Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection in Wireless Sensor Networks
DOI:
https://doi.org/10.22399/ijcesen.613Keywords:
Wireless Sensor Networks, Node Information, Node Authentication, Network SecurityAbstract
A Wireless Sensor Network (WSN) is a network of low-power, networked sensors that may gather data for a range of applications. These networks rely heavily on energy and security considerations that are essential to their administration. Lightweight cryptography procedures are necessary to attain high levels of security in WSNs because the conventional security approaches are inappropriate due to the restricted resources of the nodes. Topology maintenance and attack protection for individual sensor nodes is impractical. When it comes to monitoring and data collecting, WSNs are frequently used in unattended and hostile environments. Deploying sensor nodes in such an environment leaves the sensor network vulnerable to malicious node insertion since it lacks physical protection. The next step is for an attacker to use malicious nodes to perform a variety of attacks that disrupt network connectivity. In these types of attacks, the malicious node pretends to be a legitimate node by dropping packets at random to evade detection. There are a lot of systems out there for detecting malicious nodes, but only limited models can actually identify assaults. A plethora of sensors and actuators are necessary to enable the automation of modern industrial processes. Prevention of authenticity fraud and non-repudiation is crucial for building trust and identifying data errors in this network. An effective asymmetric-key-based security mechanism is proposed in this paper for distributed cooperative networks that allows all nodes, including the gateway, to establish authentication and non-repudiation with different session keys that can be used for one time usage for authentication and for data security. Assuming there are no malevolent nodes, the approach also provides anonymity and confidentiality. Authentication and non-repudiation are still intact in the event that a single node is hacked. There will be little effect even if additional nodes are compromised. Using the authentication mechanism, this main security architecture prevents incursion from external hostile nodes. This research proposes a Precise Node Authentication using Dynamic Session Key Set and Node Pattern Analysis for Malicious Node Detection (PNA-DSKS-NPA-MND) that is used for accurate node authentication and also for malicious node detection to increase the Quality of Service (QoS) levels in WSN. The proposed model when compared with the traditional models exhibits better performance in node authentication accuracy and also in detection of malicious nodes in the WSN.
References
B. Pang, Z. Teng, H. Sun, C. Du, M. Li and W. Zhu. (Aug. 2021). A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network. in IEEE Wireless Communications Letters. 10(8);1613-1617, doi: 10.1109/LWC.2021.3070630.
Zilberman, A. Stulman and A. Dvir. (2024). Identifying a Malicious Node in a UAV Network. in IEEE Transactions on Network and Service Management. 21(1);1226-1240, doi: 10.1109/TNSM.2023.3300809.
S. Safavat and D. B. Rawat. (2021). On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities. in IEEE Transactions on Intelligent Transportation Systems. 22(8);5050-5059, doi: 10.1109/TITS.2020.3008361.
H. Hu, Y. Han, M. Yao and X. Song. (2022). Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. in IEEE Access. 10;10585-10596, doi: 10.1109/ACCESS.2021.3075959.
X. Li, L. Zhou, X. Yin and J. Ning. (2024). A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model. in IEEE Internet of Things Journal. 11(6);10865-10879, doi: 10.1109/JIOT.2023.3327505.
W. Li, C. Liu, D. Gu, J. Gao and W. Sun. (2023). Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. in IEEE Transactions on Information Forensics and Security. 18;1487-1496, doi: 10.1109/TIFS.2023.3244083.
Z. Qiao et al. (2023). An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. in IEEE Systems Journal. 17(1);72-82, doi: 10.1109/JSYST.2022.3188012.
M. A. Khan et al. (2021). An Efficient and Secure Certificate-Based Access Control and Key Agreement Scheme for Flying Ad-Hoc Networks. in IEEE Transactions on Vehicular Technology. 70(5);4839-4851, doi: 10.1109/TVT.2021.3055895.
K. Sudheeradh, N. N. Jahnavi, P. N. Chine and G. S. Kasbekar. (2024). Efficient and Secure Group Key Management Scheme Based on Factorial Trees for ynamic IoT Settings. in IEEE Access. 12; 5659-5671, doi: 10.1109/ACCESS.2024.3350780.
M. Kumar, P. Mukherjee, K. Verma, S. Verma and D. B. Rawat. (2022). Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. in IEEE Transactions on Network Science and Engineering. 9(5);3272-3281, doi: 10.1109/TNSE.2021.3098011.
X. Gu, G. Zhang, M. Wang, W. Duan, M. Wen and P.-H. Ho. (2022). UAVaided energy-efficient edge computing networks: Security offloading optimization. IEEE Internet Things J. 9(6);4245-4258.
H. Wang, H. Zhao, J. Zhang, D. Ma, J. Li and J. Wei. (2020). Survey on unmanned aerial vehicle networks: A cyber physical system perspective. IEEE Commun. Surveys Tuts. 22(2);1027-1070.
