Abstract
Nowadays, Computer Networks and the internet is on the increase due to the precedence that provided by them. An enormous amount of information is accessed and allowed the users to share the information on an incredible scale while connecting the network to the Internet. Even though the internet nature crafts more benefits, still it is posed by the limitations because of the attacks. One of the special types of malicious software (attack) is ransomware also called malware that affects the systems and restricts the user’s access over the system. Further, it files till the payment of ransom. This malware is made by locking the user’s desktop and encrypting the user’s files. This has emerged as a critical threat in network security since each day the raising of ransomware gets abundant. Hence, the prediction of ransomware is considered as the major problem by the researchers and numerous researches are going on over this issue. This survey planned to review the network security models along with the authentication protocol. More importantly, the ransomware attack is also highly concentrated in this survey. Further, the literature analyses on diverse techniques under network security are made. Then the analysis also focused on the algorithms used and is categorized as protocols, authentication algorithms, optimization algorithms, and other techniques. Moreover, this survey demonstrates a detailed review of the cryptographic techniques, attacks, simulation tools and clouds that are exploited in the reviewed papers. Additionally, the chronological review and the performance are reviewed under the network security models. Finally, this paper exploits the research and described the challenges on the network security that can be used further in the future
Similar content being viewed by others
Abbreviations
- WSN:
-
Wireless sensor network
- GRBC:
-
Group routing betweenenss centrality
- SDS:
-
Software defined security
- NSF:
-
Network security function
- WBAN:
-
Wireless body area network
- SDP:
-
Semi-definite programming
- CJ:
-
Cooperative jamming
- HKP-HD:
-
Hybrid key predistribution scheme
- MSN:
-
Medical smartphone network
- S-SELDRIP:
-
Secured-selective design relay inquiry protocol
- PVM:
-
Position verification method
- MVP:
-
Message verification and passing
- SBTN-TC:
-
Swarm based trusted node for tampering and cheating attack
- CPHS:
-
Cryptographic puzzle hiding scheme
- CSA:
-
Cuckoo search algorithm
- QKD:
-
Quantum key distribution
- QDC:
-
Quantum dense coding
- HWS:
-
Heavy weight security
- BFV:
-
Bloom filter vector
- PID:
-
Proportional, integral, derivative
- MKMP:
-
Multi-BS key management protocol
- MLE:
-
Maximum likelihood estimation
- SCADA:
-
Supervisory control and data acquisition systems
- mMTC:
-
Massive machine type communication
- GLOMONET:
-
Global mobility network
- PANA:
-
Protocol for carrying authentication for network access
- TCABRP:
-
Trust-based cooperation authentication bit-map routing protocol
- WANET:
-
Wireless ad-hoc network
- MA-DAA:
-
DAA scheme with Mutual Authentication
- 6LoWPANs:
-
IPv6 low-power personal area networks
- NCUAV:
-
Network-connected UAV
- SERP:
-
Secure energy-efficient routing protocol
- IDS:
-
Intrusion detection system
- ECDSA:
-
Elliptic curve digital signature algorithm
- MoM:
-
Message observation mechanism
- DoS:
-
Denial of service
- MAC:
-
Message authentication codes
- MA:
-
Matrix-based node capture attack algorithm
- RF4CE:
-
Radio frequency for consumer electronics
- MANET:
-
Mobile ad hoc network
- TDOA:
-
Time difference of arrival
- PII:
-
Personally identifiable information
- LoWaNA:
-
Low-overhead solution
- ECC:
-
Elliptical curve cryptography
- PKC:
-
Public key cryptography
- AES:
-
Advanced encryption standards
- DES:
-
Data encryption standards
References
Lee JK, Moon SY, Park JH (2017) CloudRPS: a cloud analysis based enhanced ransomware prevention system. J Supercomput 73(7):3065–3084
Azmoodeh A, Dehghantanha A, Conti M, Choo KKR (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intel Human Comput 9(4):1141–1152
Kharraz A, Robertson W, Kirda E (2018) Protecting against Ransomware: a new line of research or restating classic ideas? IEEE Secur Priv 16(3):103–107
Jung S, Won Y (2018) Ransomware detection method based on context-aware entropy analysis. Soft Comput 22:6731–6740
