An Adaptive Secure Timestamp-Based Replay Attack Detection System For Wsns

Authors

  • G Nagendra Babu Associate Professor, Department of Computer Science and Engineering, JAIN(Deemed to be University), Bengaluru, INDIA
  • Konda Hari Krishna Associate Professor, Department of Computer Science and Engineering, Mohan Babu University, Tirupati,INDIA
  • K Venkateswara Rao Professor,Department of Computer Science and Engineering, Mohan Babu University,Tirupati,INDIA

Keywords:

Data integrity, Message Authentication, Replay attack, Timestamp, WSN

Abstract

Wireless Sensor Networks (WSNs) are essential in many fields because they enable real-time data gathering and transmission possible for a wide range of applications. Replay attacks pose significant risks to the integrity and dependability of WSNs, which have become increasingly important due to growing dependence on them. In order to successfully reduce replay attacks in WSNs, this investigation suggests the Adaptive Secure Timestamp-Based Replay Attack Detection System (AST-RADS). Combining cryptographic methods, AST-RADS offers a multi-layered defense system. To guarantee data confidentiality and integrity during transmission, the model uses secure timestamp-based authentication, encryption, and a hierarchical key management system. Additionally, the suggested model is created with minimal overhead, making it appropriate for WSN situations with limited resources. Extensive simulations and experiments validate the efficacy and efficiency of AST-RADS compared to existing solutions, demonstrating its superiority in detecting and preventing replay attacks.

Downloads

Download data is not yet available.

References

M. Tropea, M. G. Spina, F. De Rango, and A. F. Gentile, “Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer,” Future Internet, vol. 14, no. 5, p. 145, May 2022, doi: 10.3390/fi14050145.

M. A. Al-Shareeda, S. Manickam, S. A. Laghari, and A. Jaisan, “Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications,” Sustainability, vol. 14, no. 23, p. 15900, Nov. 2022, doi: 10.3390/su142315900.

S. Ismail, D. W. Dawoud, and H. Reza, “Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review,” Future Internet, vol. 15, no. 6, p. 200, May 2023, doi: 10.3390/fi15060200.

Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang, "Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey", Wireless Communications and Mobile Computing, vol. 2020, Article ID 2643546, 20 pages, 2020, https://doi.org/10.1155/2020/2643546

Guang Yang,Lie Die,Zhiqiang Wei, “Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks,” Sensors (Basel, Switzerland) vol. 18,11 3907. 13 Nov. 2018, doi:10.3390/s18113907.

S.G. Hymlin Rose, T. Jayasree,” Detection of jamming attack using timestamp for WSN,”Ad Hoc Networks, Volume 91,2019,101874,

https://doi.org/10.1016/j.adhoc.2019.101874.

Gautam, A.K., Kumar, R.,”A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks,” SN Appl. Sci. 3, 50 (2021), https://doi.org/10.1007/s42452-020-04089-9

X. Huan, K. S. Kim, S. Lee, E. G. Lim and A. Marshall, "Improving Multi-Hop Time Synchronization Performance in Wireless Sensor Networks Based on Packet-Relaying Gateways With Per-Hop Delay Compensation," in IEEE Transactions on Communications, vol. 69, no. 9, pp. 6093-6105, Sept. 2021, doi: 10.1109/TCOMM.2021.3092038.

Huang Y, Zhang G, Kong M, He F. New timestamp mark–based energy efficient time synchronization method for wireless sensor networks. International Journal of Distributed Sensor Networks. 2022;18(11). doi:10.1177/15501329221135516.

Downloads

Published

02.02.2024

How to Cite

Babu, G. N. ., Krishna, K. H. ., & Rao, K. V. . (2024). An Adaptive Secure Timestamp-Based Replay Attack Detection System For Wsns . International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 84–90. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4637

Issue

Section

Research Article

Most read articles by the same author(s)