Abstract
Because of the heavy data and communication advances, the utilization of Internet of Things (IoT) gadgets has expanded dramatically. In the improvement of IoT, Wireless Sensor Network (WSN) plays out a crucial part and involves easy keen gadgets for data gathering. In any case, such savvy gadgets have requirements regarding calculation, preparing, memory, and energy assets. Alongside such requirements, the major difficulties for WSN are to accomplish dependability with the security of communicated information in a weak climate alongside pernicious nodes. This paper intends to build up an Anomalous Intrusion Detection Protocol and Intrusion Prevention Protocol for interruption evasion in IoT dependent on WSN to expand the network time frame and information reliability. The proposed framework makes dissimilar energy-efficient groups dependent on the natural characteristics of nodes. Also, in view of the (k, n) limit related Shamir mystery sharing plan, the unwavering quality also, the security of the tangible data within the Base Station and group head are accomplished. The proposed security conspires demonstrates a trivial answer to adapt to interruptions produced by malignant nodes. The trial results utilizing the network test system Network Simulator-2 show that the proposed directing convention accomplished improvement as far as network lifetime, end-to-end delay as 24%, packet delay ratio as 30%, when contrasted and the current work under unique network characteristics.
Similar content being viewed by others
References
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29, 1645–1660.
Downie, J.D.; Nederlof, L.; Sutherland, J.S.; Wagner, R.E.; Webb, D.A.; Whiting, M.S. Radio Frequency Identification (RFID) Connected Tag Communications Protocol and Related Systems and Methods. U.S. Patent No. 9,652,707, 16 May 2017.
Hezaveh, M.; Shirmohammdi, Z.; Rohbani, N.; Miremadi, S.G. A fault-tolerant and energy-aware mechanism for cluster-based routing algorithm of WSNs. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, Canada, 11–15 May 2015; pp. 659–664.
Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46, 46–53.
Sharma, N., & Sharma, A. K. (2016). Cost analysis of hybrid adaptive routing protocol for heterogeneous wireless sensor network. Sadhana, 41, 283–288.
Abo-Zahhad, M., Ahmed, S. M., Sabor, N., & Sasaki, S. (2015). Mobile sink-based adaptive immune energy-efficientclustering protocol for improving the lifetime and stability period of wireless sensor networks. IEEE Sensors Journal, 15, 4576–4586.
Heinzelman,W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; pp. 1–10.
Abdulsalam, H.M.; Kamel, L.K. W-LEACH: Weighted Low Energy Adaptive Clustering Hierarchy aggregation algorithm for data streams in wireless sensor networks. In Proceedings of the 2010 IEEE International Conference on Data Mining Workshops (ICDMW), Sydney, Australia, 13 December 2010;pp. 1–8.
Mittal, N., Singh, U., & Sohi, B. S. (2017). A stable energy efficient clustering protocol for wireless sensor networks. Wirel. Netw., 23, 1809–1821.
Haseeb, Khalid, Almogren, Ahmad, Islam, Naveed, Din, Ikram Ud, & Jan, Zahoor. (2019). An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN. Energies., 12(21), 4174.
Haseeb, Khalid, Islam, Naveed, Almogren, Ahmad, & Din, Ikram Ud. (2019). Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. Ieee Access, 7, 185496–185505.
Tsitsiroudi, Niki, Panagiotis Sarigiannidis, Eirini Karapistoli, and Anastasios A. Economides. "EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs." In 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), pp. 103–109. IEEE, 2016.
Ioannou, Christiana, and Vasos Vassiliou. "An intrusion detection system for constrained WSN and IoT nodes based on binary logistic regression." In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 259–263. 2018.
Pundir, Sumit, Wazid, Mohammad, Singh, Devesh Pratap, Das, Ashok Kumar, Rodrigues, Joel JPC., & Park, Youngho. (2019). Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access., 8, 3343–3363.
Amouri, Amar, Vishwa T. Alaparthy, and Salvatore D. Morgera. "Cross layer-based intrusion detection based on network behavior for IoT." In 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON), pp. 1–4. IEEE, 2018.
Krishnan, R., & Perumal, G. (2019). H2B2H protocol for addressing link failure in WSN. Cluster Computing, 22, 9687–9696.
Granjal, Jorge, Silva, Joao M., & Nuno, Lourenco. (2018). Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors, 18, 8.
Ramadan, Rabie A. (2020). Efficient intrusion detection algorithms for smart cities-based wireless sensing technologies. Journal of Sensor and Actuator Networks, 9, 3.
Cakir, S., Toklu, S., & Yalcin, N. (2020). RPL attack detection and prevention in the internet of things networks using a gru based deep learning. IEEE Access, 8, 183678–183689.
El-Saadawy, M.; Shaaban, E. Enhancing S-LEACH security for wireless sensor networks. In Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, Indianapolis, IN, USA, 6–8 May 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1–6.
Ferreira, A.C.; Vilaça, M.A.; Oliveira, L.B.; Habib, E.; Wong, H.C.; Loureiro, A.A. On the security of cluster-based communication protocols for wireless sensor networks. In Proceedings of the International Conference on Networking, Reunion Island, France, 17–21 April 2005; pp. 449–458
Haseeb, K., Din, IkramUd, Almogren, A., & Islam, N. (2020). An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors., 20, 7.
Acknowledgements
This paper is funded in part by the Ministry of Science and Technology of Vietnam, under Grant No. ĐTĐLCN.105/21-C.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Krishnan, R., Krishnan, R.S., Robinson, Y.H. et al. An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks. Wireless Pers Commun 124, 3461–3483 (2022). https://doi.org/10.1007/s11277-022-09521-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09521-4