Skip to main content
Log in

Elliptic Curve Cryptography Based Authentication Protocol Enabled with Optimized Neural Network Based DoS Mitigation

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

A Correction to this article was published on 17 March 2022

This article has been updated

Abstract

In WSN based real-time applications, the authentication scheme is not yet defined properly under the consideration of user privacy. Even though lot of attempts have been made for introducing the lightweight anonymous authentication protocol in WSN based real-time applications, the risk due to denial-of-service (DoS) attacks is not yet rectified completely. The protocols are in need of compromising the un-link ability property to rebuild the synchronization among participants. To deal with the DoS detection and mitigation, in this paper, a new efficient and DoS-resistant user authentication scheme with the incorporation of ECC based authentication protocol is introduced. The implemented protocol involves four phases namely (i) User Registration phase (ii) Remedy phase (iii) Attack prediction phase, and (iv) Reloading phase. This proposed work mainly contemplates over the attack prediction phase, where the Neural Network (NN) model is deployed for the detection of DoS attack. As the main contribution, the training of NN is done by optimization concept in terms of selecting the optimal weight of NN. For the training purpose, a new improved algorithm named, Fitness Indexed Whale Optimization Algorithm (FI-WOA), which is the modification of the WOA algorithm. Finally, the performance of proposed work is compared over other state-of-the-art models and proves its superiority.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Change history

  • 19 March 2022

    The original version of this article was revised: In the original version of this article the affiliation details for authors Sobini X. Pushpa and S. Kanaga Suba Raja were incorrectly assigned. The original article has been corrected.

  • 17 March 2022

    A Correction to this paper has been published: https://doi.org/10.1007/s11277-022-09574-5

Abbreviations

WSN:

Wireless sensors network

DoS:

Denial-of-Service

NS2:

Network Simulator2

T-MAC:

Time out-medium access control

FIS:

Fuzzy inference system

ANFIS:

Adaptive neuro-fuzzy inference system

IDS:

Intrusion Detection System

GW:

Gateway

NN:

Neural network

ECC:

Elliptic Curve Cryptography

LM:

Levenberg Marquardt

GWO:

Grey Wolf Optimizer

LA:

Lion Algorithm

PSO:

Particle Swarm Optimization

WOA:

Whale Optimization Algorithm

FPR:

False Positive Rate

FNR:

False Negative Rate

FDR:

False Discovery Rate

NPV:

Net Predictive Value

MCC:

Mathews Correlation Coefficient

References

  1. Han, G., Jiang, J., Shen, W., Shu, L., & Rodrigues, J. (2013). IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. IET Information Security, 7(2), 97–105.

    Article  Google Scholar 

  2. Le, X. H., et al. (2009). An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Journal of Communications and Networks, 11(6), 599–606.

    Article  Google Scholar 

  3. Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.

    Article  Google Scholar 

  4. Pu, C., & Lim, S. (2018). A Light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal, 12(1), 834–842.

    Article  Google Scholar 

  5. Chen, J., Ma, Y., Wang, X., Huang, Y., & Lai, Y. (2011). Time-division secret key protocol for wireless sensor networking. IET Communications, 5 (12), 1720–1726.

    Article  Google Scholar 

  6. Azim, A., Mahiba, S., Sabbir, T. A. K., & Ahmad, S. (2014). Efficient Jammed area mapping in wireless sensor networks. IEEE Embedded Systems Letters, 6(4), 93–96.

    Article  Google Scholar 

  7. Ren, K., Lou, W., Zeng, K., & Moran, P. J. (2007). On broadcast authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 6(11), 4136–4144.

    Article  Google Scholar 

  8. Yildiz, H. U., Tavli, B., Kahjogh, B. O., & Dogdu, E. (2017). The impact of incapacitation of multiple critical sensor nodes on wireless sensor network lifetime. IEEE Wireless Communications Letters, 6(3), 306–309.

    Article  Google Scholar 

  9. Gill, K., Yang, S., & Wang, W. (2012). Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems. IET Wireless Sensor Systems, 2 (4), 361–368.

    Article  Google Scholar 

  10. Athmani, S., Azeddine Bilami, & Djallel Eddine Boubiche. (2019). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, 92, 789–799.

