Skip to main content

Advertisement

Log in

Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The development of the wireless sensor networks (WSNs) in the recent years is mainly due to the readily obtainable low-cost and short-range sensors. The objective of the WSN system is to both sense and transmit the real-time sense contents belonging to a particular monitoring environment for the back-end system for performing the necessary processing and analysis tasks. One of the most significant tasks of prime consideration is to ensure the safety and privacy aspects of the WSN in a wireless channel. The ultimate idea of the wireless sensor network is to preserve the limited node energy and thereby process the huge volume of data without affecting the robustness. The main objective of this work is to strengthen the robustness of the wireless sensor network that particularly relies on a scale-free type of network. The ability of the Scale-free WSNs in tolerating the random attacks efficiently have made them appear significant; on the other hand, they may be vulnerable to certain malicious attacks, that specifically targets the significant nodes in the system. This limitation has been addressed in this work by means of introducing a new modelling strategy called sequential probability ratio test (SPRT) that assists in the generation of scale-free network topologies. SPRT, a unique robustness improvising algorithm for the scale free type of WSNs, has been designed in this work and also the proposed SPRT is compared with the existing EROSE technique. The wide range of experimental results thus ensure that the introduced SPRT modelling methodology can achieves robustness and enhances the security of WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Qiu, T., Zhao, A., Xia, F., Si, W., & Wu, D. O. (2017). ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Transactions on Networking, 25(5), 2944–2959.

    Article  Google Scholar 

  2. Bellardo, J., & Savage, S. (2003). 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security symposium (Vol. 12, pp. 2–2).

  3. Bernard Ab oba. IEEE 802.1X Pre-Authentication. Prese Ntation to 802.11 WGi, July 2002

  4. Bohge, M., & Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on wireless security (pp. 79–87).

  5. Capkun, S., Buttyán, L., & Hubaux, J. P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, 2(1), 52–64.

    Article  Google Scholar 

  6. Sivakumar, P., Amirthavalli, K., & Senthil, M. (2014). Power conservation and security enhancement in wireless sensor networks: A priority based approach. International Journal of Distributed Sensor Networks, 10(5), 319587.

    Article  Google Scholar 

  7. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks., 38, 393–422.

    Article  Google Scholar 

  8. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys & Tutorials, 8(2), 2–23.

    Article  Google Scholar 

  9. Liu, L., Qi, X., Xue, J., & Xie, M. (2014). A topology construct and control model with small-world and scale-free concepts for heterogeneous sensor networks. International Journal of Distributed Sensor Networks, 10(3), 374251.

    Article  Google Scholar 

  10. Du, W. B., Wu, Z. X., & Cai, K. Q. (2013). Effective usage of shortest paths promotes transportation efficiency on scale-free networks. Physica A: Statistical Mechanics and Its Applications, 392(17), 3505–3512.

    Article  MathSciNet  Google Scholar 

  11. Zheng, G., Liu, S., & Qi, X. (2012). Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. Computers & Electrical Engineering, 38(3), 643–651.

    Article  Google Scholar 

  12. Zheng, G., & Liu, Q. (2013). Scale-free topology evolution for wireless sensor networks. Computers & Electrical Engineering, 39(6), 1779–1788.

    Article  Google Scholar 

  13. Jian, Y., Wang, Y., Zhang, Z., & Lin, C. (2013). Scale-free model for wireless sensor networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 2329–2332). IEEE.

  14. Louzada, V. H., Daolio, F., Herrmann, H. J., & Tomassini, M. (2013). Smart rewiring for network robustness. Journal of Complex networks, 1(2), 150–159.

    Article  Google Scholar 

  15. Zhou, M., & Liu, J. (2014). A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A: Statistical Mechanics and its Applications, 410, 131–143.

    Article  Google Scholar 

  16. Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S., & Herrmann, H. J. (2011). Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences, 108(10), 3838–3841.

    Article  Google Scholar 

  17. Herrmann, H. J., Schneider, C. M., Moreira, A. A., Andrade, J. S., Jr., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(01), 1–9.

    Article  Google Scholar 

  18. Buesser, P., Daolio, F., & Tomassini, M. (2011). Optimizing the robustness of scale-free networks with simulated annealing. In International conference on adaptive and natural computing algorithms (pp. 167–176). Springer, Berlin.

  19. Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 5-pp). IEEE.

  20. Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on wireless security (pp. 43–52).

  21. Mishra, A., & Arbaugh, W. A. (2002). An initial security analysis of the IEEE 802.1 X standard. In CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002

  22. Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In IEEE INFOCOM 2008-The 27th conference on computer communications (pp. 1768–1776). IEEE.

  23. Patwari, N., & Kasera, S. K. (2007). Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking (pp. 111–122).

  24. Wool, A. (2005). Lightweight key management for IEEE 802.11 wireless lans with key refresh and host revocation. Wireless Networks, 11(6), 677–686.

    Article  Google Scholar 

  25. Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923.

    Article  Google Scholar 

  26. Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.

    Article  Google Scholar 

  27. Wei, J., Yang, G., & Mu, Y. (2015). Comments on accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(4), 3097–3099.

    Article  Google Scholar 

  28. Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.

    Article  Google Scholar 

  29. Wang, K., Yuan, L., Miyazaki, T., Zeng, D., Guo, S., & Sun, Y. (2017). Strategic antieavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology, 66(10), 9448–9457.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Keerthana.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Keerthana, G., Anandan, P. & Nandhagopal, N. Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network. Wireless Pers Commun 117, 3029–3050 (2021). https://doi.org/10.1007/s11277-020-07356-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07356-5

Keywords

Navigation