ArticlePublisher preview available

A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and random forest (RF) models.
This content is subject to copyright. Terms and conditions apply.
FOCUS
A novel implementation of routing attack detection scheme by using
fuzzy and feed-forward neural networks
M. Ezhilarasi
1
L. Gnanaprasanambikai
2
A. Kousalya
3
M. Shanmugapriya
4
Accepted: 14 February 2022 / Published online: 14 March 2022
The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022
Abstract
The application of wireless sensor networks is not limited to a particular domain. Technology advancements result in
innovative solutions for simple communication to large applications via wireless sensor IoT networks. Besides the
advancements, there is a serious issue in terms of threats or attacks on wireless sensor networks, which is common. Various
intrusion detection methodologies have evolved so far to detect common network attacks. But it is essential to concentrate
on other routing attacks like selective forwarding attack, black hole attack, Sybil attack, wormhole attack, identity
replication attack, and hello flood attack. Existing research models concentrate on any one of the above-mentioned routing
attacks and attain better detection performance. Detecting each attack through different detection mechanisms will increase
the overall cost, and it is a tedious process. Considering this factor, in this research work, a novel intrusion detection system
is introduced to detect routing attacks in wireless sensor networks using fuzzy and feed-forward neural networks. The
experimental results demonstrate that the proposed model attains an average detection rate of 97.8% and a maximum
detection accuracy of 98.8%, compared to existing techniques like support vector machine (SVM), decision tree (DT), and
random forest (RF) models.
Keywords Intrusion detection Routing attacks Wireless sensor networks Neural networks
1 Introduction
The application of wireless sensor IoT networks has
increased rapidly over the past decade. It is widely used in
environmental monitoring, geographical sensing, home
automation, traffic control, and other industrial applica-
tions. The sensors are deployed even in remote locations to
monitor and observe the changes. The sensors collect the
information and transmit it to the base station for further
processing. However, due to the limited energy capacity,
memory, bandwidth, and processing structure, they are
vulnerable to attacks. Depending on the attacking nature,
the attacks are mainly categorized into active and passive
attacks. In a passive attack, the intruder listens to the
communication channel as an unauthorized attacker and
monitors the data transmission. Whereas in active attacks,
the intruder monitors the channel and tries to modify the
channel data transmission. Some of the most significant
active and passive attacks are discussed here in order to
provide an ideology about the attacking nature. The major
passive attacks are monitoring and eavesdropping, homing
attacks, traffic analysis, and camouflaging adversaries.
Communicated by V Suma.
&M. Ezhilarasi
ezhilarasi.nagarajan@srec.ac.in
L. Gnanaprasanambikai
gnanaprasanambikai.lakshmanan@kahedu.edu.in
A. Kousalya
kousalyaa@skcet.ac.in
M. Shanmugapriya
shanmugapriya_sf175@anjaconline.org
1
Department of EEE, Sri Ramakrishna Engineering College,
Coimbatore, India
2
Department of Computer Science, Karpagam Academy of
Higher Education, Eachanari, India
3
Department of IT, Sri Krishna College of Engineering and
Technology, Kuniyamuthur, India
4
Department of Computer Science, Ayya Nadar Janaki
Ammal College, Sivakasi, India
123
Soft Computing (2023) 27:4157–4168
https://doi.org/10.1007/s00500-022-06915-1(0123456789().,-volV)(0123456789().,-volV)
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... The proposed model outperformed other models in multiple aspects, mainly because the application of GA in the feature selection stage significantly improved the performance of the model. GA effectively searched the feature space and identifies the key feature subsets that have the greatest impact on model performance by simulating the process of natural selection [38]. This optimization reduced unnecessary feature dimensions, lowered the complexity of the model, and improved the expressive power of features. ...
