Evaluating Security Mechanisms for Wireless Sensor Networks in IoT and IIoT

Tamara Zhukabayeva, Atdhe Buja, Melinda Pacolli

Abstract


In the era of interconnected digital ecosystems, the security of Wireless Sensor Networks (WSN) emerges as a pivotal concern, especially within the domains of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). However, the very nature of WSNs—being distributed, resource-constrained, and often deployed in unattended environments—poses unique cybersecurity challenges.  A main issue and challenge remains their Cybersecurity in communication. In this paper, we provide a systematic review focused on three themes including 1) techniques for secure communication in WSN; 2) algorithms and methods for intrusion detection in WSN; and 3) IoT and IIoT security concerning WSN. It has provided the results of its own for the publications made in the data analysis of three themes. The paper also has a simulation experiment to investigate the behavior of WSNs under sinkhole attacks—one of the prevalent threats to network integrity. Utilizing the Contiki OS Cooja simulator, the experiment carefully evaluates the performance of existing detection algorithms and introduces a novel method for identifying and neutralizing malicious nodes. Our simulation discloses unconventional communication patterns during sinkhole attacks running RPL protocol, emphasizing the effectiveness of our detection mechanisms against cyber threats. Particularly, the introduction of a malicious node (Node 13) significantly disrupted network communication, with traditional security mechanisms failing to immediately detect and isolate the threat. The scope of future research work will include the broader spectrum of cyber threats beyond sinkhole attacks, exploring advanced detection mechanisms, and machine learning-based security protocols for enhanced trust and transparency in WSN communications.

Keywords


Wireless Sensor Network; Cybersecurity; Sinkhole Attack Detection; Real-Time Attack Identification; IoT.

Full Text:

PDF

References


V. A. Desnitsky, I. V. Kotenko, and I. B. Parashchuk, “Fuzzy Sets in Problems of Identification of Attacks on Wireless Sensor Networks,” 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), pp. 290-293 2021, doi: 10.1109/elconrus51938.2021.9396712.

R. Hou, G. Ren, C. Zhou, H. Yue, H. Liu, and J. Liu, “Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things,” Computer Communications, vol. 158, pp. 64–72, May 2020, doi: 10.1016/j.comcom.2020.04.019.

A. Buja, M. Apostolova, and A. Luma, “Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment,” 2023 12th Mediterranean Conference on Embedded Computing (MECO), pp. 1-5, 2023, doi: 10.1109/meco58584.2023.10155100.

Z. Chiba, N. Abghour, K. Moussaid, O. Lifandali, and R. Kinta, “A Deep Study of Novel Intrusion Detection Systems and Intrusion Prevention Systems for Internet of Things Networks,” Procedia Computer Science, vol. 210, pp. 94–103, 2022, doi: 10.1016/j.procs.2022.10.124.

I. Souissi, N. Ben Azzouna, and L. Ben Said, “A multi-level study of information trust models in WSN-assisted IoT,” Computer Networks, vol. 151, pp. 12–30, Mar. 2019, doi: 10.1016/j.comnet.2019.01.010.

N. A. Anagnostopoulos, S. Ahmad, T. Arul, D. Steinmetzer, M. Hollick, and S. Katzenbeisser, “Low-cost Security for Next-generation IoT Networks,” ACM Transactions on Internet Technology, vol. 20, no. 3, pp. 1–31, Aug. 2020, doi: 10.1145/3406280.

C. Konstantopoulos, B. Mamalis, and G. Pantziou, “Secure and trust-aware routing in wireless sensor networks,” Proceedings of the 22nd Pan-Hellenic Conference on Informatics, pp. 312-317, 2018, doi: 10.1145/3291533.3291544.

M. Shokry, A. I. Awad, M. K. Abd-Ellah, and A. A. M. Khalaf, “Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision,” Future Generation Computer Systems, vol. 136, pp. 358–377, Nov. 2022, doi: 10.1016/j.future.2022.06.013.

N. Djedjig, D. Tandjaoui, F. Medjek, and I. Romdhani, “Trust-aware and cooperative routing protocol for IoT security,” Journal of Information Security and Applications, vol. 52, p. 102467, Jun. 2020, doi: 10.1016/j.jisa.2020.102467.