Cimitile A, Mercaldo F, Nardone V, Santone A, Visaggio CA (2017) Talos: no more ransomware victims with formal methods. Int J Inf Secur 41:1–20
Zhao JY, Kessler EG, Yu J, Jalal K, Cooper CA, Brewer JJ, Schwaitzberg SD, Guo WA (2018) Impact of trauma hospital ransomware attack on surgical residency training. J Surg Res 232:389–397
Homayoun S, Dehghantanha A, Ahmadzadeh M, Hashemi S, Khayami R (2017) Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. In: IEEE Transactions on Emerging Topics in Computing
Ayoub F, Singh K (1984) Cryptographic techniques and network security. Commun Radar Signal Process IEE Proc F 131(7):684–694
Peng L, Cao X Shi H, Sun C (2018) Optimal jamming attack schedule for remote state estimation with two sensors. J Frankl Inst, Available online 17 Jul 2018
Kluger BD, Slezak SL (2018) Signal jamming models of fraudulent misreporting and economic prospects: an experimental investigation. J Econ Behav Organ 151:254–283
Li B, Yao Y, Zhang H, Lv Y, Zhao W (2018) Energy efficiency of proactive eavesdropping for multiple links wireless system. IEEE Access 6:26081–26090
Ding F, Wang H, Zhou Y, Zheng C (2018) Impact of relay’s eavesdropping on untrusted amplify-and-forward networks over nakagami-$m$ fading. IEEE Wirel Commun Lett 7(1):102–105
Hahn A, Thomas RK, Lozano I, Cardenas A (2015) A multi-layered and kill-chain based security analysis framework for cyber-physical systems. Int J Crit Infrastruct Prot 11:39–50
Wang H, Chen Z, Zhao J, Di X, Liu D (2018) A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow. IEEE Access 6:8599–8609
Lallie HS, Debattista K, Bal J (2018) An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception. IEEE Trans Inf Forensics Secur 13(5):1110–1122
Nadkarni PJ, Raina A, Srinivasa SG (2017) Recovery of distributed quantum information using graph states from a node failure. In: 2017 IEEE Globecom Workshops (GC Wkshps), Singapore, pp 1–6
Chu CHK, Chu M (2004) An integrated framework for the assessment of network operations, reliability, and security. Bell Labs Tech J 8(4):133–152
Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn G (2018) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286–1300
Zhang L, Wang Q, Tian B (2013) Security threats and measures for the cyber-physical systems. J China Univ Posts Telecommun 20(1):25–29
Wang R, Zhu Y, Tan J, Zhou B (2017) Detection of malicious web pages based on hybrid analysis. J Inf Secur Appl 35:68–74
Bretas AS, Bretas NG, Carvalho BEB (2019) Further contributions to smart grids cyber-physical security as a malicious data attack: proof and properties of the parameter error spreading out to the measurements and a relaxed correction model. Int J Electr Power Energy Syst 104:43–51
Wang Z, Zhang B, Wang X, Jin X, Bai Y (2018) Improvements of multihop localization algorithm for wireless sensor networks. IEEE Syst J 13:365–376
Zhao Z, Wu B, Li B, Xiao J, Fu S, Liu D (2018) Multihop routing enabled packet switching with QoS guarantee in optical clos for data centers. IEEE/OSA J Opt Commun Netw 10(6):624–632
Conti M, Di Pietro R, Spognardi A (2014) Clone wars: distributed detection of clone attacks in mobile WSNs. J Comput Syst Sci 80(3):654–669
Hu Y, Li Y, Zing C, Liao J (2016) Providing customized security based on network function composition and reconfiguration. China Commun 13(Supplement 1):177–189
Thangam T, Kazem HA, Muthuvel K SFOA: sun flower optimization algorithm to solve optimal power flow
Rajakumar BR (2013) Static and adaptive mutation techniques for genetic algorithm: a systematic comparative analysis. Int J Comput Sci Eng 8(2):180–193. https://doi.org/10.1504/IJCSE.2013.053087
Jadhav AN, Gomathi N (2019) DIGWO: hybridization of dragonfly algorithm with Improvedc grey wolf optimization algorithm for data clustering. Multimed Res 2(3):1–11
Ravi RV, Subramaniam K, Roshini TV, Muthusamy SPB, Venkatesan GP (2019) Optimization algorithms, an effective tool for the design of digital filters; a review. J Ambient Intel Human Comput 12:310–319
Guan J, Wei Z, You I (2018) GRBC-based Network Security Functions placement scheme in SDS for 5G security. J Netw Comput Appl 114:48–56
Dodangeh P, Jahangir AH (2018) A biometric security scheme for wireless body area networks. J Inf Secur Appl 41:62–74