Article
Full-text available
The current industrial control system network is susceptible to data theft attacks such as SQL injection in practical applications, resulting in data loss or leakage of enterprise secrets. To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. GA is used to optimize the feature selection process to identify the key feature subsets that have the greatest impact on model performance. One-dimensional multi-scale convolutional neural network captures multi-scale features in network traffic data through multi-scale convolutional kernels, compensating for key features that traditional convolutional neural networks may overlook. The introduction of gated recurrent unit addresses the dependency of time series data and effectively solves the problem of gradient vanishing or exploding in traditional recurrent neural networks when processing long sequence data. The results showed that the proposed model only took about 8 seconds to complete training and testing, while all other models required about 10 seconds. The running time of the proposed method was less than that of other methods. In addition, the detection rate, packet loss rate, and false alarm rate of the proposed method for industrial control systems were 96.97%, 1.256%, and 0.0947% respectively, and the defense success rate of intrusion was higher than 90%. The results above show that the proposed method has very superior intrusion detection performance and good generalization ability and can meet the needs of industrial control systems for network intrusion detection.
... Such approaches can dissect voluminous data about network traffic in search of very minute patterns indicative of wormhole attacks, which traditional rule-based systems would otherwise miss. In particular, machine learning models trained with supervised learning can be fed datasets containing normal and attack traffic to learn the features of wormhole attacks [13]. However, there exist challenges in implementing machine learning-based IDS in IoT networks. ...
... semantic-based [113][114][115], fuzzy logic [26,27,41,45,48,[116][117][118][119][120][121][122][123][124][125], game theory [126][127][128], bio-inspired [129,130] and Data Mining [42,131,132]. A graphical representation of the classification of AI techniques is shown in Figure 2.3. ...
Thesis
Full-text available
Internet of Things (IoT) devices face unique security challenges due to their inherent limitations such as limited storage, low computational power, and energy-efficient wireless communication. Traditional security measures, designed for the legacy Internet, fail to adequately protect IoT devices and networks. Particularly vulnerable are Wireless Sensor Networks (WSN) and IoT networks that are susceptible to jamming—a type of attack that significantly threatens wireless networks due to their open nature and the simplicity of launching such attacks. Perpetrators can initiate jamming without specialized hardware or in-depth knowledge of the targeted system. Despite advances in wireless technologies, the ability to thwart jamming attacks in real-world scenarios remains limited, as evidenced by the vulnerability of current security protocols of cellular and Wi-Fi networks. This thesis addresses the critical need for practical anti-jamming strategies to enhance the security of wireless networks, particularly against intelligent jammers that employ advanced machine-learning algorithms to adapt to more sophisticated attack methods such as constant, deceptive, random, or reactive jamming. These intelligent attackers can adjust their strategies and even manipulate detection systems to evade identification. To counter these threats, this dissertation introduces a novel lightweight security framework that utilizes fuzzy logic algorithms to enhance the detection, localization, and recovery mechanisms against jamming attacks in IoT networks. The framework employs network layer metrics to detect jamming at the node level, utilizes a modified multilateration technique to accurately locate jammers, and implements recovery strategies by blacklisting the affected nodes and rerouting traffic within the RPL network. This thesis makes several noteworthy contributions representing a significant IoT security advancement. By applying fuzzy logic to combine crucial metrics from the data link and network layers, the proposed framework not only detects jamming incidents, but also precisely pinpoints their origin, which is essential for effective mitigation. This thesis performs accurate real-time detection and localization using data link and network-layer metrics collected and processed at the edge. Furthermore, the framework's capability to blacklist and recover from compromised network paths introduces a dynamic recovery mechanism that enhances network resilience. Additionally, this thesis introduces a novel jammer called the complex jammer, in which the proposed framework has been accurately identified. Moreover, the framework effectively demonstrates the suitability of fuzzy logic for accurately recognizing multiple jamming attacks in diverse situations, with high accuracy, low memory usage, and quick execution. The effectiveness of this framework was validated through extensive simulations, demonstrating its capability to handle multiple jammers and adapt to evolving jamming strategies, thus significantly improving the resilience of IoT networks against these pervasive threats.
