Skip to main content
Log in

Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Nowadays, Computer Networks and the internet is on the increase due to the precedence that provided by them. An enormous amount of information is accessed and allowed the users to share the information on an incredible scale while connecting the network to the Internet. Even though the internet nature crafts more benefits, still it is posed by the limitations because of the attacks. One of the special types of malicious software (attack) is ransomware also called malware that affects the systems and restricts the user’s access over the system. Further, it files till the payment of ransom. This malware is made by locking the user’s desktop and encrypting the user’s files. This has emerged as a critical threat in network security since each day the raising of ransomware gets abundant. Hence, the prediction of ransomware is considered as the major problem by the researchers and numerous researches are going on over this issue. This survey planned to review the network security models along with the authentication protocol. More importantly, the ransomware attack is also highly concentrated in this survey. Further, the literature analyses on diverse techniques under network security are made. Then the analysis also focused on the algorithms used and is categorized as protocols, authentication algorithms, optimization algorithms, and other techniques. Moreover, this survey demonstrates a detailed review of the cryptographic techniques, attacks, simulation tools and clouds that are exploited in the reviewed papers. Additionally, the chronological review and the performance are reviewed under the network security models. Finally, this paper exploits the research and described the challenges on the network security that can be used further in the future

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Abbreviations

WSN:

Wireless sensor network

GRBC:

Group routing betweenenss centrality

SDS:

Software defined security

NSF:

Network security function

WBAN:

Wireless body area network

SDP:

Semi-definite programming

CJ:

Cooperative jamming

HKP-HD:

Hybrid key predistribution scheme

MSN:

Medical smartphone network

S-SELDRIP:

Secured-selective design relay inquiry protocol

PVM:

Position verification method

MVP:

Message verification and passing

SBTN-TC:

Swarm based trusted node for tampering and cheating attack

CPHS:

Cryptographic puzzle hiding scheme

CSA:

Cuckoo search algorithm

QKD:

Quantum key distribution

QDC:

Quantum dense coding

HWS:

Heavy weight security

BFV:

Bloom filter vector

PID:

Proportional, integral, derivative

MKMP:

Multi-BS key management protocol

MLE:

Maximum likelihood estimation

SCADA:

Supervisory control and data acquisition systems

mMTC:

Massive machine type communication

GLOMONET:

Global mobility network

PANA:

Protocol for carrying authentication for network access

TCABRP:

Trust-based cooperation authentication bit-map routing protocol

WANET:

Wireless ad-hoc network

MA-DAA:

DAA scheme with Mutual Authentication

6LoWPANs:

IPv6 low-power personal area networks

NCUAV:

Network-connected UAV

SERP:

Secure energy-efficient routing protocol

IDS:

Intrusion detection system

ECDSA:

Elliptic curve digital signature algorithm

MoM:

Message observation mechanism

DoS:

Denial of service

MAC:

Message authentication codes

MA:

Matrix-based node capture attack algorithm

RF4CE:

Radio frequency for consumer electronics

MANET:

Mobile ad hoc network

TDOA:

Time difference of arrival

PII:

Personally identifiable information

LoWaNA:

Low-overhead solution

ECC:

Elliptical curve cryptography

PKC:

Public key cryptography

AES:

Advanced encryption standards

DES:

Data encryption standards

References

  1. Lee JK, Moon SY, Park JH (2017) CloudRPS: a cloud analysis based enhanced ransomware prevention system. J Supercomput 73(7):3065–3084

    Google Scholar 

  2. Azmoodeh A, Dehghantanha A, Conti M, Choo KKR (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intel Human Comput 9(4):1141–1152

    Google Scholar 

  3. Kharraz A, Robertson W, Kirda E (2018) Protecting against Ransomware: a new line of research or restating classic ideas? IEEE Secur Priv 16(3):103–107

    Google Scholar 

  4. Jung S, Won Y (2018) Ransomware detection method based on context-aware entropy analysis. Soft Comput 22:6731–6740

    Google Scholar 

  5. Cimitile A, Mercaldo F, Nardone V, Santone A, Visaggio CA (2017) Talos: no more ransomware victims with formal methods. Int J Inf Secur 41:1–20

    Google Scholar 

  6. Zhao JY, Kessler EG, Yu J, Jalal K, Cooper CA, Brewer JJ, Schwaitzberg SD, Guo WA (2018) Impact of trauma hospital ransomware attack on surgical residency training. J Surg Res 232:389–397