  11. China, W. (2016). NoSQL Injection: Data security on Web vulnerability. International Journal of Security and Its Applications, 10(9), 55–64.

    Article  Google Scholar 

  12. Abdalla, H. B., Lin, J., Li, G., & Gilani, S. M. M. (2016). NoSQL: Confidential on data security and data management by using a mobile application. International Journal of Information and Electronics Engineering, 6(2), 84.

    Article  Google Scholar 

  13. Di Mauro, M. & Di Sarno, C. (2014). A framework for Internet data real-time processing: A machine-learning approach. In 2014 International Carnahan Conference on Security Technology (ICCST) (pp. 1–6). IEEE.

  14. Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975–7004.

    Article  Google Scholar 

  15. Ali JameelAL-Mousawi & Haider.K. AL-Hassani. (2018). A survey in wireless sensor network for explosives detection. Computers & Electrical Engineering, 72, 682–701.

  16. Derui Ding, Qing-Long Han, Yang Xiang, Xiaohua Ge & Xian-Ming Zhang (2018). A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 275, 1674–1683.

  17. Govindasamy, J., & Punniakody, S. (2018). A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. Journal of Electrical Systems and Information Technology, 5(3), 735–744.

    Article  Google Scholar 

  18. Han, L., Zhou, M., Jia, W., Dalil, Z., & Xingbo, Xu. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information Sciences, 476, 491–504.

    Article  Google Scholar 

  19. Tiloca, M., De Guglielmo, D., Dini, G., Anastasi, G., & Das, S. K. (2017). JAMMY: A distributed and dynamic solution to selective jamming attack in TDMA WSNs. IEEE Transactions on Dependable and Secure Computing, 14 (4), 392–405.

  20. Magdi S. Mahmoud, Mutaz M. Hamdan & Uthman A. Barudi.(2019). Modeling and control of Cyber-Physical Systems subject to cyber attacks: A Survey of recent advances and challenges. Neurocomputing (in press).

  21. Matta V., Di Mauro M.,& Longo M., (2017), Botnet identification in multi-clustered DDoS attacks. In proceedings of Eusipco2017, Kos Island

  22. Khishe, M. & Mosavi, M.R. (2020). Chimp optimization algorithm. Expert Systems With Applications, vol 149, p.113338.

  23. Inumula Veeraraghava Rao., &. Malleswara Rao V. (2019). An enhanced whale optimization algorithm for massive MIMO system. Journal of Networking and Communication Systems, 2(4), 12–22.

  24. Meghna Sangtani. (2020). Hybrid Grey Wolf optimization and crow search algorithm for power allocation in MIMO-NOMA systems. Journal of Networking and Communication Systems, 3.

  25. Sesham Anand. (2020). Intrusion detection system for wireless mesh networks via improved whale optimization. Journal of Networking and Communication Systems, 3 (4).

  26. Abdalla, H. B., Ahmed, A. M., & Al Sibahee, M. A. (2020). Optimization driven MapReduce framework for indexing and retrieval of big data. KSII Transactions on Internet and Information Systems (TIIS), 14(5), 1886–1908.

    Google Scholar 

  27. Qiao, W., Khishe, M. & Ravakhah, S. (2021). Underwater targets classification using local wavelet acoustic pattern and multi-layer Perceptron neural network optimized by modified Whale Optimization Algorithm. Ocean Engineering, 219, 108415.

  28. Mosavi, M. R., Khishe, M., Hatam Khani, Y., & Shabani, M. (2017). Training radial basis function neural network using stochastic fractal search algorithm to classify sonar dataset. Iranian Journal of Electrical and Electronic Engineering, 13(1), 100–111.

    Google Scholar 

  29. Mosavi, M. R., Khishe, M., & Akbarisani, M. (2017). Neural network trained by biogeography-based optimizer with chaos for sonar data set classification. Wireless Personal Communications, 95(4), 4623–4642.

    Article  Google Scholar 

  30. Khishe, M. & Mosavi, M.R. (2020). Classification of underwater acoustical dataset using neural network trained by Chimp Optimization Algorithm. Applied Acoustics, 157, 107005.

  31. Wang, Y., Yuan, L., Khishe, M., Moridi, A. & Mohammadzade, F. (2020). Training RBF NN using Sine-Cosine algorithm for sonar target classification. Archives of Acoustics, pp. 753–764.