Li Y, Gao X, Xu Z, Zhou X (2018) Network-based queuing model for simulating passenger throughput at an airport security checkpoint. J Air Trans Manag 66:13–24
Sharma V, You I, Leu F-Y, Atiquzzaman M (2018) Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J Netw Comput Appl 102:38–57
Hyun S et al (2018) Interface to network security functions for cloud-based security services. IEEE Commun Mag 56(1):171–178
Shi F, Tan W, Xia J, Xie D, Fan L, Liu X (2018) Hybrid cache placement for physical-layer security in cooperative networks. IEEE Access 6:8098–8108
Tubail D, El-Absi M, Ikki SS, Mesbah W, Kaiser T (2018) Artificial noise-based physical-layer security in interference alignment multipair two-way relaying networks. IEEE Access 6:19073–19085
Kraus L, Wechsung I, Möller S (2017) Psychological needs as motivators for security and privacy actions on smartphones. J Inf Secur Appl 34(1):34–45
Tang W, Feng S, Ding Y, Liu Y (2017) Physical layer security in heterogeneous networks with jammer selection and full-duplex users. IEEE Trans Wirel Commun 16(12):7982–7995
Pourazarm S, Cassandras CG (2017) Energy-based lifetime maximization and security of wireless-sensor networks with general nonideal battery models. IEEE Trans Control Netw Syst 4(2):323–335
Kaynar K (2016) A taxonomy for attack graph generation and usage in network security. J Inf Secur Appl 29:27–56
Hu L, Wen H, Wu B, Tang J, Pan F (2016) Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access 4:5607–5623
Ahlawat P, Dave M (2018) An attack resistant key predistribution scheme for wireless sensor networks. J King Saud Univ Comput Inf Sci, Available online 3 Apr 2018
Meng W, Li W, Xiang Y, Choo KKR (2017) A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169
Wen H, Luo J, Zhou L (2011) Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel Sens Syst 1(3):137–143
Kumar SVNS, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360
Maheswari PU, Kumar PG (2017) Dynamic detection and prevention of clone attack in wireless sensor networks. Wirel Pers Commun 94(4):2043–2054
Cordero CV, Lisser A (2015) Jamming attacks reliable prevention in a clustered wireless sensor network. Wirel Pers Commun 85(3):925–936
Periyanayagi S, Sumathy V (2018) Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. Pers Ubiquit Comput 22:1165–1179
Mehetre DC, Roslin SE, Wagh SJ (2019) Detection and prevention of black hole and selective forwarding attack in clustered WSN with active trust. Cluster Comput 22:1313–1328
Pongwongtragull P, Mitatha S, Yupapin PP (2010) A simultaneous generation of QKD and QDC via optical memory array for distributed network security. Opt Int J Light Electron Opt 121(23):2137–2139
Sen A, Chatterjee T, Bit SD (2016) LoWaNA: low overhead watermark based node authentication in WSN. Wirel Netw 22(7):2453–3246
Kumaran US, Ilango P (2015) Secure authentication and integrity techniques for randomized secured routing in WSN. Wirel Netw 21(2):443–451
Skorin-Kapov N, Chen J, Wosinska L (2010) A new approach to optical networks security: attack-aware routing and wavelength assignment. IEEE/ACM Trans Netw 18(3):750–760
Kumar D, Chand S, Kumar B (2018) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intel Human Comput 10:641–660
Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2017) vProvably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intel Human Comput 9:1–21
Saravanaselvan A, Paramasivan B (2018) Design and implementation of an efficient attack resilient computation algorithm in WSN nodes. Cluster Comput 22:3301–3311
Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 82(3):1377–1404
Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272–276
Chuchaisri P, Newman R (2012) Fast response PKC-based broadcast authentication in wireless sensor networks. Mob Netw Appl 17(4):508–525
Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SKH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325
Shen Z, Thomas JP (2008) Security and QoS self-optimization in mobile ad hoc networks. IEEE Trans Mob Comput 7(9):1138–1151
Changda W, Shiguang J (2008) Multilevel security model for ad hoc networks. J Syst Eng Electron 19(2):391–397
Ferng H-W, Nurhakim J, Horng S-J (2014) Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wirel Netw 20(4):625–637
