scholarly journals A Novel QoS-Oriented Intrusion Detection Mechanism for IoT Applications

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Abdulfattah Noorwali ◽  
Ahmad Naseem Alvi ◽  
Mohammad Zubair Khan ◽  
Muhammad Awais Javed ◽  
Wadii Boulila ◽  
...  

Wireless sensor network (WSN) is an integral part of Internet of Things (IoT). The sensor nodes in WSN generate large sensing data which is disseminated to intelligent servers using multiple wireless networks. This large data is prone to attacks from malicious nodes which become part of the network, and it is difficult to find these adversaries. The work in this paper presents a mechanism to detect adversaries for the IEEE 802.15.4 standard which is a central medium access protocol used in WSN-based IoT applications. The collisions and exhaustion attacks are detected based on a soft decision-based algorithm. In case the QoS of the network is compromised due to large data traffic, the proposed protocol adaptively varies the duty cycle of the IEEE 802.15.4. Simulation results show that the proposed intrusion detection and adaptive duty cycle algorithm improves the energy efficiency of a WSN with a reduced network delay.

2021 ◽  
Vol 11 (4) ◽  
pp. 1362
Author(s):  
Kohei Tomita ◽  
Nobuyoshi Komuro

This paper proposes a Duty-Cycle (DC) control method in order to improve the Packet Delivery Ratio (PDR) for IEEE 802.15.4-compliant heterogeneous Wireless Sensor Networks (WSNs). The proposed method controls the DC so that the buffer occupancy of sensor nodes is less than 1 and assigns DC to each sub-network (sub-network means a network consisting of a router node and its subordinate nodes). In order to use the appropriate DC of each sub-network to obtain the high PDR, this paper gives analytical expressions of the buffer occupancy. The simulation results show that the proposed method achieves a reasonable delay and energy consumption while maintaining high PDR.


2012 ◽  
Vol 263-266 ◽  
pp. 2972-2978
Author(s):  
Ju Long Pan ◽  
Ling Long Hu ◽  
Wen Jin Li ◽  
Hui Cui ◽  
Zi Yin Li

To identify the malicious nodes timely in wireless sensor networks(WSNs), a cooperation intrusion detection scheme based on weighted k Nearest Neighbour(kNN) is proposed. Given a few types of sensor nodes, the test model extracts the properties of sensor nodes related with the known types of malicious nodes, and establishes sample spaces of all sensor nodes which participate in network activities. According to the known node’s attributes sampled, the unknown type sensor nodes are classified based on weighted kNN. Considering of energy consumption, an intrusion detection system selection algorithm is joined in the sink node. Simulation results show that the scheme has a lower false detection rate and a higher detection rate at the same time, and it can preserve energy of detection nodes compared with an existing intrusion detection scheme.


2016 ◽  
Vol 26 (03) ◽  
pp. 1750043 ◽  
Author(s):  
Ching-Han Chen ◽  
Ming-Yi Lin ◽  
Wen-Hung Lin

Wireless sensor networks (WSNs) represent a promising solution in the fields of the Internet of Things (IoT) and machine-to-machine networks for smart home applications. However, to feasibly deploy wireless sensor devices in a smart home environment, four key requirements must be satisfied: stability, compatibility, reliability routing, and performance and power balance. In this study, we focus on the unreliability problem of the IEEE 802.15.4 WSN medium access control (MAC), which is caused by the contention-based MAC protocol used for channel access. This problem results in a low packet delivery ratio, particularly in a smart home network with only a few sensor nodes. In this paper, we first propose a lightweight WSN protocol for a smart home or an intelligent building, thus replacing the IEEE 802.15.4 protocol, which is highly complex and has a low packet delivery ratio. Subsequently, we describe the development of a discrete event system model for the WSN by using a GRAFCET and propose a development platform based on a reconfigurable FPGA for reducing fabrication cost and time. Finally, a prototype WSN controller ASIC chip without an extra CPU and with our proposed lightweight MAC was developed and tested. It enhanced the packet delivery ratio by up to 100%.


2013 ◽  
Vol 284-287 ◽  
pp. 2015-2020 ◽  
Author(s):  
Rong Shue Hsiao ◽  
Ding Bing Lin ◽  
Hsin Piao Lin ◽  
Shu Chun Cheng ◽  
Chen Hua Chung

Wireless Sensor Networks are based on the ZigBee standard. ZigBee uses the IEEE 802.15.4 physical and MAC (medium access control) layers to provide standards-based reliable wireless data transfer. Also, ZigBee provides low-power wireless connectivity features. The features allow ZigBee-based products to be installed easily and cost-effectively. Thus, this technology has been attracting extensive research and development efforts to replace the traditional wired solutions for Building Automation Systems. However, wireless communications in indoor building environments are prone to be influenced by multiple concurrent factors, such as multi-path fading, channel contention, other radio interference, human activity and limited battery energy. Also, sensor detection is not fully reliable. Thus, system robustness is very concerning in these applications. In this paper, we propose a reliable wireless sensor network and an accurate occupancy detection mechanism. We implemented this system in an indoor building for the lighting control of public areas, including corridors, a coffee room and a washroom. The system framework was shown to be effective in terms of network communication reliability and sensor detection accuracy.


