Skip to main content

Advertisement

Log in

An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Because of the heavy data and communication advances, the utilization of Internet of Things (IoT) gadgets has expanded dramatically. In the improvement of IoT, Wireless Sensor Network (WSN) plays out a crucial part and involves easy keen gadgets for data gathering. In any case, such savvy gadgets have requirements regarding calculation, preparing, memory, and energy assets. Alongside such requirements, the major difficulties for WSN are to accomplish dependability with the security of communicated information in a weak climate alongside pernicious nodes. This paper intends to build up an Anomalous Intrusion Detection Protocol and Intrusion Prevention Protocol for interruption evasion in IoT dependent on WSN to expand the network time frame and information reliability. The proposed framework makes dissimilar energy-efficient groups dependent on the natural characteristics of nodes. Also, in view of the (k, n) limit related Shamir mystery sharing plan, the unwavering quality also, the security of the tangible data within the Base Station and group head are accomplished. The proposed security conspires demonstrates a trivial answer to adapt to interruptions produced by malignant nodes. The trial results utilizing the network test system Network Simulator-2 show that the proposed directing convention accomplished improvement as far as network lifetime, end-to-end delay as 24%, packet delay ratio as 30%, when contrasted and the current work under unique network characteristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29, 1645–1660.

    Article  Google Scholar 

  2. Downie, J.D.; Nederlof, L.; Sutherland, J.S.; Wagner, R.E.; Webb, D.A.; Whiting, M.S. Radio Frequency Identification (RFID) Connected Tag Communications Protocol and Related Systems and Methods. U.S. Patent No. 9,652,707, 16 May 2017.

  3. Hezaveh, M.; Shirmohammdi, Z.; Rohbani, N.; Miremadi, S.G. A fault-tolerant and energy-aware mechanism for cluster-based routing algorithm of WSNs. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, Canada, 11–15 May 2015; pp. 659–664.

  4. Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46, 46–53.

    Article  Google Scholar 

  5. Sharma, N., & Sharma, A. K. (2016). Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network. Sadhana, 41, 283–288.

    Article  MathSciNet  Google Scholar 

  6. Abo-Zahhad, M., Ahmed, S. M., Sabor, N., & Sasaki, S. (2015). Mobile sink-based adaptive immune energy-efficientclustering protocol for improving the lifetime and stability period of wireless sensor networks. IEEE Sensors Journal, 15, 4576–4586.

    Article  Google Scholar 

  7. Heinzelman,W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; pp. 1–10.

  8. Abdulsalam, H.M.; Kamel, L.K. W-LEACH: Weighted Low Energy Adaptive Clustering Hierarchy aggregation algorithm for data streams in wireless sensor networks. In Proceedings of the 2010 IEEE International Conference on Data Mining Workshops (ICDMW), Sydney, Australia, 13 December 2010;pp. 1–8.

  9. Mittal, N., Singh, U., & Sohi, B. S. (2017). A stable energy efficient clustering protocol for wireless sensor networks. Wirel. Netw., 23, 1809–1821.

    Article  Google Scholar 

  10. Haseeb, Khalid, Almogren, Ahmad, Islam, Naveed, Din, Ikram Ud, & Jan, Zahoor. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies., 12(21), 4174.

    Article  Google Scholar 

  11. Haseeb, Khalid, Islam, Naveed, Almogren, Ahmad, & Din, Ikram Ud. (2019). Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. Ieee Access, 7, 185496–185505.

    Article  Google Scholar 

  12. Tsitsiroudi, Niki, Panagiotis Sarigiannidis, Eirini Karapistoli, and Anastasios A. Economides. "EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs." In 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 103–109. IEEE, 2016.

  13. Ioannou, Christiana, and Vasos Vassiliou. "An intrusion detection system for constrained WSN and IoT nodes based on binary logistic regression." In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 259–263. 2018.

  14. Pundir, Sumit, Wazid, Mohammad, Singh, Devesh Pratap, Das, Ashok Kumar, Rodrigues, Joel JPC., & Park, Youngho. (2019). Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access., 8, 3343–3363.

    Article  Google Scholar 

  15. Amouri, Amar, Vishwa T. Alaparthy, and Salvatore D. Morgera. "Cross layer-based intrusion detection based on network behavior for IoT." In 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON), pp. 1–4. IEEE, 2018.

  16. Krishnan, R., & Perumal, G. (2019). H2B2H protocol for addressing link failure in WSN. Cluster Computing, 22, 9687–9696.

    Article  Google Scholar 

  17. Granjal, Jorge, Silva, Joao M., & Nuno, Lourenco. (2018). Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors, 18, 8.

    Article  Google Scholar 

  18. Ramadan, Rabie A. (2020). Efficient intrusion detection algorithms for smart cities-based wireless sensing technologies. Journal of Sensor and Actuator Networks, 9, 3.

    Article  Google Scholar 

  19. Cakir, S., Toklu, S., & Yalcin, N. (2020). RPL attack detection and prevention in the internet of things networks using a gru based deep learning. IEEE Access, 8, 183678–183689.

    Article  Google Scholar 

  20. El-Saadawy, M.; Shaaban, E. Enhancing S-LEACH security for wireless sensor networks. In Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, Indianapolis, IN, USA, 6–8 May 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1–6.

  21. Ferreira, A.C.; Vilaça, M.A.; Oliveira, L.B.; Habib, E.; Wong, H.C.; Loureiro, A.A. On the security of cluster-based communication protocols for wireless sensor networks. In Proceedings of the International Conference on Networking, Reunion Island, France, 17–21 April 2005; pp. 449–458

  22. Haseeb, K., Din, IkramUd, Almogren, A., & Islam, N. (2020). An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors., 20, 7.

    Google Scholar 

Download references

Acknowledgements

This paper is funded in part by the Ministry of Science and Technology of Vietnam, under Grant No. ĐTĐLCN.105/21-C.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hoang Viet Long.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishnan, R., Krishnan, R.S., Robinson, Y.H. et al. An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks. Wireless Pers Commun 124, 3461–3483 (2022). https://doi.org/10.1007/s11277-022-09521-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09521-4

Keywords

Navigation