... As a result, the load balance will increase in their research. This article [32] presented that feedforward, and fuzzy neural networks are used to create a unique IDS that can identify routing attacks in WSNs. Research results show that, in contrast to other methods such as support vector machine (SVM), decision tree (DT), and random forest (RF) designs, the suggested model achieves an average detection rate and the highest detection accuracy. ...
Article
Full-text available
The Routing Protocol for Low-Power and Lossy Networks (RPL) routing protocol is utilized in the Internet of Everything (IoE) is highly vulnerable to various collaborative routing attacks. This attack can highly degrade network performance through increased delay, energy consumption, and unreliable data exchange. This critical vulnerability necessitates a robust intrusion detection system. This study aims to enhance a Collaborative Intrusion Detection System (CIDS) for detecting and mitigating joint attacks in the RPL protocol, focusing on improving detection accuracy while minimizing network delay and energy usage. A series of algorithms and techniques are implemented, including Queue and Workload-Aware RPL (QWL-RPL) for congestion reduction, weighted random forward RPL with a genetic algorithm for load balancing, fuzzy logic for trust evaluation, and Light Gradient Boosting Machine (GBM) for attack detection. Additionally, Q-learning with a trickle-time algorithm is used to classify and manage joint attacks effectively. Numerical analysis indicates that the proposed approach performs better than existing methods in multiple metrics, including accuracy, energy consumption, throughput, control message overhead, precision, and computing time. By integrating these diverse techniques, the proposed CIDS offers a scalable and efficient solution to improve the security and performance of RPL-based networks in IoE environments, outperforming current approaches in detection accuracy and resource optimization.
... The training and testing results of the ANN demonstrate that this method can detect wormholes without the need for extra hardware and with a high detection accuracy of up to 97%. Fuzzy logic combined with a feed-forward neural network is a unique intrusion detection system that was presented by Ezhilarasi et al.'s research [52]. The neural network is trained using fuzzy rules, and simulation was performed to assess the neural network's performance. ...
Article
Full-text available
A Mobile ad-hoc networks (MANET) is a wirelessly linked network of one or more devices that can configure itself. In a MANET, nodes can exchange data with one another directly or indirectly (via intermediary nodes). Because of the lack of central administration, open media, and several other reasons that make this type of network more vulnerable to security assaults, some researchers are utilizing artificial intelligence approaches in MANET routing to offer security. Several network layer attacks, including the black hole, and wormhole assaults, are covered in this essay. The detection of collaborative network assaults is examined, and frequent multiple network attacks are noted. A few of these assaults' symptoms will be emphasized. A network might exhibit a number of signs and observations that indicate the existence of an attack. The review calls for continued research to refine and deploy AI-based security mechanisms in real-world scenarios, addressing scalability concerns and advancing the vision of self-defending MANETs and wireless sensor networks (WSNs). The review serves as a resource for researchers, practitioners, and policymakers interested in fortifying the security of dynamic wireless networks.
... Babouei 53 presented the adaptive neuro-fuzzy inference system (ANFIS) to identify patterns using control charts. By utilizing fuzzy and feed-forward neural networks, Ezhilarasi et al. 54 presented a unique intrusion detection method to identify routing attacks in wireless sensor networks. ...