  32. Gope, P., Lee, J., & Quek, T. Q. S. (2017). Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sensors Journal, 17, (2), 498–503.

  33. Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS attack detection architecture for reliable data transmission over wireless sensor network. Wireless Personal Communications, 90(2), 847–859.

    Article  Google Scholar 

  34. Nirmal Raja,K., & Marsaline Beno, M. (2014). On securing wireless sensor Network-Novel authentication scheme against DOS attacks. Journal of Medical Systems.

  35. Fan, R., HeEm, D.-J., Pan, X.-Z., & Ping, L.-d. (2011). An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University SCIENCE C, 12(7), 550–560.

    Article  Google Scholar 

  36. Son, Y.-h, Hong, J.-K., & Bae, K.-S. (2013). Authentication masking code against DoS of T-MAC protocol. Journal of Central South University, 20(7), 1889–1895.

    Article  Google Scholar 

  37. Vijayakumar, K. P., Pradeep Mohan Kumar, K., Kottilingam, K., Karthick, T., Vijayakumar,P., & Ganeshkumar, P. (2018). An adaptive neuro-fuzzy logic based jamming detection system in WSN. Soft Computing, 1–13.

  38. He, D., Chen, C., Chan, S., & Bu, J. (2012). DiCode: DoS-Resistant and distributed code dissemination in wireless sensor networks. IEEE Transactions on Wireless Communications, 11(5), 1946–1956.

    Article  Google Scholar 

  39. Yogeswaran Mohan, Sia Seng Chee, Donica Kan Pei Xin & Lee Poh Foong. (2016). Artificial Neural Network for Classification of Depressive and Normal in EEG, 2016. In IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES).

  40. Mirjalili, S., & Lewis, A. (2016). The whale optimization algorithm. Advances in Engineering Software, 95, 51–67.

    Article  Google Scholar 

  41. Sid-aliBlaifi, SamirMoulahoum, BilalTaghezouitb, & BdelhakimSaim. (2019). An enhanced dynamic modeling of PV module using Levenberg-Marquardt algorithm. Renewable Energy, 135, 745–760.

  42. Seyedali Mirjalili, Seyed Mohammad Mirjalili & Andrew Lewis. (2014). Grey Wolf Optimizer. Advances in Engineering Software, 69, 46–61.

  43. Boothalingam, R. (2018). Optimization using lion algorithm: A biological inspiration from lion’s social behavior. Evolutionary Intelligence, 11(1–2), 31–52.

    Article  Google Scholar 

  44. Pedersen, M. E. H., & Chipperfield, A. J. (2010). Simplifying particle swarm optimization. Applied Soft Computing, 10(2), 618–628.

    Article  Google Scholar 

  45. Christina, L., & Joe Irudayaraj, V. S. (2014). Optimized Blowfish encryption technique. International Journal of Innovative Research in Computer and Communication Engineering, 2(7), 5009–5015.

    Google Scholar 

  46. Gayatri, R. & Gayatri, Y. (2020). Detection of Trojan based DoS Attacks on RSA Cryptosystem using Hybrid Supervised Learning Models. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (pp. 1–5). IEEE.

Download references

Funding

None.

Author information

Authors and Affiliations

Authors

Contributions

SXP conceptualized and designed the study, reviewed identified articles to determine if they met defined study inclusion and exclusion criteria, critically reviewed the manuscript, and approved the final manuscript as submitted. SKR reviewed identified articles to determine if they met defined study inclusion and exclusion criteria, critically reviewed the manuscript, and approved the final manuscript as submitted. All authors approved the final manuscript as submitted and agree to be accountable for all aspects of the work.

Corresponding author

Correspondence to Sobini X. Pushpa.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The original version of this article was revised: In the original version of this article the affiliation details for authors Sobini X. Pushpa and S. Kanaga Suba Raja were incorrectly assigned. The original article has been corrected.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pushpa, S.X., Raja, S.K.S. Elliptic Curve Cryptography Based Authentication Protocol Enabled with Optimized Neural Network Based DoS Mitigation. Wireless Pers Commun 124, 1–25 (2022). https://doi.org/10.1007/s11277-021-08902-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08902-5

Keywords

Navigation