[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

GD3N: : Adaptive clustering-based detection of selective forwarding attacks in WSNs under variable harsh environments

Published: 02 July 2024 Publication History

Abstract

Wireless sensor networks (WSNs) are susceptible to numerous security threats due to their reliance on open environments and broadcast communication methods. Among these, the selective forwarding attack is notably challenging to detect. This difficulty arises from the ability of malicious nodes to imitate the behavior of normal nodes, and selectively drop data packets, which makes them virtually indistinguishable from normal ones, particularly under conditions of poor channel quality. To address this challenge with harsh environments, we introduce a novel methodology termed GD3N. This approach is underpinned by the design of a unique type of data point that encapsulates both short-term and long-term forwarding behaviors of nodes. It combines a refined version of the Gradient Diffusion Density-based Spatial Clustering of Applications with Noise (GD-DBSCAN) algorithm, with a novel Double-Parameter Neighbor Voting (DP-NV) method based on the data set. These innovations contribute to a significant enhancement in detection accuracy and a reduction in computational complexity when compared to traditional DBSCAN and NV methods. Simulation results show that our GD3N achieves a false detection rate (FDR) of less than 2%, a missed detection rate (MDR) of below 10%, and an overall detection accuracy rate (DAR) of over 95% across various testing scenarios.

Highlights

Introduce a new kind of data point representing both long and short term behaviors of the nodes.
The simplified GD-DBSCAN algorithm utilizes only one parameter to divide nodes into suspicious and normal.
The optimized DP-NV provides a parameter-free mechanism to protect normal nodes from being misjudged.