Article
Full-text available
Quality testing and monitoring advancements have allowed modern production processes to achieve extremely low failure rates, especially in the era of Industry 4.0. Such processes are known as high‐yield processes, and their data set consists of an excess number of zeros. Count models such as Poisson, Negative Binomial (NB), and Conway‐Maxwell‐Poisson (COM‐Poisson) are usually considered good candidates to model such data, but the excess zeros are larger than the number of zeros, which these models fit inherently. Hence, the zero‐inflated version of these count models provides better fitness of high‐quality data. Usually, linearly/non‐linearly related variables are also associated with failure rate data; hence, regression models based on zero‐inflated count models are used for model fitting. This study is designed to propose deep learning (DL) based control charts when the failure rate variables follow the zero‐inflated COM‐Poisson (ZICOM‐Poisson) distribution because DL models can detect complicated non‐linear patterns and relationships in data. Further, the proposed methods are compared with existing control charts based on neural networks, principal component analysis designed based on Poisson, NB, and zero‐inflated Poisson (ZIP) and non‐linear principal component analysis designed based on Poisson, NB, and ZIP. Using run length properties, the simulation study evaluates monitoring approaches, and a flight delay application illustrates the implementation of the research. The findings revealed that the proposed methods have outperformed all existing control charts.
... CatBoost offers a unique method of processing categorical data that involves little translation of categorical features. Changing from a non-numerical state to a numerical value can be a time-consuming and difficult task in feature engineering [15]. CatBoost inhibits this process, which also handles missing data and categorical data very well without encoding. ...
Conference Paper
Full-text available
Identification of wormhole attacks is essential in WSNs as such networks can easily fall prey to various security threats. Wormhole attacks are particularly threatening due to the fact that it opens other unauthorized channels between distant nodes, which in turn brings about the insecurity and instability of the network function. The prevention of such schemes is important in order to provide integrity and accessibility of WSNs which are widely used in the current society for purposes of assessing environments, surveillance security, and automation industries. In this paper, we consider a new and efficient approach using Random Forest (RF) algorithm in order to detect wormhole attacks in WSNs. The RF method is chosen due to its superior performance in terms of complexity of the classification process in the present study. Random forest is an instance of ensemble learning where many decision trees improve the classification accuracy of the network, and also deal with the inherent noise in the WSN data. All the decision trees imposed in the forest help come up with the final decision, and thus making the performance of the model more powerful by voting. This combines the merits of decision tree classifiers but does not inherit all the demerits like overfitting and vulnerability to noise of these classifiers. The RF model of the proposed system is trained with normal and attack traffic samples which allow the model to learn such characteristics as big differences in the traffic pattern and other wormhole attack features. The effectiveness of the model is, therefore, determined by measures such as accuracy, precision, recall, and F1-Score as well as False Positive Rate. The results clearly show that the RF-based method is exceptional in terms of accurately identifying wormhole attacks. It indicates that the efficacy of participants for recall is as accurate for precision, and general false positive rate shows that a low number of patients are misidentified from the negative class.
Article
Full-text available
Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There are many common attacks in WSN, which can quickly harm a WSN system. In this manuscript, Dual Interactive Wasserstein Generative Adversarial Network (DIWGAN) with war strategy optimization (WSO) algorithm is introduced for detecting intrusion in WSN. Initially, the input data is attained from the NSL-KDD and CICIDS2017 datasets. The data is then passed onto Morphological filtering and Extended Empirical wavelet transformation (MFEEWT) based pre-processing. After that, the filtered data is sent to the DIWGAN, which detects the intrusion and classifies the fraud data in the network. Additionally, the WSO algorithm is introduced to enhance the classification parameters of DIWGAN. By then the performance of the proposed DIWGAN-WSO-IDS methodology is evaluated using Python Platform. Also, the performance of the proposed methodology is calculated using various metrics like accuracy, precision, recall, f-measure, mean square error, and attack detection rate. Thus, the proposed technique has attained 29.87%, 31.7%, and 26.8% higher accuracy, 23.54%, 20.09%, and 26.98% higher recall, 12.76%, 10.96%, and 6.7% higher precision. And 6.85%, 4.56%, and 8.56% lower MSE than the existing techniques like BFSGSRF, MHICA-SSA, and CNN-LSTM methods.