Y. Lei, L. Zeng, Y.-X. Li, M.-X. Wang and H. Qin. (2021). A lightweight authentication protocol for UAV networks based on security and computational resource optimization. IEEE Access. 9;53769-53785.
K. Rahman, M. A. Aziz, A. U. Kashif and T. A. Cheema. (2022). Detection of security attacks using intrusion detection system for UAV networks: A survey. in Big Data Analytics and Computational Intelligence for Cybersecurity. Cham, Switzerland:Springer, pp. 109-123.
A.Rugo, C. A. Ardagna and N. E. Ioini. (2022). A security review in the UAVNet era: Threats countermeasures and gap analysis. ACM Comput. Surveys. 55(1);1-35.
X. He, Q. Chen, L. Tang, W. Wang and T. Liu. (2023). CGAN-based collaborative intrusion detection for UAV networks: A blockchain-empowered distributed federated learning approach. IEEE Internet Things J. 10(1);120-132.
L. Kong, B. Chen, F. Hu and J. Zhang. (2022). Lightweight mutual authentication scheme enabled by stateless blockchain for UAV networks. Security Commun. Netw. 2022.
A.Kumar, Y. Singh and N. Kumar. (2022). Secure unmanned aerial vehicle (UAV) communication using blockchain technology. in Recent Innovations in Computing, Singapore:Springer. pp. 201-211.
J. Shen, Z. Gui, X. Chen, J. Zhang and Y. Xiang. (2022). Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks. IEEE Trans. Dependable Secure Compu. 19(3);1464-1475.
Y. A. Qadri, A. Nauman, Y. B. Zikria, A. V. Vasilakos and S. W. Kim. (2020). The future of healthcare Internet of Things: A survey of emerging technologies. IEEE Commun. Surveys Tuts. 22(2);1121-1167.
Peng, M. Luo, L. Li, K.-K. R. Choo and D. He. (2021). Efficient certificateless online/offline signature scheme for wireless body area networks. IEEE Internet Things J. 8(18);14287-14298.
W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han and C. Su. (2022). Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE Trans. Ind. Informat. 18(10);7059-7067.
J. Liu, L. Wang and Y. Yu. (2020). Improved security of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 7(6);5256-5266.
Y. Zhan, B. Wang and R. Lu. (2021). Cryptanalysis and improvement of a pairing-free certificateless aggregate signature in healthcare wireless medical sensor networks. IEEE Internet Things J. 8(7);5973-5984.
L. Deng, Y. Yang and R. Gao. (2021). Certificateless designated verifier anonymous aggregate signature scheme for healthcare wireless sensor networks. IEEE Internet Things J. 8(11);8897-8909.
Y. Hou, H. Xiong, X. Huang and S. Kumari. (2021). Certificate-based parallel key-insulated aggregate signature against fully chosen key attacks for Industrial Internet of Things. IEEE Internet Things J. 8(11);8935-8948.
F. Benhamouda et al. (2020). Can a public blockchain keep a secret? Theory Cryptography, pp. 260-290.
Gentry et al. (2021). YOSO: You only speak once. Proc. Adv. Cryptology–CRYPTO, pp. 64-93.
M. Devika, & S. Maflin Shaby. (2024). Optimizing Wireless Sensor Networks: A Deep Reinforcement Learning-Assisted Butterfly Optimization Algorithm in MOD-LEACH Routing for Enhanced Energy Efficiency. International Journal of Computational and Experimental Science and Engineering, 10(4);1329-1336. https://doi.org/10.22399/ijcesen.708
M, P., B, J., B, B., G, S., & S, P. (2024). Energy-efficient and location-aware IoT and WSN-based precision agricultural frameworks. International Journal of Computational and Experimental Science and Engineering, 10(4);585-591. https://doi.org/10.22399/ijcesen.480
Radhi, M., & Tahseen, I. (2024). An Enhancement for Wireless Body Area Network Using Adaptive Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);388-396. https://doi.org/10.22399/ijcesen.409
S, P. S., N. R., W. B., R, R. K., & S, K. (2024). Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);341-349. https://doi.org/10.22399/ijcesen.395
Nennuri, R., S. Iwin Thanakumar Joseph, B. Mohammed Ismail, & L.V. Narasimha Prasad. (2024). A Hybrid Probabilistic Graph Based Community Clustering Model for Large Social Networking Link Prediction Data. International Journal of Computational and Experimental Science and Engineering, 10(4);971-982. https://doi.org/10.22399/ijcesen.574
M, S., S, P., K, D., T, V., & D, B. (2024). Enhanced Energy efficient routing protocol for OnDemand distance vector routing to improve communication in border area Military communication. International Journal of Computational and Experimental Science and Engineering, 10(4);656-662. https://doi.org/10.22399/ijcesen.492
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.