 9, no. 5, pp. 824–840, 2016.
S. Roy, A. K. Das, S. Chatterjee, N. Kumar, S. Chattopadhyay, and J. J. P. C. Rodrigues, “Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing-based healthcare applications,” IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 457–468, 2019.
N. Temene, C. Sergiou, C. Georgiou, and V. Vassiliou, “A survey on mobility in wireless sensor networks,” Ad Hoc Networks, vol. 125, article 102726, 2022.
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, N. Kumar, and M. M. Hassan, “A privacy-preserving-based secure framework using blockchain-enabled deep-learning in cooperative intelligent transport system,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 16492–16503, 2022.
M. Mahdavisharif, S. Jamali, and R. Fotohi, “Big data-aware intrusion detection system in communication networks: a deep learning approach,” Journal of Grid Computing, vol. 19, no. 4, pp. 1–28, 2021.
L. Feng and B. Liu, “Low-energy data fusion privacy protection algorithm for three-dimensional wireless sensor network,” Mobile Information Systems, vol. 2022, Article ID 3580607, 10 pages, 2022.
K. Pramod, S. Pierluigi, and C. Domenico, “Distributed detection in wireless sensor networks under multiplicative fading via generalized score tests,” IEEE Internet of Things Journal, vol. 8, no. 11, pp. 9059–9071, 2021.
I. Nasurulla and R. Kaniezhil, “Integration of fault-tolerant feature to OMIEEPB routing protocol in wireless sensor network,” International Journal of Intelligent Computing and Cybernetics, vol. 15, no. 3, pp. 414–424, 2022.
V. S. Lakshmi and P. P. Deepthi, “A secure channel code-based scheme for privacy preserving data aggregation in wireless sensor networks,” International Journal of Communication Systems, vol. 32, no. 1, article e3832, 2019.
X. Zhang, L. Zhao, X. Gao, and X. Zhang, “A data-sharing model based on blockchain for power grid big data,” Journal of Physics: Conference Series, vol. 1792, no. 1, article 012051, 2021.
S. Jiang, M. Li, and Z. Tang, “A new scheme for sourcelocation privacy in wireless sensor networks,” International Journal of Network Security, vol. 20, no. 5, pp. 879–888, 2018.
M. K. Alam, A. A. Aziz, S. A. Latif, and A. A. Aziz, “Error-control truncated SVD technique for in-network data compression in wireless sensor networks,” IEEE Access, vol. 9, pp. 13829–13844, 2021.
P. Giri, K. Ng, and W. Phillips, “Wireless sensor network system for landslide monitoring and warning,” IEEE Transactions on Instrumentation and Measurement, vol. 68, no. 4, pp. 1210– 1220, 2019.
T. H. Kim, R. Goyat, M. K. Rai et al., “A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks,” IEEE Access, vol. 7, pp. 184133–184144, 2019.
Z. Abubaker, N. Javaid, A. Almogren, M. Akbar, M. Zuair, and J. Ben-Othman, “Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks,” Computer Networks, vol. 204, article 108691, 2022.
C. Ming, C. Xiaoting, D. Wensheng, and G. Jiahui, “A secure blockchain-based group key agreement protocol for IoT,” The Journal of Supercomputing, vol. 77, no. 8, pp. 9046–9068, 2021.
Gebrekiros Gebreyesus Gebremariam, J. Panda, S. Indu, "Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning", Wireless Communications and Mobile Computing, vol. 2023, Article ID 8068038, 27 pages, 2023.
Lusheng Shi, Kai Li, Huibo Zhu, "Data Fusion and Processing Technology of Wireless Sensor Network for Privacy Protection", Journal of Applied Mathematics, vol. 2023, Article ID 1046050, 10 pages, 2023.
DOI:
https://doi.org/10.31449/inf.v49i4.8970Downloads
Additional Files
Published
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







