Abstract
The development of the wireless sensor networks (WSNs) in the recent years is mainly due to the readily obtainable low-cost and short-range sensors. The objective of the WSN system is to both sense and transmit the real-time sense contents belonging to a particular monitoring environment for the back-end system for performing the necessary processing and analysis tasks. One of the most significant tasks of prime consideration is to ensure the safety and privacy aspects of the WSN in a wireless channel. The ultimate idea of the wireless sensor network is to preserve the limited node energy and thereby process the huge volume of data without affecting the robustness. The main objective of this work is to strengthen the robustness of the wireless sensor network that particularly relies on a scale-free type of network. The ability of the Scale-free WSNs in tolerating the random attacks efficiently have made them appear significant; on the other hand, they may be vulnerable to certain malicious attacks, that specifically targets the significant nodes in the system. This limitation has been addressed in this work by means of introducing a new modelling strategy called sequential probability ratio test (SPRT) that assists in the generation of scale-free network topologies. SPRT, a unique robustness improvising algorithm for the scale free type of WSNs, has been designed in this work and also the proposed SPRT is compared with the existing EROSE technique. The wide range of experimental results thus ensure that the introduced SPRT modelling methodology can achieves robustness and enhances the security of WSN.
















Similar content being viewed by others
References
Qiu, T., Zhao, A., Xia, F., Si, W., & Wu, D. O. (2017). ROSE: Robustness strategy for scale-free wireless sensor networks. IEEE/ACM Transactions on Networking, 25(5), 2944–2959.
Bellardo, J., & Savage, S. (2003). 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX security symposium (Vol. 12, pp. 2–2).
Bernard Ab oba. IEEE 802.1X Pre-Authentication. Prese Ntation to 802.11 WGi, July 2002
Bohge, M., & Trappe, W. (2003). An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2nd ACM workshop on wireless security (pp. 79–87).
Capkun, S., Buttyán, L., & Hubaux, J. P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on mobile computing, 2(1), 52–64.
Sivakumar, P., Amirthavalli, K., & Senthil, M. (2014). Power conservation and security enhancement in wireless sensor networks: A priority based approach. International Journal of Distributed Sensor Networks, 10(5), 319587.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks., 38, 393–422.
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE Communication Surveys & Tutorials, 8(2), 2–23.
Liu, L., Qi, X., Xue, J., & Xie, M. (2014). A topology construct and control model with small-world and scale-free concepts for heterogeneous sensor networks. International Journal of Distributed Sensor Networks, 10(3), 374251.
Du, W. B., Wu, Z. X., & Cai, K. Q. (2013). Effective usage of shortest paths promotes transportation efficiency on scale-free networks. Physica A: Statistical Mechanics and Its Applications, 392(17), 3505–3512.
Zheng, G., Liu, S., & Qi, X. (2012). Scale-free topology evolution for wireless sensor networks with reconstruction mechanism. Computers & Electrical Engineering, 38(3), 643–651.
Zheng, G., & Liu, Q. (2013). Scale-free topology evolution for wireless sensor networks. Computers & Electrical Engineering, 39(6), 1779–1788.
Jian, Y., Wang, Y., Zhang, Z., & Lin, C. (2013). Scale-free model for wireless sensor networks. In 2013 IEEE wireless communications and networking conference (WCNC) (pp. 2329–2332). IEEE.
Louzada, V. H., Daolio, F., Herrmann, H. J., & Tomassini, M. (2013). Smart rewiring for network robustness. Journal of Complex networks, 1(2), 150–159.
Zhou, M., & Liu, J. (2014). A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Physica A: Statistical Mechanics and its Applications, 410, 131–143.
Schneider, C. M., Moreira, A. A., Andrade, J. S., Havlin, S., & Herrmann, H. J. (2011). Mitigation of malicious attacks on networks. Proceedings of the National Academy of Sciences, 108(10), 3838–3841.
Herrmann, H. J., Schneider, C. M., Moreira, A. A., Andrade, J. S., Jr., & Havlin, S. (2011). Onion-like network topology enhances robustness against malicious attacks. Journal of Statistical Mechanics: Theory and Experiment, 2011(01), 1–9.
Buesser, P., Daolio, F., & Tomassini, M. (2011). Optimizing the robustness of scale-free networks with simulated annealing. In International conference on adaptive and natural computing algorithms (pp. 167–176). Springer, Berlin.
Demirbas, M., & Song, Y. (2006). An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International symposium on a world of wireless, mobile and multimedia networks (WoWMoM'06) (pp. 5-pp). IEEE.
Faria, D. B., & Cheriton, D. R. (2006). Detecting identity-based attacks in wireless networks using signalprints. In Proceedings of the 5th ACM workshop on wireless security (pp. 43–52).
Mishra, A., & Arbaugh, W. A. (2002). An initial security analysis of the IEEE 802.1 X standard. In CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002
Sheng, Y., Tan, K., Chen, G., Kotz, D., & Campbell, A. (2008). Detecting 802.11 MAC layer spoofing using received signal strength. In IEEE INFOCOM 2008-The 27th conference on computer communications (pp. 1768–1776). IEEE.
Patwari, N., & Kasera, S. K. (2007). Robust location distinction using temporal link signatures. In Proceedings of the 13th annual ACM international conference on Mobile computing and networking (pp. 111–122).
Wool, A. (2005). Lightweight key management for IEEE 802.11 wireless lans with key refresh and host revocation. Wireless Networks, 11(6), 677–686.
Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923.
Wu, J., Ota, K., Dong, M., & Li, C. (2016). A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access, 4, 416–424.
Wei, J., Yang, G., & Mu, Y. (2015). Comments on accountable and privacy-enhanced access control in wireless sensor networks. IEEE Transactions on Wireless Communications, 15(4), 3097–3099.
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Wang, K., Yuan, L., Miyazaki, T., Zeng, D., Guo, S., & Sun, Y. (2017). Strategic antieavesdropping game for physical layer security in wireless cooperative networks. IEEE Transactions on Vehicular Technology, 66(10), 9448–9457.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Keerthana, G., Anandan, P. & Nandhagopal, N. Enhancing the Robustness and Security Against Various Attacks in a Scale: Free Network. Wireless Pers Commun 117, 3029–3050 (2021). https://doi.org/10.1007/s11277-020-07356-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07356-5