Article
Nowadays, unmanned aerial vehicles (UAVs) organized in a flying ad hoc network (FANET) can successfully carry out complex missions. Due to the limitations of these networks, including the lack of infrastructure, wireless communication channels, dynamic topology, and unreliable communication between UAVs, cyberattacks, especially wormholes, weaken the performance of routing schemes. Therefore, maintaining communication security and guaranteeing the quality of service (QoS) are very challenging. In this paper, a novel Q-learning-based secure routing scheme (QSR) is presented for FANETs. QSR seeks to provide a robust defensive system against wormhole attacks, especially wormhole through encapsulation and wormhole through packet relay. QSR includes a secure neighbor discovery process and a Q-learning-based secure routing process. Firstly, each UAV gets information about its neighboring UAVs securely. To secure communication in this process, a local monitoring system is designed to counteract the wormhole attack through packet relay. This system checks data packets exchanged between neighboring UAVs and defines three rules according to the behavior of wormholes. In the second process, UAVs perform a distributed Q-learning-based routing process to counteract the wormhole attack through encapsulation. To reward the safest paths, a reward function is introduced based on five factors, the average one-hop delay, hop count, data loss ratio, packet transmission frequency (PTF), and packet reception frequency (PRF). Finally, the NS2 simulator is applied for implementing QSR and executing different scenarios. The evaluation results show that QSR works better than TOPCM, MNRiRIP, and MNDA in terms of accuracy, malicious node detection rate, data delivery ratio, and data loss ratio. However, it has more delay than TOPCM.
Article
Full-text available
Many studies have shown that clustered Wireless Sensor Networks (WSNs) have a better performance in terms of the balance of energy and lifetime. However, due to the harsh environment and open communication, the clustered WSNs are easy to be attacked. The selective forwarding attack is one of the most difficult attacks to be detected. When a malicious sensor node launches the selective forwarding attacks, it drops part of or all the data packets it received. In this paper, we propose a Noise-Based Density Peaks Clustering (NB-DPC) algorithm for detecting selective forwarding attacks. It can detect selective forwarding attacks by clustering the Cumulative Forwarding Rates (CFRs) of all sensor nodes. The NB-DPC algorithm has been improved by defining noise points specifically for identifying malicious behavior and deleting the unnecessary steps in Density Peaks Clustering (DPC) for faster detection speed. The NB-DPC has a low Missed Detection Rate (MDR) and False Detection Rate (FDR) of below 1% according to the simulation results.
Article
Full-text available
Scale-free networks are vulnerable to the selective forwarding attacks where the legitimated data packet is discarded by malicious nodes. And it is easy for non-balanced energy consumption to happen and prematurely make the network disconnection. This paper proposes the multiple attribute decision making model, which has the balanced characteristic of various factors. In the model, the node’s energy transmission efficiency, load and packet loss rate are defined as node attributes, and the weight value of each attribute is calculated by relative entropy. Furthermore, according to the decision values of the forward neighbors, the optimal routing node is determined. The simulation experiment results show that the routing algorithm based on decision model can effectively avoid the nodes suffered from selective forward attacks, improve the energy utilization and prolong the lifetime.
Article
Full-text available
In a wireless sensor network, the sensors periodically transmit sensed data from a specific environment to a centralized station by wireless communication. Deployment in an open environment leads to the potential of security attacks. A sinkhole attack is a destructive attack aimed at the network layer, where the sinkhole node attracts other nodes by advertising itself as the best path to the base station. Subsequently receiving other sensor node packets and compromising network security. Hence, this work proposes a lightweight, secure method based on the Threshold Sensitive Energy Efficient Sensor Network protocol and watermarking techniques to ensure data integrity during transmission. The homomorphic encryption used in this scheme is to provide fast and efficient and consumes less energy while identifying sensor nodes for the purpose of sinkhole detection and prevention. The proposed work has been evaluated using OMNET++ simulation environment to measure the proposed work performance in the following metrics: delay, packet delivery ratio, throughput, and average energy consumption. Compared with previous works, the proposed work shows better results in these metrics. In addition, the proposed scheme consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques. The results show that the proposed scheme enhances security by detecting the sinkhole attacker node before the attack is even activated. In addition, the proposed method ensures the integrity and authenticity of the sensed data while transmitting them from the sensor node until receiving it in the base station, and it can detect any tampering of the data.