M. Raju and K. P. Lochanambal, “An Insight on Clustering Protocols in Wireless Sensor Networks,” Cybernetics and Information Technologies, vol. 22, no. 2, pp. 66–85, Jun. 2022, doi: 10.2478/cait-2022-0017.

T.-M. Hoang, V.-H. Bui, N.-L. Vu, and D.-H. Hoang, “A Lightweight Mixed Secure Scheme based on the Watermarking Technique for Hierarchy Wireless Sensor Networks,” 2020 International Conference on Information Networking (ICOIN), 2020, doi: 10.1109/icoin48656.2020.9016541.

I. Ahmad et al., “Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–15, Dec. 2021, doi: 10.1155/2021/1444024.

N. Abosata, S. Al-Rubaye, G. Inalhan, and C. Emmanouilidis, “Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications,” Sensors, vol. 21, no. 11, p. 3654, May 2021, doi: 10.3390/s21113654.

A. B. Alnajjar et al., “Wireless Sensor Network Optimization Using Genetic Algorithm,” Journal of Robotics and Control (JRC), vol. 3, no. 6, pp. 827–835, Jan. 2023, doi: 10.18196/jrc.v3i6.16526.

M. Mahmood Akawee, M. A. Meteab Al-Obaidi, H. M. Turki Al-Hilfi, S. I. Jassim, and T. Sutikno, “An efficient hybrid model for secure transmission of data by using efficient data collection and dissemination (EDCD) algorithm based WSN,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 20, no. 1, p. 545, Oct. 2020, doi: 10.11591/ijeecs.v20.i1.pp545-551.

N. V. Tanh, N. Q. Tri, and M. M. Trung, “The solution to improve information security for IoT networks by combining lightweight encryption protocols,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 23, no. 3, p. 1727, Sep. 2021, doi: 10.11591/ijeecs.v23.i3.pp1727-1735.

S. W. Nourildean, M. D. Hassib, and Y. A. Mohammed, “Internet of things based wireless sensor network: a review,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 27, no. 1, p. 246, Jul. 2022, doi: 10.11591/ijeecs.v27.i1.pp246-261.

R. Waseem Anwar, A. Zainal, and S. Iqbal, “Systematic literature review on designing trust-based security for WSNs,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 14, no. 3, p. 1395, Jun. 2019, doi: 10.11591/ijeecs.v14.i3.pp1395-1404.

N. S. Patil and A. Parveen, “Consensus-based secure and efficient compressive sensing in a wireless network sensors environment,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 1, p. 200, Apr. 2023, doi: 10.11591/ijeecs.v30.i1.pp200-207.

M. S. Asaad and M. S. Croock, “Adaptive security approach for wireless sensor network using RSA algorithm,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 1, p. 361, Apr. 2021, doi: 10.11591/ijeecs.v22.i1.pp361-368.

R. H. Chamarajappa and G. C. Dyamanna, “A novel and distributed three phase consensus based secured data sharing in internet of things environment,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 2, p. 636, Aug. 2023, doi: 10.11591/ijeecs.v31.i2.pp636-646.

S. Lata, S. Mehfuz, and S. Urooj, “Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies,” IEEE Access, vol. 9, pp. 161103–161128, 2021, doi: 10.1109/access.2021.3131367.

N. Abd El-mawla, M. Badawy, and H. Arafat, “Security And Key Management Challenges Over Wsn (A Survey),” International Journal of Computer Science & Engineering Survey, vol. 10, no. 1, pp. 15–34, Feb. 2019, doi: 10.5121/ijcses.2019.10102.

I. L. G and V. Kavitha, “Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment,” Peer-to-Peer Networking and Applications, vol. 14, no. 2, pp. 821–836, Jan. 2021, doi: 10.1007/s12083-020-01038-6.

S.-K. Yang, Y.-M. Shiue, Z.-Y. Su, I.-H. Liu, and C.-G. Liu, “An Authentication Information Exchange Scheme in WSN for IoT Applications,” IEEE Access, vol. 8, pp. 9728–9738, 2020, doi: 10.1109/access.2020.2964815.

R. Prodanović et al., “Wireless Sensor Network in Agriculture: Model of Cyber Security,” Sensors, vol. 20, no. 23, p. 6747, Nov. 2020, doi: 10.3390/s20236747.

N. Narang and S. Kar, “A hybrid trust management framework for a multi-service social IoT network,” Computer Communications, vol. 171, pp. 61–79, Apr. 2021, doi: 10.1016/j.comcom.2021.02.015.