    Google Scholar 

  7. Homayoun S, Dehghantanha A, Ahmadzadeh M, Hashemi S, Khayami R (2017) Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence. In: IEEE Transactions on Emerging Topics in Computing

  8. Ayoub F, Singh K (1984) Cryptographic techniques and network security. Commun Radar Signal Process IEE Proc F 131(7):684–694

    Google Scholar 

  9. Peng L, Cao X Shi H, Sun C (2018) Optimal jamming attack schedule for remote state estimation with two sensors. J Frankl Inst, Available online 17 Jul 2018

  10. Kluger BD, Slezak SL (2018) Signal jamming models of fraudulent misreporting and economic prospects: an experimental investigation. J Econ Behav Organ 151:254–283

    Google Scholar 

  11. Li B, Yao Y, Zhang H, Lv Y, Zhao W (2018) Energy efficiency of proactive eavesdropping for multiple links wireless system. IEEE Access 6:26081–26090

    Google Scholar 

  12. Ding F, Wang H, Zhou Y, Zheng C (2018) Impact of relay’s eavesdropping on untrusted amplify-and-forward networks over nakagami-$m$ fading. IEEE Wirel Commun Lett 7(1):102–105

    Google Scholar 

  13. Hahn A, Thomas RK, Lozano I, Cardenas A (2015) A multi-layered and kill-chain based security analysis framework for cyber-physical systems. Int J Crit Infrastruct Prot 11:39–50

    Google Scholar 

  14. Wang H, Chen Z, Zhao J, Di X, Liu D (2018) A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow. IEEE Access 6:8599–8609

    Google Scholar 

  15. Lallie HS, Debattista K, Bal J (2018) An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception. IEEE Trans Inf Forensics Secur 13(5):1110–1122

    Google Scholar 

  16. Nadkarni PJ, Raina A, Srinivasa SG (2017) Recovery of distributed quantum information using graph states from a node failure. In: 2017 IEEE Globecom Workshops (GC Wkshps), Singapore, pp 1–6

  17. Chu CHK, Chu M (2004) An integrated framework for the assessment of network operations, reliability, and security. Bell Labs Tech J 8(4):133–152

    Google Scholar 

  18. Chen J, Wang C, Zhao Z, Chen K, Du R, Ahn G (2018) Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans Inf Forensics Secur 13(5):1286–1300

    Google Scholar 

  19. Zhang L, Wang Q, Tian B (2013) Security threats and measures for the cyber-physical systems. J China Univ Posts Telecommun 20(1):25–29

    Google Scholar 

  20. Wang R, Zhu Y, Tan J, Zhou B (2017) Detection of malicious web pages based on hybrid analysis. J Inf Secur Appl 35:68–74

    Google Scholar 

  21. Bretas AS, Bretas NG, Carvalho BEB (2019) Further contributions to smart grids cyber-physical security as a malicious data attack: proof and properties of the parameter error spreading out to the measurements and a relaxed correction model. Int J Electr Power Energy Syst 104:43–51

    Google Scholar 

  22. Wang Z, Zhang B, Wang X, Jin X, Bai Y (2018) Improvements of multihop localization algorithm for wireless sensor networks. IEEE Syst J 13:365–376

    Google Scholar 

  23. Zhao Z, Wu B, Li B, Xiao J, Fu S, Liu D (2018) Multihop routing enabled packet switching with QoS guarantee in optical clos for data centers. IEEE/OSA J Opt Commun Netw 10(6):624–632

    Google Scholar 

  24. Conti M, Di Pietro R, Spognardi A (2014) Clone wars: distributed detection of clone attacks in mobile WSNs. J Comput Syst Sci 80(3):654–669

    MATH  Google Scholar 

  25. Hu Y, Li Y, Zing C, Liao J (2016) Providing customized security based on network function composition and reconfiguration. China Commun 13(Supplement 1):177–189

    Google Scholar 

  26. Thangam T, Kazem HA, Muthuvel K SFOA: sun flower optimization algorithm to solve optimal power flow

  27. Rajakumar BR (2013) Static and adaptive mutation techniques for genetic algorithm: a systematic comparative analysis. Int J Comput Sci Eng 8(2):180–193. https://doi.org/10.1504/IJCSE.2013.053087