Article
Full-text available
A mobile ad hoc network (MANET) is a dynamic wireless network without any infrastructures. It is vulnerable to many types of attacks. Thus, security has turned out to be an important factor to facilitate secured communication between mobile nodes in a wireless environment. Recently, many routing protocols have been established. But most of them do not consider the security criteria in their designing. So, practically any node can maliciously disrupt communication of other nodes. Hence, a new approach is proposed in this paper to provide reliable and secure data transmission in MANETs under possible blackhole attacks based on modified ad-hoc on-demand multipath distance vector (AOMDV) protocol. We divide the message into multiple paths to the destination and use homomorphic encryption scheme for cryptography technique. The performance of the proposed scheme is stable with very high packet delivery ratio while that of AOMDV is found to be vulnerable with the intrusion of malicious nodes in the network. Simulation results show that, compared to the original AOMDV scheme, our proposed scheme improves considerably the packet delivery ratio and network throughput in the presence of malicious nodes.
Article
Full-text available
The soft computing methods play a vital role in identifying the malicious activities in the social network. The low cost solutions and the robustness provided by the soft computing in the identifying the unwanted activities make it a predominant area of research. The paper combines the soft computing techniques and frames an enhanced soft computing approach to detect the intrusion that cause security issues in the social network. The proffered method of the paper employs the enhanced soft computing technique that combines the fuzzy logic, decision tree, K means -EM and the machine learning in preprocessing, feature reduction, clustering and classification respectively to develop a security approach that is more effective than the traditional computations in identifying the misuse in the social networks. The intrusion detection system developed using the soft computing approach is tested using the KDD-NSL and the DARPA dataset to note down the security percentage, time utilization, cost and compared with the other traditional methods.
Article
IoT objects that have a resource constrained nature resulting in a number of attacks in the routing protocol for lossy networks and low-power networks. RPL is very vulnerable to selfish behaviours and internal attacks though they are built with encryption protection to secure messages. To address this vulnerability, in this paper, we propose a novel trustworthiness methodology based on metric for incorporating trust evaluation, enhancing the robustness of security mechanism. Simulation results indicate that the proposed work is efficient in terms of throughput, nodes’ rank changes, energy consumption and packet delivery ratio. Moreover, using mathematical modelling, it has been observed that this methodology meets the demands of loop-freeness, optimality and consistency. This shows that this metic has both monotonicity and isotonicity requirements to enable the routing protocol. Incorporating the concepts of game theory, we can use this technique as a strategy to iterate Prisoner’s Dilemma. Both evolutionary simulation and mathematical analysis indicate that the proposed metric-based routing protocol is an efficient technique in promoting evolution and stability of the IoT network.
Article
In this digital era, a huge amount of money had been laundered via digital frauds, which mainly occur in the timeframe of electronic payment transaction made by first-time credit/debit card users. Currently, Finance organizations are facing several fraud attempts and it likely happens due to the current infrastructure, which only has an older database.. The current infrastructure diminishes the working environment of any finance organization sector with frequent fraud attempts. In this perspective, the roposed research article provides an overview for the development of an automated prevention system for any finance organization to protect it from any fraudulent attacks. The proposed automated case management system is used to monitor the expenses of the behavior study of users by avoiding the undesirable contact. The proposed research work develops a new management procedure to prevent the occurrence of electronic fraud in any finance organization. The existing procedure can predict digital fraud with an old updated database. This creates disaster and destructive analysis of the finance segment in their procedure. The cyber fraud phenomenon prediction is used to predict the fraud attempt with content-based analysis. The lack of resources is one of the enormous challenges in the digital fraud identification domain. The proposed scheme addresses to integrate all safety techniques to safeguard the stakeholders and finance institutions from cyber-attacks.