R. Yin, F. Zhang, Y. Xu, L. Liu, and X. Li, “A security routing algorithm against selective forwarding attacks in scale-free networks,” Procedia Computer Science, vol. 174, pp. 543–548, 2020, doi: 10.1016/j.procs.2020.06.151.

A. K. Sikder, G. Petracca, H. Aksu, T. Jaeger, and A. S. Uluagac, “A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1125–1159, 2021, doi: 10.1109/comst.2021.3064507.

A. Buja, M. Apostolova, A. Luma, and Y. Januzaj, "Cyber Security standards for the Industrial Internet of Things (IIoT)," in Proc. of the 1st Doctoral Colloquium on Sustainable Development, pp. 1-6, 2022.

W. M. Ismael, M. Gao, A. Zahary, Z. Yemeni, Y. Ibrahim, and A. Hawban, “Edge-based Anomaly Data Detection Approach for Wireless Sensor Network-based Internet of Things,” 2021 International Conference of Technology, Science and Administration (ICTSA), pp. 1-6, Mar. 2021, doi: 10.1109/ictsa52017.2021.9406548.

Y. Lai et al., “Identifying malicious nodes in wireless sensor networks based on correlation detection,” Computers & Security, vol. 113, p. 102540, Feb. 2022, doi: 10.1016/j.cose.2021.102540.

X. Wang, T. Zhou, and J. Zhu, “Network security assessment based on full host-based attack graph,” Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies, pp. 230-235, Dec. 2020, doi: 10.1145/3444370.3444577.

M. A. Al-Naeem, “Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS,” IEEE Access, vol. 9, pp. 87070–87078, 2021, doi: 10.1109/access.2021.3089683.

M. K. Rusia and D. K. Singh, “A Color-Texture-Based Deep Neural Network Technique to Detect Face Spoofing Attacks,” Cybernetics and Information Technologies, vol. 22, no. 3, pp. 127–145, Sep. 2022, doi: 10.2478/cait-2022-0032.

F. F. Zijie, M. A. Al-Shareeda, M. A. Saare, S. Manickam, and S. Karuppayah, “Wireless sensor networks in the internet of things: review, techniques, challenges, and future directions,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 31, no. 2, p. 1190, Aug. 2023, doi: 10.11591/ijeecs.v31.i2.pp1190-1200.

A. D. Salman, O. I. Khalaf, and G. M. Abdulsaheb, “An adaptive intelligent alarm system for wireless sensor network,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 15, no. 1, p. 142, Jul. 2019, doi: 10.11591/ijeecs.v15.i1.pp142-147.

M. Alauddin Rezvi, S. Moontaha, K. Akter Trisha, S. Tasnim Cynthia, and S. Ripon, “Data mining approach to analyzing intrusion detection of wireless sensor network,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no. 1, p. 516, Jan. 2021, doi: 10.11591/ijeecs.v21.i1.pp516-523.

A. Arshad, Z. Mohd Hanapi, S. Subramaniam, and R. Latip, “A survey of Sybil attack countermeasures in IoT-based wireless sensor networks,” PeerJ Computer Science, vol. 7, p. e673, Sep. 2021, doi: 10.7717/peerj-cs.673.

S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park, “Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges,” IEEE Access, vol. 8, pp. 3343–3363, 2020, doi: 10.1109/access.2019.2962829.

A. Buja, M. Apostolova, A. Luma, and Y. Januzaj, “Cyber Security Standards for the Industrial Internet of Things (IIoT)– A Systematic Review,” 2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), pp. 1-6, Jun. 2022, doi: 10.1109/hora55278.2022.9799870.

Z. Huanan, X. Suping, and W. Jiannan, “Security and application of wireless sensor network,” Procedia Computer Science, vol. 183, pp. 486–492, 2021, doi: 10.1016/j.procs.2021.02.088.

A. Tewari and B. B. Gupta, “Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework,” Future Generation Computer Systems, vol. 108, pp. 909–920, Jul. 2020, doi: 10.1016/j.future.2018.04.027.

G. George and S. M. Thampi, “Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things,” Pervasive and Mobile Computing, vol. 59, p. 101068, Oct. 2019, doi: 10.1016/j.pmcj.2019.101068.