    Article  MathSciNet  Google Scholar 

  28. Jadhav AN, Gomathi N (2019) DIGWO: hybridization of dragonfly algorithm with Improvedc grey wolf optimization algorithm for data clustering. Multimed Res 2(3):1–11

    Google Scholar 

  29. Ravi RV, Subramaniam K, Roshini TV, Muthusamy SPB, Venkatesan GP (2019) Optimization algorithms, an effective tool for the design of digital filters; a review. J Ambient Intel Human Comput 12:310–319

    Google Scholar 

  30. Guan J, Wei Z, You I (2018) GRBC-based Network Security Functions placement scheme in SDS for 5G security. J Netw Comput Appl 114:48–56

    Google Scholar 

  31. Dodangeh P, Jahangir AH (2018) A biometric security scheme for wireless body area networks. J Inf Secur Appl 41:62–74

    Google Scholar 

  32. Li Y, Gao X, Xu Z, Zhou X (2018) Network-based queuing model for simulating passenger throughput at an airport security checkpoint. J Air Trans Manag 66:13–24

    Google Scholar 

  33. Sharma V, You I, Leu F-Y, Atiquzzaman M (2018) Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. J Netw Comput Appl 102:38–57

    Google Scholar 

  34. Hyun S et al (2018) Interface to network security functions for cloud-based security services. IEEE Commun Mag 56(1):171–178

    MathSciNet  Google Scholar 

  35. Shi F, Tan W, Xia J, Xie D, Fan L, Liu X (2018) Hybrid cache placement for physical-layer security in cooperative networks. IEEE Access 6:8098–8108

    Google Scholar 

  36. Tubail D, El-Absi M, Ikki SS, Mesbah W, Kaiser T (2018) Artificial noise-based physical-layer security in interference alignment multipair two-way relaying networks. IEEE Access 6:19073–19085

    Google Scholar 

  37. Kraus L, Wechsung I, Möller S (2017) Psychological needs as motivators for security and privacy actions on smartphones. J Inf Secur Appl 34(1):34–45

    Google Scholar 

  38. Tang W, Feng S, Ding Y, Liu Y (2017) Physical layer security in heterogeneous networks with jammer selection and full-duplex users. IEEE Trans Wirel Commun 16(12):7982–7995

    Google Scholar 

  39. Pourazarm S, Cassandras CG (2017) Energy-based lifetime maximization and security of wireless-sensor networks with general nonideal battery models. IEEE Trans Control Netw Syst 4(2):323–335

    MathSciNet  MATH  Google Scholar 

  40. Kaynar K (2016) A taxonomy for attack graph generation and usage in network security. J Inf Secur Appl 29:27–56

    Google Scholar 

  41. Hu L, Wen H, Wu B, Tang J, Pan F (2016) Adaptive base station cooperation for physical layer security in two-cell wireless networks. IEEE Access 4:5607–5623

    Google Scholar 

  42. Ahlawat P, Dave M (2018) An attack resistant key predistribution scheme for wireless sensor networks. J King Saud Univ Comput Inf Sci, Available online 3 Apr 2018

  43. Meng W, Li W, Xiang Y, Choo KKR (2017) A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J Netw Comput Appl 78:162–169

    Google Scholar 

  44. Wen H, Luo J, Zhou L (2011) Lightweight and effective detection scheme for node clone attack in wireless sensor networks. IET Wirel Sens Syst 1(3):137–143

    Google Scholar 

  45. Kumar SVNS, Palanichamy Y (2018) Energy efficient and secured distributed data dissemination using hop by hop authentication in WSN. Wirel Netw 24(4):1343–1360

    Google Scholar 

  46. Maheswari PU, Kumar PG (2017) Dynamic detection and prevention of clone attack in wireless sensor networks. Wirel Pers Commun 94(4):2043–2054

    Google Scholar 

  47. Cordero CV, Lisser A (2015) Jamming attacks reliable prevention in a clustered wireless sensor network. Wirel Pers Commun 85(3):925–936

    Google Scholar 

  48. Periyanayagi S, Sumathy V (2018) Swarm-based defense technique for tampering and cheating attack in WSN using CPHS. Pers Ubiquit Comput 22:1165–1179

