Skip to main content
Erschienen in: Wireless Personal Communications 4/2021

20.04.2020

Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network

verfasst von: G. Keerthana, P. Anandan, N. Nandhagopal

Erschienen in: Wireless Personal Communications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The development of the wireless sensor networks (WSNs) in the recent years is mainly due to the readily obtainable low-cost and short-range sensors. The objective of the WSN system is to both sense and transmit the real-time sense contents belonging to a particular monitoring environment for the back-end system for performing the necessary processing and analysis tasks. One of the most significant tasks of prime consideration is to ensure the safety and privacy aspects of the WSN in a wireless channel. The ultimate idea of the wireless sensor network is to preserve the limited node energy and thereby process the huge volume of data without affecting the robustness. The main objective of this work is to strengthen the robustness of the wireless sensor network that particularly relies on a scale-free type of network. The ability of the Scale-free WSNs in tolerating the random attacks efficiently have made them appear significant; on the other hand, they may be vulnerable to certain malicious attacks, that specifically targets the significant nodes in the system. This limitation has been addressed in this work by means of introducing a new modelling strategy called sequential probability ratio test (SPRT) that assists in the generation of scale-free network topologies. SPRT, a unique robustness improvising algorithm for the scale free type of WSNs, has been designed in this work and also the proposed SPRT is compared with the existing EROSE technique. The wide range of experimental results thus ensure that the introduced SPRT modelling methodology can achieves robustness and enhances the security of WSN.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Qiu, T., Zhao, A., Xia, F., Si, W., & Wu, D. O. (2017). ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Transactions on Networking, 25(5), 2944–2959. CrossRef Qiu, T., Zhao, A., Xia, F., Si, W., & Wu, D. O. (2017). ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Transactions on Networking, 25(5), 2944–2959. CrossRef
2.
Zurück zum Zitat Bellardo, J., & Savage, S. (2003). 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security symposium (Vol. 12, pp. 2–2). Bellardo, J., & Savage, S. (2003). 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security symposium (Vol. 12, pp. 2–2).
3.
Zurück zum Zitat Bernard Ab oba. IEEE 802.1X Pre-Authentication. Prese Ntation to 802.11 WGi, July 2002 Bernard Ab oba. IEEE 802.1X Pre-Authentication. Prese Ntation to 802.11 WGi, July 2002
4.
Zurück zum Zitat Bohge, M., & Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on wireless security (pp. 79–87). Bohge, M., & Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on wireless security (pp. 79–87).
5.
Zurück zum Zitat Capkun, S., Buttyán, L., & Hubaux, J. P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, 2(1), 52–64.CrossRef Capkun, S., Buttyán, L., & Hubaux, J. P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, 2(1), 52–64.CrossRef
6.
Zurück zum Zitat Sivakumar, P., Amirthavalli, K., & Senthil, M. (2014). Power conservation and security enhancement in wireless sensor networks: A priority based approach. International Journal of Distributed Sensor Networks, 10(5), 319587.CrossRef Sivakumar, P., Amirthavalli, K., & Senthil, M. (2014). Power conservation and security enhancement in wireless sensor networks: A priority based approach. International Journal of Distributed Sensor Networks, 10(5), 319587.CrossRef
7.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks., 38, 393–422.CrossRef Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks., 38, 393–422.CrossRef
8.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys & Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys & Tutorials, 8(2), 2–23.CrossRef
9.
Zurück zum Zitat Liu, L., Qi, X., Xue, J., & Xie, M. (2014). A topology construct and control model with small-world and scale-free concepts for heterogeneous sensor networks. International Journal of Distributed Sensor Networks, 10(3), 374251.CrossRef Liu, L., Qi, X., Xue, J., & Xie, M. (2014). A topology construct and control model with small-world and scale-free concepts for heterogeneous sensor networks. International Journal of Distributed Sensor Networks, 10(3), 374251.CrossRef
10.
Zurück zum Zitat Du, W. B., Wu, Z. X., & Cai, K. Q. (2013). Effective usage of shortest paths promotes transportation efficiency on scale-free networks. Physica A: Statistical Mechanics and Its Applications, 392(17), 3505–3512.MathSciNetCrossRef Du, W. B., Wu, Z. X., & Cai, K. Q. (2013). Effective usage of shortest paths promotes transportation efficiency on scale-free networks. Physica A: Statistical Mechanics and Its Applications, 392(17), 3505–3512.MathSciNetCrossRef
11.
Zurück zum Zitat Zheng, G., Liu, S., & Qi, X. (2012). Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. Computers & Electrical Engineering, 38(3), 643–651.CrossRef Zheng, G., Liu, S., & Qi, X. (2012). Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. Computers & Electrical Engineering, 38(3), 643–651.CrossRef
12.