Author(s):  
Narmatha C ◽  

The Wireless Sensor Networks (WSNs) are vulnerable to numerous security hazards that could affect the entire network performance, which could lead to catastrophic problems such as a denial of service attacks (DoS). The WSNs cannot protect these types of attacks by key management protocols, authentication protocols, and protected routing. A solution to this issue is the intrusion detection system (IDS). It evaluates the network with adequate data obtained and detects the sensor node(s) abnormal behavior. For this work, it is proposed to use the intrusion detection system (IDS), which recognizes automated attacks by WSNs. This IDS uses an improved LEACH protocol cluster-based architecture designed to reduce the energy consumption of the sensor nodes. In combination with the Multilayer Perceptron Neural Network, which includes the Feed Forward Neutral Network (FFNN) and the Backpropagation Neural Network (BPNN), IDS is based on fuzzy rule-set anomaly and abuse detection based learning methods based on the fugitive logic sensor to monitor hello, wormhole and SYBIL attacks.


Author(s):  
Manjula C. Belavagi ◽  
Balachandra Muniyal

<span lang="EN-US">Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.</span>


Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.


Author(s):  
Manoj Tolani ◽  
Sunny ◽  
Rajat Kumar Singh

In this work, energy-efficient adaptive duty cycle guaranteed time slot algorithm is proposed for beacon-enabled standard medium access control protocol to efficiently handle low, medium and high data traffic loads. The proposed protocol can efficiently handle high traffic load by effective utilization of slots. The protocol can dynamically update the number of slots for contention access period and contention free period in each beacon interval. Therefore, it can capably handle high network load condition. The protocol continuously monitors the utilization capacity of each of the sensor node and allots the contention free period slots to the needy nodes based on their utilization capacity. Simulation analysis is done for three different scenarios. The performance of the proposed protocol is compared with the other existing protocols. Simulation results show the overall superiority of our proposed algorithm in terms of packet delivery and energy consumption.


2010 ◽  
pp. 1488-1505
Author(s):  
Floriano De Rango

Distributed wireless systems present many security issues, and offering security preserving network resources is often a challenging effort. Offering security through only cryptography is not always a suitable solution if the high dynamic context of MANET is considered and the trust mechanism that reduces the computationally intensive number of security operations becomes strategic. In this work, a well-known routing protocol, called SAODV, has been considered. To improve its performance and offer more resilience to attack from malicious nodes authenticated by the network, some additional features are added. A preventive approach based on a cryptographic mechanism and a reactive approach to detect anomalous and malicious nodes are considered. An extension of SAODV offering an Intrusion Detection Mechanism (IDM) and a Trust-based Mechanism (TBM) to promote the collaboration of the cooperating nodes and penalize the selfish nodes are proposed. Simulation results were performed under a NS-2 simulator to show the effectiveness of our proposal compared with AODV and SAODV. Simulation parameters, such as Normalized Routing Overhead, Data Packet Delivery Ratio, average number of signatures and throughput of collaborating and malicious nodes, have been considered.


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4158
Author(s):  
Arslan Musaddiq ◽  
Zulqar Nain ◽  
Yazdan Ahmad Qadri ◽  
Rashid Ali ◽  
Sung Won Kim

The next generation of the Internet of Things (IoT) networks is expected to handle a massive scale of sensor deployment with radically heterogeneous traffic applications, which leads to a congested network, calling for new mechanisms to improve network efficiency. Existing protocols are based on simple heuristics mechanisms, whereas the probability of collision is still one of the significant challenges of future IoT networks. The medium access control layer of IEEE 802.15.4 uses a distributed coordination function to determine the efficiency of accessing wireless channels in IoT networks. Similarly, the network layer uses a ranking mechanism to route the packets. The objective of this study was to intelligently utilize the cooperation of multiple communication layers in an IoT network. Recently, Q-learning (QL), a machine learning algorithm, has emerged to solve learning problems in energy and computational-constrained sensor devices. Therefore, we present a QL-based intelligent collision probability inference algorithm to optimize the performance of sensor nodes by utilizing channel collision probability and network layer ranking states with the help of an accumulated reward function. The simulation results showed that the proposed scheme achieved a higher packet reception ratio, produces significantly lower control overheads, and consumed less energy compared to current state-of-the-art mechanisms.


Sign in / Sign up

Export Citation Format

Share Document