References

[1]
Chee-Yee Chong, Srikanta P. Kumar, Sensor networks: evolution, opportunities, and challenges, Proc. IEEE 91 (8) (2003) 1247–1256.
[2]
S.M. Riazul Islam, Daehan Kwak, M.D. Humaun Kabir, Mahmud Hossain, Kyung-Sup Kwak, The Internet of things for health care: a comprehensive survey, IEEE Access 3 (2015) 678–708.
[3]
Hai Zhou, Yuanming Wu, Li Feng, Daolei Liu, A security mechanism for cluster-based wsn against selective forwarding, Sensors 16 (9) (2016) 1537.
[4]
Bin Li, Xinglian Zhou, Zhaoke Ning, Xiaoyi Guan, Ka-Fai Cedric Yiu, Dynamic event-triggered security control for networked control systems with cyber-attacks: a model predictive control approach, Inf. Sci. 612 (2022) 384–398.
[5]
Hengwei Zhang, Yan Mi, Yumeng Fu, Xiaohu Liu, Yuchen Zhang, Jindong Wang, Jinglei Tan, Security defense decision method based on potential differential game for complex networks, Comput. Secur. 129 (2023).
[6]
Chris Karlof, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Netw. 1 (2–3) (2003) 293–315.
[7]
M. Abdus Salam, Nayana Halemani, Performance evaluation of wireless sensor network under hello flood attack, Int. J. Comput. Netw. Commun. 8 (2) (2016).
[8]
Younghun Chae, Lisa Cingiser DiPippo, Yan Lindsay Sun, Trust management for defending on-off attacks, IEEE Trans. Parallel Distrib. Syst. 26 (4) (2014) 1178–1191.
[9]
G. Vidhyalakshmi, P. Vaishnavi, A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks, J. Eng. Res. (2023).
[10]
Shiyao Luo, Yingxu Lai, Jing Liu, Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network, Comput. Secur. 126 (2023).
[11]
Anshuman Patel, Devesh Jinwala, A reputation-based rpl protocol to detect selective forwarding attack in Internet of things, Int. J. Commun. Syst. 35 (1) (2022).
[12]
Seemita Pal, Biplab Sikdar, Joe H. Chow, An online mechanism for detection of gray-hole attacks on pmu data, IEEE Trans. Smart Grid 9 (4) (2016) 2498–2507.
[13]
Okan Yaman, Baríş Sokat, Tolga Ayav, Yusuf Murat Erten, A novel countermeasure for selective forwarding attacks in iot networks, in: 2022 3rd International Informatics and Software Engineering Conference (IISEC), IEEE, 2022, pp. 1–6.
[14]
Anfeng Liu, Xiao Liu, He Li, Jun Long Mdma, A multi-data and multi-ack verified selective forwarding attack detection scheme in wsns, IEICE Trans. Inf. Syst. 99 (8) (2016) 2010–2018.
[15]
Xinyu Huang, Yuanming Wu, Identify selective forwarding attacks using danger model: promote the detection accuracy in wireless sensor networks, IEEE Sens. J. 22 (10) (2022) 9997–10008.
[16]
T. Raghavendra, M. Anand, M. Selvi, K. Thangaramya, SVN Santhosh Kumar, A. Kannan, An intelligent rpl attack detection using machine learning-based intrusion detection system for Internet of things, Proc. Comput. Sci. 215 (2022) 61–70.
[17]
Tayyab Khan, Karan Singh, Mohd Shariq, Khaleel Ahmad, K.S. Savita, Ali Ahmadian, Soheil Salahshour, Mauro Conti, An efficient trust-based decision-making approach for wsns: machine learning oriented approach, Comput. Commun. (2023).
[18]
S. Rajasoundaran, A.V. Prabu, G. Sateesh Kumar, Prince Priya Malla, Sidheswar Routray, Secure opportunistic watchdog production in wireless sensor networks: a review, Wirel. Pers. Commun. 120 (2) (2021) 1895–1919.
[19]
Younghun Chae, Lisa Cingiser DiPippo, Yan Lindsay Sun, Trust management for defending on-off attacks, IEEE Trans. Parallel Distrib. Syst. 26 (4) (2014) 1178–1191.
[20]
Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Shen, Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks, IEEE Trans. Wirel. Commun. 15 (5) (2016) 3718–3731.
[21]
Anshuman Patel, Devesh Jinwala, A reputation-based rpl protocol to detect selective forwarding attack in Internet of things, Int. J. Commun. Syst. 35 (1) (2022).
[22]
Tayyab Khan, Karan Singh, Mohd Hilmi Hasan, Khaleel Ahmad, G. Thippa Reddy, Senthilkumar Mohan, Ali Ahmadian Eters, A comprehensive energy aware trust-based efficient routing scheme for adversarial wsns, Future Gener. Comput. Syst. 125 (2021) 921–943.
[23]
Anfeng Liu, Xiao Liu, He Li, Jun Long Mdma, A multi-data and multi-ack verified selective forwarding attack detection scheme in wsns, IEICE Trans. Inf. Syst. 99 (8) (2016) 2010–2018.
[24]
Sujesh P. Lal, PM Joe Prathap, Retracted article: a provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks, J. Ambient Intell. Humaniz. Comput. 12 (5) (2021) 5589–5597.
[25]