    Google Scholar 

  49. Mehetre DC, Roslin SE, Wagh SJ (2019) Detection and prevention of black hole and selective forwarding attack in clustered WSN with active trust. Cluster Comput 22:1313–1328

    Google Scholar 

  50. Pongwongtragull P, Mitatha S, Yupapin PP (2010) A simultaneous generation of QKD and QDC via optical memory array for distributed network security. Opt Int J Light Electron Opt 121(23):2137–2139

    Google Scholar 

  51. Sen A, Chatterjee T, Bit SD (2016) LoWaNA: low overhead watermark based node authentication in WSN. Wirel Netw 22(7):2453–3246

    Google Scholar 

  52. Kumaran US, Ilango P (2015) Secure authentication and integrity techniques for randomized secured routing in WSN. Wirel Netw 21(2):443–451

    Google Scholar 

  53. Skorin-Kapov N, Chen J, Wosinska L (2010) A new approach to optical networks security: attack-aware routing and wavelength assignment. IEEE/ACM Trans Netw 18(3):750–760

    Google Scholar 

  54. Kumar D, Chand S, Kumar B (2018) Cryptanalysis and improvement of an authentication protocol for wireless sensor networks applications like safety monitoring in coal mines. J Ambient Intel Human Comput 10:641–660

    Google Scholar 

  55. Srinivas J, Mishra D, Mukhopadhyay S, Kumari S (2017) vProvably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intel Human Comput 9:1–21

    Google Scholar 

  56. Saravanaselvan A, Paramasivan B (2018) Design and implementation of an efficient attack resilient computation algorithm in WSN nodes. Cluster Comput 22:3301–3311

    Google Scholar 

  57. Das AK (2015) A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel Pers Commun 82(3):1377–1404

    Google Scholar 

  58. Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15(3):272–276

    Google Scholar 

  59. Chuchaisri P, Newman R (2012) Fast response PKC-based broadcast authentication in wireless sensor networks. Mob Netw Appl 17(4):508–525

    Google Scholar 

  60. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SKH, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325

    Google Scholar 

  61. Shen Z, Thomas JP (2008) Security and QoS self-optimization in mobile ad hoc networks. IEEE Trans Mob Comput 7(9):1138–1151

    Google Scholar 

  62. Changda W, Shiguang J (2008) Multilevel security model for ad hoc networks. J Syst Eng Electron 19(2):391–397

    MATH  Google Scholar 

  63. Ferng H-W, Nurhakim J, Horng S-J (2014) Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wirel Netw 20(4):625–637

    Google Scholar 

  64. Kumar G, Rai MK, Saha R (2017) Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. J Netw Comput Appl 99:10–16

    Google Scholar 

  65. Finogeev AG, Finogeev AA (2017) Information attacks and security in wireless sensor networks of industrial SCADA systems. J Ind Inf Integr 5:6–16

    Google Scholar 

  66. Cao J, Ma M, Li H, Fu Y, Liu X (2018) EGHR: efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J Netw Comput Appl 102:1–16

    Google Scholar 

  67. Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123

    Google Scholar 

  68. Amin R, Islam SKH, Kumar N, Choo KKR (2018) An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J Netw Comput Appl 104:133–144

    Google Scholar 

  69. Banerjee S et al (2018) Design of an anonymity-preserving group formation based authentication protocol in global mobility networks. IEEE Access 6:20673–20693

    Google Scholar 

  70. Marin-Lopez R, Pereniguez-Garcia F, Gomez-skarmeta AF, Ohba Y (2012) Network access security for the internet: protocol for carrying authentication for network access. IEEE Commun Mag 50(3):84–92

    Google Scholar 

  71. Chen HC (2017) TCABRP: a trust-based cooperation authentication bit-map routing protocol against insider security threats in wireless ad hoc networks. IEEE Syst J 11(2):449–459

    Google Scholar 

  72. Jara AJ, Silva RM, Silva JS, Zamora MA, Skarmeta AFG (2011) Mobile IP-based protocol for wireless personal area networks in critical environments. Wirel Pers Commun 61(4):711–737

    Google Scholar 

  73. Chen L, Qian S, Lim M, Wang S (2018) An enhanced direct anonymous attestation scheme with mutual authentication for network-connected UAV communication systems. China Commun 15(5):61–76