Article
Machine Learning is capable of providing real-time solutions that maximize the utilization of resources in the network thereby increasing the lifetime of the network. It is able to process automatically without being externally programmed thus making the process more easy, efficient, cost-effective, and reliable. ML algorithms can handle complex data more quickly and accurately. Machine Learning is used to enhance the ability of the Wireless Sensor Network environment. Wireless Sensor Networks (WSN) is a combination of several networks and it is decentralized and distributed in nature. WSN consists of sensor nodes and sinks nodes which have a property of self-organizing and self-healing. WSN is used in other applications, such as biodiversity and ecosystem protection, surveillance, climate change tracking, and other military applications.Now-a-days, a huge development is seen in WSNs due to the advancement of electronics and wireless communication technologies, several drawbacks like low computational capacity, small memory, and limited energy resources infrastructure needs physical vulnerability to require source measures where privacy plays a key role.WSN is used to monitor the dynamic environments and to adapt to such situation sensor networks need Machine Learning techniques to avoid unnecessary redesign. Machine learning techniques survey for WSNs provide a wide range of applications in which security is given top priority. To secure data from attackers the WSNs system should be able to delete the instruction if any hackers/attackers are trying to steal data.
Article
Link Layer Discovery Protocol (LLDP), which is widely used by the controller in Software-Defined Networking to discover the network topology, has been demonstrated to be unable to guarantee the integrity of its messages. Attackers could exploit this vulnerability to fabricate LLDP packets to declare a false link connecting two distant switches to the controller. By doing so, the controller would be misled to route flows to the false links, which leads to further DoS, eavesdropping and even hijacking attacks. This attack seems very similar to the well-known Worm-Hole Attack in wireless sensor networking (WSN). Nevertheless, in WSN, attackers are assumed to leverage an out-of-band wired channel to achieve the true packet transmission between the two cheating sensor nodes. Unfortunately, in SDN, there usually does not exist any out-of-band channels between the distant cheating switches. Flows misguided to the fake link will cause 100% packet loss, and thus be detected soon. In this paper, we address this problem and propose the first True worm-hole attack in SDN, which could achieve packet transmission over the forged link without using any out-of-band channels. Instead, it introduces a relay host in the networks to build a completely in-band covert channel between the two cheating switches. Unlike the existing studies, a relay host is not required to be directly linked to them. Moreover, attackers are only assumed to poss the remote read and write privileges of the flow tables of the both cheating switches and do not have to alter any of their software or hardware. Our extensive experiments demonstrate the high feasibility of this attack. Both the increases of transmission delays and packet loss rates are within a reasonable range. We finally present and evaluate the countermeasures against the proposed attack.
Article
This paper describes the utilization of an epidemic approach to study the propagation of jamming attacks, which can affect to different communication layers of all nodes in a variety of Internet of Things (IoT) wireless networks, regardless of the complexity and computing power of the devices. The jamming term considers both the more classical approach of interfering signals focusing on the physical level of the systems, and the cybersecurity approach that includes the attacks generated in upper layers like Medium Access Control (MAC), producing the same effect on the communication channel. In order to study the accuracy of the proposed epidemic model to estimate the propagation of jamming attacks, this paper uses the results of public simulations and experiments. It is of special interest the data obtained from experiments based on protocols such as Multi-Parent Hierarchical Protocol (MPH), Ad-hoc On-demand Distance Vector (AODV), and Dynamic Source Routing (DSR), working over the IEEE 802.15.4 standard. Then, using the formulation of the deterministic epidemiological model Susceptible–Infected–Recovered (SIR), together the abovementioned simulation, it has been seen that the proposed epidemic model could be used to estimate in that kind of IoT networks, the impact of the jamming attack in terms of attack severity and attack persistence.