Okan Yaman, Baríş Sokat, Tolga Ayav, Yusuf Murat Erten, A novel countermeasure for selective forwarding attacks in iot networks, in: 2022 3rd International Informatics and Software Engineering Conference (IISEC), IEEE, 2022, pp. 1–6.
[26]
Mojtaba Jamshidi, Mehdi Esnaashari, Shahin Ghasemi, Nooruldeen Nasih Qader, Mohammad Reza, Meybodi Dsla, Defending against selective forwarding attack in wireless sensor networks using learning automaton, IEIE Transactions on Smart Processing & Computing 9 (1) (2020) 58–74.
[27]
Ravi Vinayakumar, Mamoun Alazab, K.P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman, Deep learning approach for intelligent intrusion detection system, IEEE Access 7 (2019) 41525–41550.
[28]
Xue Lu, Dezhi Han, Letian Duan, Qiuting Tian, Intrusion detection of wireless sensor networks based on ipso algorithm and bp neural network, Int. J. Comput. Sci. Eng. 22 (2–3) (2020) 221–232.
[29]
Rajshekhar Das, Akshay Gadre, Shanghang Zhang, Swarun Kumar, Jose M.F. Moura, A deep learning approach to iot authentication, in: 2018 IEEE International Conference on Communications (ICC), IEEE, 2018, pp. 1–6.
[30]
Khatereh Ahmadi, Reza Javidan, Trust based iot routing attacks detection using recurrent neural networks, in: 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), IEEE, 2022, pp. 1–7.
[31]
Xinyu Huang, Shunan Li, Yuanming Wu. Lstm-nv, A combined scheme against selective forwarding attack in event-driven wireless sensor networks under harsh environments, Eng. Appl. Artif. Intell. 123 (2023).
[32]
Hao Fu, Yinghong Liu, Zhe Dong, Yuanming Wu, A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks, Sensors 20 (1) (2019) 23.
[33]
Jingze Ding, Haotian Zhang, Zixian Guo, Yuanming Wu, The dpc-based scheme for detecting selective forwarding in clustered wireless sensor networks, IEEE Access 9 (2021) 20954–20967.
[34]
Jingze Ding, Haozhen Wang, Yuanming Wu, The detection scheme against selective forwarding of smart malicious nodes with reinforcement learning in wireless sensor networks, IEEE Sens. J. 22 (13) (2022) 13696–13706.
[35]
Yuting Li, Yuanming Wu, Combine clustering with game to resist selective forwarding in wireless sensor networks, IEEE Access 8 (2020) 138382–138395.
[36]
Yinghong Liu, Yuanming Wu, Employ dbscan and neighbor voting to screen selective forwarding attack under variable environment in event-driven wireless sensor networks, IEEE Access 9 (2021) 77090–77105.
[37]
Martin Ester, Hans-Peter Kriegel, Jörg Sander, Xiaowei Xu, et al., A density-based algorithm for discovering clusters in large spatial databases with noise, in: KDD, vol. 96, 1996, pp. 226–231.
[38]
Bhogeswar Borah, Dhruba K. Bhattacharyya, An improved sampling-based dbscan for large spatial databases, in: International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings, IEEE, 2004, pp. 92–96.
[39]
Junhao Gan, Yufei Tao, Dbscan revisited: mis-claim, un-fixability, and approximation, in: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, 2015, pp. 519–530.
[40]
Yewang Chen, Shengyu Tang, Nizar Bouguila, Cheng Wang, Jixiang Du, HaiLin Li, A fast clustering algorithm based on pruning unnecessary distance computations in dbscan for high-dimensional data, Pattern Recognit. 83 (2018) 375–387.
[41]
Li Meng'Ao, Meng Dongxue, Gu Songyuan, Liu Shufen, Research and improvement of dbscan cluster algorithm, in: 2015 7th International Conference on Information Technology in Medicine and Education (ITME), IEEE, 2015, pp. 537–540.
[42]
Liu Yinghong, Wu Yuanming, Chang Jianyu, The diffusion clustering scheme and hybrid energy balanced routing protocol (dcrp) in multi-hop wireless sensor networks, Adhoc & Sensor Wireless Networks 43 (2019).
[43]
Y.H. Liu, Y.M. Wu, I.N.C. Destech, Diffusion clustering routing protocol (dcrp) in wireless sensor networks, in: Proc. 14th Int. Conf. Wireless Commun., Netw. Mobile Comput., 2018, pp. 406–415.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Information Sciences: an International Journal
Information Sciences: an International Journal  Volume 665, Issue C
Apr 2024
870 pages

Publisher

Elsevier Science Inc.

United States

Publication History

Published: 02 July 2024

Author Tags

  1. Wireless sensor networks
  2. Intrusion detection system
  3. Selective forwarding attack
  4. Data clustering algorithm
  5. Machine learning
  6. Neighbor voting

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media