Zurück zum Zitat Zheng, G., & Liu, Q. (2013). Scale-free topology evolution for wireless sensor networks. Computers & Electrical Engineering, 39(6), 1779–1788.CrossRef Zheng, G., & Liu, Q. (2013). Scale-free topology evolution for wireless sensor networks. Computers & Electrical Engineering, 39(6), 1779–1788.CrossRef
13.
Zurück zum Zitat Jian, Y., Wang, Y., Zhang, Z., & Lin, C. (2013). Scale-free model for wireless sensor networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 2329–2332). IEEE. Jian, Y., Wang, Y., Zhang, Z., & Lin, C. (2013). Scale-free model for wireless sensor networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 2329–2332). IEEE.
14.
Zurück zum Zitat Louzada, V. H., Daolio, F., Herrmann, H. J., & Tomassini, M. (2013). Smart rewiring for network robustness. Journal of Complex networks, 1(2), 150–159.CrossRef Louzada, V. H., Daolio, F., Herrmann, H. J., & Tomassini, M. (2013). Smart rewiring for network robustness. Journal of Complex networks, 1(2), 150–159.CrossRef
15.
Zurück zum Zitat Zhou, M., & Liu, J. (2014). A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A: Statistical Mechanics and its Applications, 410, 131–143.CrossRef Zhou, M., & Liu, J. (2014). A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A: Statistical Mechanics and its Applications, 410, 131–143.CrossRef
16.
Zurück zum Zitat Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S., & Herrmann, H. J. (2011). Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences, 108(10), 3838–3841.CrossRef Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S., & Herrmann, H. J. (2011). Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences, 108(10), 3838–3841.CrossRef
17.
Zurück zum Zitat Herrmann, H. J., Schneider, C. M., Moreira, A. A., Andrade, J. S., Jr., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(01), 1–9.CrossRef Herrmann, H. J., Schneider, C. M., Moreira, A. A., Andrade, J. S., Jr., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(01), 1–9.CrossRef
18.
Zurück zum Zitat Buesser, P., Daolio, F., & Tomassini, M. (2011). Optimizing the robustness of scale-free networks with simulated annealing. In International conference on adaptive and natural computing algorithms (pp. 167–176). Springer, Berlin. Buesser, P., Daolio, F., & Tomassini, M. (2011). Optimizing the robustness of scale-free networks with simulated annealing. In International conference on adaptive and natural computing algorithms (pp. 167–176). Springer, Berlin.
19.
Zurück zum Zitat Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 5-pp). IEEE. Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 5-pp). IEEE.
20.
Zurück zum Zitat Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on wireless security (pp. 43–52). Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on wireless security (pp. 43–52).
21.
Zurück zum Zitat Mishra, A., & Arbaugh, W. A. (2002). An initial security analysis of the IEEE 802.1 X standard. In CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002 Mishra, A., & Arbaugh, W. A. (2002). An initial security analysis of the IEEE 802.1 X standard. In CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002
22.
Zurück zum Zitat Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In IEEE INFOCOM 2008-The 27th conference on computer communications (pp. 1768–1776). IEEE. Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In IEEE INFOCOM 2008-The 27th conference on computer communications (pp. 1768–1776). IEEE.
23.
Zurück zum Zitat Patwari, N., & Kasera, S. K. (2007). Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking (pp. 111–122). Patwari, N., & Kasera, S. K. (2007). Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking (pp. 111–122).
24.
Zurück zum Zitat Wool, A. (2005). Lightweight key management for IEEE 802.11 wireless lans with key refresh and host revocation. Wireless Networks, 11(6), 677–686.CrossRef Wool, A. (2005). Lightweight key management for IEEE 802.11 wireless lans with key refresh and host revocation. Wireless Networks, 11(6), 677–686.CrossRef
25.
Zurück zum Zitat Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923.CrossRef Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923.CrossRef
26.
Zurück zum Zitat Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.CrossRef Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.CrossRef
27.
Zurück zum Zitat Wei, J., Yang, G., & Mu, Y. (2015). Comments on accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(4), 3097–3099.CrossRef Wei, J., Yang, G., & Mu, Y. (2015). Comments on accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(4), 3097–3099.CrossRef
28.
Zurück zum Zitat Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.CrossRef
29.
Zurück zum Zitat Wang, K., Yuan, L., Miyazaki, T., Zeng, D., Guo, S., & Sun, Y. (2017). Strategic antieavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology, 66(10), 9448–9457.CrossRef Wang, K., Yuan, L., Miyazaki, T., Zeng, D., Guo, S., & Sun, Y. (2017). Strategic antieavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology, 66(10), 9448–9457.CrossRef
Metadaten
Titel
Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network
verfasst von
G. Keerthana
P. Anandan
N. Nandhagopal
Publikationsdatum
20.04.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07356-5

Weitere Artikel der Ausgabe 4/2021

Wireless Personal Communications 4/2021 Zur Ausgabe

Neuer Inhalt