Kumar G, Rai MK, Saha R (2017) Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J Netw Comput Appl 99:10–16
Finogeev AG, Finogeev AA (2017) Information attacks and security in wireless sensor networks of industrial SCADA systems. J Ind Inf Integr 5:6–16
Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123
Amin R, Islam SKH, Kumar N, Choo KKR (2018) An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J Netw Comput Appl 104:133–144
Banerjee S et al (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673–20693
Marin-Lopez R, Pereniguez-Garcia F, Gomez-skarmeta AF, Ohba Y (2012) Network access security for the internet: protocol for carrying authentication for network access. IEEE Commun Mag 50(3):84–92
Chen HC (2017) TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst J 11(2):449–459
Jara AJ, Silva RM, Silva JS, Zamora MA, Skarmeta AFG (2011) Mobile IP-based protocol for wireless personal area networks in critical environments. Wirel Pers Commun 61(4):711–737
Chen L, Qian S, Lim M, Wang S (2018) An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun 15(5):61–76
Zhu WT, Xiang Y, Zhou J, Deng RH, Bao F (2011) Secure localization with attack detection in wireless sensor networks. Int J Inf Secur 10(3):155–171
Pazynyuk T, Li J-Z, Oreku GS (2008) Improved Feistel-based ciphers for wireless sensor network security. J Zhejiang Univ Sci A 9(8):1111–1117
Pathan ASK, Hong CS (2008) SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann Telecommun 63(9–10):529–541
Selimis G, Huang L, Massé F, Tsekoura I, Ashouei M, Catthoor F, Huisken J, Stuyt J, Dolmans G, Penders J, De Groot H (2011) A Lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J Med Syst 35(5):1289–1298
Salmon HM, de Farias CM, Loureiro P, Pirmez L, Rossetto S, Rodrigues PHDA, Pirmez R, Delicato FC, da Costa Carmo LFR (2013) Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques. Int J Wirel Inf Netw 20(1):39–66
Gope P, J. Lee T. Q. S. Quek, (2017) Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens J 17(2):498–503
Liu Y, Li J, Guizani M (2012) pkc based broadcast authentication using signature amortization for WSNs. IEEE Trans Wireless Commun 11(6):2106–2115
Zhang Y-Y, Li X-Z, Liu Y-A (2012) The detection and defence of DoS attack for wireless sensor network. J China Univ Posts Telecommun 19(2):52–56
Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880
Lee S, Kim K (2015) Key renewal scheme with sensor authentication under clustered wireless sensor networks. Electr Lett 51(4):368–369
Hamid MA, Hong CS (2009) Energy conserving security mechanisms for wireless sensor networks. Ann Telecommun 64:723
Yu H, He J, Zhang T, Xiao P, Zhang Y (2013) Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16(4):515–540
Gupta S, Verma HK, Sangal AL (2014) Efficient security mechanism to counter the malicious attack in wireless sensor networks. CSI Trans ICT 2(1):35–41
Pandey S, Pal P (2014) Spin-MI: energy saving routing algorithm based on SPIN protocol in WSN. Natl Acad Sci Lett 37(4):335–339
Lin C, Wu G (2013) Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J Supercomput 66(2):989–1007
Shon T, Han K, Park JJ, Jeong Y-S, Lee YS (2011) a secure and robust connectivity architecture for smart devices and applications. EURASIP J Wirel Commun Netw 2011:176393
Zhang C, Zhang Y, Fang Y (2009) Localized algorithms for coverage boundary detection in wireless sensor networks. Wirel Netw 15(1):3–20
Conti M, Pietro RD, Mancini LV, Mei A (2009) Mobility and cooperation to thwart node capture attacks in MANETs. EURASIP J Wirel Commun Network 2009:945943
Wen M, Li H, Zheng Y-F, Chen K-F (2008) TDOA-based Sybil attack detection scheme for wireless sensor networks. J Shanghai Univ (Engl Edit) 12(1):66–70
Vitabile S, Conti V, Collotta M, Scatà G, Andolina S, Gentile A, Sorbello F (2013) A real-time network architecture for biometric data delivery in ambient intelligence. J Ambient Intel Human Comput 4(3):303–321
Cionca V, Newe T, Dădârlat VT (2012) Configuration tool for a wireless sensor network integrated security framework. J Netw Syst Manag 20(3):417–452
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shemitha, P.A., Dhas, J.P.M. Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network. Evol. Intel. 15, 1455–1470 (2022). https://doi.org/10.1007/s12065-020-00502-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00502-9