K. S. Sudha and N. Jeyanthi, “A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT),” Cybernetics and Information Technologies, vol. 21, no. 3, pp. 50–72, Sep. 2021, doi: 10.2478/cait-2021-0029.

H. Abdi Nasib Far, M. Bayat, A. Kumar Das, M. Fotouhi, S. M. Pournaghi, and M. A. Doostari, “LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT,” Wireless Networks, vol. 27, no. 2, pp. 1389–1412, Jan. 2021, doi: 10.1007/s11276-020-02523-9.

S. Paliwal, “Hash-Based Conditional Privacy Preserving Authentication and Key Exchange Protocol Suitable for Industrial Internet of Things,” IEEE Access, vol. 7, pp. 136073–136093, 2019, doi: 10.1109/access.2019.2941701.

G. Puthilibai, T. Benil, S. Chitradevi, V. Devatarika, D. R. Ashwin Kumar, and U. Padma, “Securing IIoT sensors communication using blockchain technology,” 2022 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), pp. 1-4, Dec. 2022, doi: 10.1109/icpects56089.2022.10047053.

Y. Tian, Z. Wang, J. Xiong, and J. Ma, “A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs,” IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp. 6193–6202, Sep. 2020, doi: 10.1109/tii.2020.2965975.

G. Persada Nurani Hakim, D. Septiyana, and I. Suwarno, “Survey Paper Artificial and Computational Intelligence in the Internet of Things and Wireless Sensor Network,” Journal of Robotics and Control (JRC), vol. 3, no. 4, pp. 439–454, Jul. 2022, doi: 10.18196/jrc.v3i4.15539.

G. Gardašević, K. Katzis, D. Bajić, and L. Berbakov, “Emerging Wireless Sensor Networks and Internet of Things Technologies—Foundations of Smart Healthcare,” Sensors, vol. 20, no. 13, p. 3619, Jun. 2020, doi: 10.3390/s20133619.

K. Tsiknas, D. Taketzis, K. Demertzis, and C. Skianis, “Cyber Threats to Industrial IoT: A Survey on Attacks and Countermeasures,” IoT, vol. 2, no. 1, pp. 163–186, Mar. 2021, doi: 10.3390/iot2010009.

Rachit, S. Bhatt, and P. R. Ragiri, “Security trends in Internet of Things: a survey,” SN Applied Sciences, vol. 3, no. 1, Jan. 2021, doi: 10.1007/s42452-021-04156-9.

O. Vermesan et al., “Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms,” Cognitive Hyperconnected Digital Transformation, pp. 97–155, Sep. 2022, doi: 10.1201/9781003337584-4.

U. P. D. Ani, J. M. Watson, B. Green, B. Craggs, and J. R. C. Nurse, “Design Considerations for Building Credible Security Testbeds: Perspectives from Industrial Control System Use Cases,” Journal of Cyber Security Technology, vol. 5, no. 2, pp. 71–119, Nov. 2020, doi: 10.1080/23742917.2020.1843822.

K. Kandasamy, S. Srinivas, K. Achuthan, and V. P. Rangan, “IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process,” EURASIP Journal on Information Security, vol. 2020, no. 1, May 2020, doi: 10.1186/s13635-020-00111-0.

E. Navarro, N. Costa, and A. Pereira, “A Systematic Review of IoT Solutions for Smart Farming,” Sensors, vol. 20, no. 15, p. 4231, Jul. 2020, doi: 10.3390/s20154231.

V. Choudhary, A. Srivastava, A. Kumar, and S. Taruna, “Comparative Analysis of Security Issues and Trends in IoT and WSN,” SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology, vol. 14, no. 2, pp. 216–222, Jun. 2022, doi: 10.18090/samriddhi.v14i02.16.

G. Sharma, S. Vidalis, N. Anand, C. Menon, and S. Kumar, “A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues,” Electronics, vol. 10, no. 19, p. 2365, Sep. 2021, doi: 10.3390/electronics10192365.

J. Lee et al., “PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices,” Sensors, vol. 22, no. 18, p. 7075, Sep. 2022, doi: 10.3390/s22187075.




DOI: https://doi.org/10.18196/jrc.v5i4.21683

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Tamara Zhukabayeva, Atdhe Buja, Melinda Pacolli

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


Journal of Robotics and Control (JRC)

P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com


Kuliah Teknik Elektro Terbaik