A Novel Time-to-Response Based Attack Mitigation Technique for Internet of Things-Integrated Wireless Sensor Networks

IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
{"title":"A Novel Time-to-Response Based Attack Mitigation Technique for Internet of Things-Integrated Wireless Sensor Networks","authors":"M. Jagadeeswari,&nbsp;Babji Prasad Chapa,&nbsp;Arun Sekar Rajasekaran","doi":"10.1002/dac.70057","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>Various heterogeneous devices, including wireless sensor network (WSN) nodes, constitute the Internet of Things (IoT). WSNs are affected by the resource constraints of the connected devices and face frequent security breaches and data transmission loss through node-level compromises. This study proposes a connected ledger-based authenticated node-detection technique to mitigate compromising and man-in-middle attacks. The proposed method uses blockchain technology to update the response natures of the nodes to the IoT platform. Heterogeneous node operations are validated periodically and randomly through their time-to-response metric. Neighbor-to-neighbor verification relies on periodic blockchain updates, whereas node-to-IoT verification is performed arbitrarily for global validation. The validation is performed using classification learning, to prevent the intervention of malicious neighbors in the time-to-response sequences. Compromises and man-in-middle attacks are detected sequentially and randomly using classification and blockchain updates. For the maximum request variant, the proposed technique improves detection ratio by 11.18% and responses by 12.54% whereas it reduces data loss by 11.17%. The above results are obtained in comparison with the existing MNIM-CT [31], DADF [36], and APTAD [29] methods described in the related works section.</p>\n </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":"38 7","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Communication Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/dac.70057","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Various heterogeneous devices, including wireless sensor network (WSN) nodes, constitute the Internet of Things (IoT). WSNs are affected by the resource constraints of the connected devices and face frequent security breaches and data transmission loss through node-level compromises. This study proposes a connected ledger-based authenticated node-detection technique to mitigate compromising and man-in-middle attacks. The proposed method uses blockchain technology to update the response natures of the nodes to the IoT platform. Heterogeneous node operations are validated periodically and randomly through their time-to-response metric. Neighbor-to-neighbor verification relies on periodic blockchain updates, whereas node-to-IoT verification is performed arbitrarily for global validation. The validation is performed using classification learning, to prevent the intervention of malicious neighbors in the time-to-response sequences. Compromises and man-in-middle attacks are detected sequentially and randomly using classification and blockchain updates. For the maximum request variant, the proposed technique improves detection ratio by 11.18% and responses by 12.54% whereas it reduces data loss by 11.17%. The above results are obtained in comparison with the existing MNIM-CT [31], DADF [36], and APTAD [29] methods described in the related works section.

Abstract Image

一种新的基于时间响应的物联网集成无线传感器网络攻击缓解技术
包括无线传感器网络(WSN)节点在内的各种异构设备构成了物联网(IoT)。无线传感器网络受连接设备资源约束的影响,经常面临节点级入侵导致的安全漏洞和数据传输丢失。本研究提出了一种基于连接分类账的身份验证节点检测技术,以减轻妥协和中间人攻击。该方法采用区块链技术更新节点对物联网平台的响应性质。异构节点操作通过其响应时间度量定期和随机验证。邻居到邻居的验证依赖于定期区块链更新,而节点到物联网的验证则是任意执行全局验证。验证使用分类学习来执行,以防止恶意邻居在响应时间序列中的干预。使用分类和区块链更新顺序和随机检测折衷和中间人攻击。对于最大请求变体,该技术的检测率提高了11.18%,响应率提高了12.54%,数据丢失率降低了11.17%。以上结果是与相关工作章节中已有的mmim - ct[31]、DADF[36]、APTAD[29]方法进行对比得出的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.90
自引率
9.50%
发文量
323
审稿时长
7.9 months
期刊介绍: The International Journal of Communication Systems provides a forum for R&D, open to researchers from all types of institutions and organisations worldwide, aimed at the increasingly important area of communication technology. The Journal''s emphasis is particularly on the issues impacting behaviour at the system, service and management levels. Published twelve times a year, it provides coverage of advances that have a significant potential to impact the immense technical and commercial opportunities in the communications sector. The International Journal of Communication Systems strives to select a balance of contributions that promotes technical innovation allied to practical relevance across the range of system types and issues. The Journal addresses both public communication systems (Telecommunication, mobile, Internet, and Cable TV) and private systems (Intranets, enterprise networks, LANs, MANs, WANs). The following key areas and issues are regularly covered: -Transmission/Switching/Distribution technologies (ATM, SDH, TCP/IP, routers, DSL, cable modems, VoD, VoIP, WDM, etc.) -System control, network/service management -Network and Internet protocols and standards -Client-server, distributed and Web-based communication systems -Broadband and multimedia systems and applications, with a focus on increased service variety and interactivity -Trials of advanced systems and services; their implementation and evaluation -Novel concepts and improvements in technique; their theoretical basis and performance analysis using measurement/testing, modelling and simulation -Performance evaluation issues and methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信