Skip to main content

Advertisement

Log in

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) contain numerous nodes that their main goals are to monitor and control environments. Also, sensor nodes distribute based on network usage. One of the most significant issues in this type of network is the energy consumption of sensor nodes. In fixed-sink networks, nodes which are near the sink act as an interface to transfer data of other nodes to sink. This causes the energy consumption of sensors reduces rapidly. Therefore, the lifetime of the network declines. Sensor nodes owing to their weaknesses are susceptible to several threats, one of which is denial-of-sleep attack (DoSA) threatening WSN. Hence, the DoSA refers to the energy loss in these nodes by maintaining the nodes from entering energy-saving and sleep mode. In this paper, a hybrid approach is proposed based on mobile sink, firefly algorithm based on leach, and Hopfield neural network (WSN-FAHN). Thus, mobile sink is applied to both improve energy consumption and increase network lifetime. Firefly algorithm is proposed to cluster nodes and authenticate in two levels to prevent from DoSA. In addition, Hopfield neural network detects the direction route of the sink movement to send data of CH. Furthermore, here WSN-FAHN technique is assessed through wide simulations performed in the NS-2 environment. The WSN-FAHN procedure superiority is demonstrated by simulation outcomes in comparison with contemporary schemes based on performance metrics like packet delivery ratio (PDR), average throughput, detection ratio, and network lifetime while decreasing the average residual energy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Juneja V, Gupta DV (2018) Security against vampire attack in ADHOC wireless sensor network: detection and prevention techniques. In: International Conference on Wireless Intelligent and Distributed Environment for Communication. Springer, Cham, pp 25–38

  2. Osanaiye OA, Alfa AS, Hancke GP (2018) Denial of service defence for resource availability in wireless sensor networks. IEEE Access 6:6975–7004

    Google Scholar 

  3. Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. Int J Comput Sci Netw Solut 2:37–56

    Google Scholar 

  4. Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95

    Google Scholar 

  5. Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci (IJITCS) 5(6):2013

    Google Scholar 

  6. Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16

    Google Scholar 

  7. Fotohi R, Heydari R, Jamali S (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103

    Google Scholar 

  8. Childs LN (2019) RSA cryptography and prime numbers. Cryptology and error correction. Springer, Cham, pp 135–151

    Google Scholar 

  9. Yang XS (2009) Firefly algorithms for multimodal optimization. In: International symposium on stochastic algorithms. Springer, Berlin, pp 169–178

  10. Mohd N, Singh A, Bhadauria HS (2019) A novel SVM based IDS for distributed denial of sleep strike in wireless sensor networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06969-9

    Article  Google Scholar 

  11. Bhattasali T, Chaki R (2012) AMC model for denial of sleep attack detection. arXiv preprint arXiv:1203.1777

  12. Bhattasali T, Chaki R, Sanyal S (2012) Sleep deprivation attack detection in wireless sensor network. arXiv preprint arXiv:1203.0231

  13. Bhattasali T, Chaki R (2011) Lightweight hierarchical model for HWSNET. arXiv preprint arXiv:1111.1933

  14. Bhushan B, Sahoo G (2018) Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel Pers Commun 98(2):2037–2077

    Google Scholar 

  15. Periyanayagi S, Sumathy V (2013) Swarm based defense technique for denial-of-sleep attacks in wireless sensor networks. Int Rev Comput Softw (IRECOS) 8(6):1263–1270

    Google Scholar 

  16. Krentz KF, Meinel C (2019) Denial-of-sleep defenses for IEEE 802.15. 4 coordinated sampled listening (CSL). Comput Netw 148:60–71

    Google Scholar 

  17. Chen RC, Hsieh CF, Huang YF (2010) An isolation intrusion detection system for hierarchical wireless sensor networks. JNW 5(3):335–342

    Google Scholar 

  18. Rughiniş R, Gheorghe L (2010) Storm control mechanism in wireless sensor networks. In: 9th RoEduNet IEEE International Conference. IEEE, pp 430–435

  19. Hsueh CT, Wen CY, Ouyang YC (2015) A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sens J 15(6):3590–3602

    Google Scholar 

  20. Kalnoor G, Agarkhed J (2018) Detection of intruder using KMP pattern matching technique in wireless sensor networks. Proc Comput Sci 125:187–193

    Google Scholar 

  21. Krentz KF, Meinel C, Graupner H (2017) Countering three denial-of-sleep attacks on ContikiMAC. In: EWSN.pp 108–119

  22. Gunasekaran M, Periakaruppan S (2017) GA-DoSLD: genetic algorithm based denial-of-sleep attack detection in WSN. Secur Commun Netw 2017:1–10

    Google Scholar 

  23. Keerthana G, Padmavathi G (2016) Detecting sinkhole attack in wireless sensor network using enhanced particle swarm optimization technique. Int J Secur Appl 10(3):41–54

    Google Scholar 

  24. Mahalakshmi G, Subathra P (2018) Denial of sleep attack detection using mobile agent in wireless sensor networks. Int J Res Trends Innov 3(5):139–149

    Google Scholar 

  25. Jamali S, Fotohi R (2017) DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196

    Google Scholar 

  26. Fotohi R (2020) Securing of unmanned aerial systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675

    Google Scholar 

  27. Li J, Serpen G (2016) Adaptive and intelligent wireless sensor networks through neural networks: an illustration for infrastructure adaptation through Hopfield network. Appl Intell 45(2):343–362

    Google Scholar 

  28. Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl (IJACSA) 8(4):554–561

    Google Scholar 

  29. Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93–101

    Google Scholar 

  30. Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720

    Google Scholar 

  31. Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419

    Google Scholar 

  32. Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci Netw Solut (IJCSNS) 3:89–103

    Google Scholar 

  33. Talpur A, Shaikh FK, Baloch N, Felemban E, Khelil A, Alm MM (2019) Validation of wired and wireless interconnected body sensor networks. Sensors 19(17):3697

    Google Scholar 

  34. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: System sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. 2000. IEEE

  35. Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Network 21(2):79–100

    Google Scholar 

  36. Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87–93

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Reza Fotohi or Somayyeh Firoozi Bari.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fotohi, R., Firoozi Bari, S. A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. J Supercomput 76, 6860–6886 (2020). https://doi.org/10.1007/s11227-019-03131-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03131-x

Keywords

Navigation