    Google Scholar 

  74. Zhu WT, Xiang Y, Zhou J, Deng RH, Bao F (2011) Secure localization with attack detection in wireless sensor networks. Int J Inf Secur 10(3):155–171

    Google Scholar 

  75. Pazynyuk T, Li J-Z, Oreku GS (2008) Improved Feistel-based ciphers for wireless sensor network security. J Zhejiang Univ Sci A 9(8):1111–1117

    MATH  Google Scholar 

  76. Pathan ASK, Hong CS (2008) SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann Telecommun 63(9–10):529–541

    Google Scholar 

  77. Selimis G, Huang L, Massé F, Tsekoura I, Ashouei M, Catthoor F, Huisken J, Stuyt J, Dolmans G, Penders J, De Groot H (2011) A Lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design. J Med Syst 35(5):1289–1298

    Google Scholar 

  78. Salmon HM, de Farias CM, Loureiro P, Pirmez L, Rossetto S, Rodrigues PHDA, Pirmez R, Delicato FC, da Costa Carmo LFR (2013) Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques. Int J Wirel Inf Netw 20(1):39–66

    Google Scholar 

  79. Gope P, J. Lee T. Q. S. Quek, (2017) Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sens J 17(2):498–503

    Google Scholar 

  80. Liu Y, Li J, Guizani M (2012) pkc based broadcast authentication using signature amortization for WSNs. IEEE Trans Wireless Commun 11(6):2106–2115

    Google Scholar 

  81. Zhang Y-Y, Li X-Z, Liu Y-A (2012) The detection and defence of DoS attack for wireless sensor network. J China Univ Posts Telecommun 19(2):52–56

    Google Scholar 

  82. Yu Y, Li K, Zhou W, Li P (2012) Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl 35(3):867–880

    Google Scholar 

  83. Lee S, Kim K (2015) Key renewal scheme with sensor authentication under clustered wireless sensor networks. Electr Lett 51(4):368–369

    Google Scholar 

  84. Hamid MA, Hong CS (2009) Energy conserving security mechanisms for wireless sensor networks. Ann Telecommun 64:723

    Google Scholar 

  85. Yu H, He J, Zhang T, Xiao P, Zhang Y (2013) Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16(4):515–540

    Google Scholar 

  86. Gupta S, Verma HK, Sangal AL (2014) Efficient security mechanism to counter the malicious attack in wireless sensor networks. CSI Trans ICT 2(1):35–41

    Google Scholar 

  87. Pandey S, Pal P (2014) Spin-MI: energy saving routing algorithm based on SPIN protocol in WSN. Natl Acad Sci Lett 37(4):335–339

    Google Scholar 

  88. Lin C, Wu G (2013) Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach. J Supercomput 66(2):989–1007

    Google Scholar 

  89. Shon T, Han K, Park JJ, Jeong Y-S, Lee YS (2011) a secure and robust connectivity architecture for smart devices and applications. EURASIP J Wirel Commun Netw 2011:176393

    Google Scholar 

  90. Zhang C, Zhang Y, Fang Y (2009) Localized algorithms for coverage boundary detection in wireless sensor networks. Wirel Netw 15(1):3–20

    Google Scholar 

  91. Conti M, Pietro RD, Mancini LV, Mei A (2009) Mobility and cooperation to thwart node capture attacks in MANETs. EURASIP J Wirel Commun Network 2009:945943

    Google Scholar 

  92. Wen M, Li H, Zheng Y-F, Chen K-F (2008) TDOA-based Sybil attack detection scheme for wireless sensor networks. J Shanghai Univ (Engl Edit) 12(1):66–70

    Google Scholar 

  93. Vitabile S, Conti V, Collotta M, Scatà G, Andolina S, Gentile A, Sorbello F (2013) A real-time network architecture for biometric data delivery in ambient intelligence. J Ambient Intel Human Comput 4(3):303–321

    Google Scholar 

  94. Cionca V, Newe T, Dădârlat VT (2012) Configuration tool for a wireless sensor network integrated security framework. J Netw Syst Manag 20(3):417–452

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. A. Shemitha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shemitha, P.A., Dhas, J.P.M. Research perceptions on ransomware attack: a complete analysis on conventional authentication protocols in network. Evol. Intel. 15, 1455–1470 (2022). https://doi.org/10.1007/s12065-020-00502-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00502-9

Keywords

Navigation