An Adaptive Secure Timestamp-Based Replay Attack Detection System For Wsns
Keywords:
Data integrity, Message Authentication, Replay attack, Timestamp, WSNAbstract
Wireless Sensor Networks (WSNs) are essential in many fields because they enable real-time data gathering and transmission possible for a wide range of applications. Replay attacks pose significant risks to the integrity and dependability of WSNs, which have become increasingly important due to growing dependence on them. In order to successfully reduce replay attacks in WSNs, this investigation suggests the Adaptive Secure Timestamp-Based Replay Attack Detection System (AST-RADS). Combining cryptographic methods, AST-RADS offers a multi-layered defense system. To guarantee data confidentiality and integrity during transmission, the model uses secure timestamp-based authentication, encryption, and a hierarchical key management system. Additionally, the suggested model is created with minimal overhead, making it appropriate for WSN situations with limited resources. Extensive simulations and experiments validate the efficacy and efficiency of AST-RADS compared to existing solutions, demonstrating its superiority in detecting and preventing replay attacks.
Downloads
References
M. Tropea, M. G. Spina, F. De Rango, and A. F. Gentile, “Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer,” Future Internet, vol. 14, no. 5, p. 145, May 2022, doi: 10.3390/fi14050145.
M. A. Al-Shareeda, S. Manickam, S. A. Laghari, and A. Jaisan, “Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications,” Sustainability, vol. 14, no. 23, p. 15900, Nov. 2022, doi: 10.3390/su142315900.
S. Ismail, D. W. Dawoud, and H. Reza, “Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review,” Future Internet, vol. 15, no. 6, p. 200, May 2023, doi: 10.3390/fi15060200.
Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang, "Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey", Wireless Communications and Mobile Computing, vol. 2020, Article ID 2643546, 20 pages, 2020, https://doi.org/10.1155/2020/2643546
Guang Yang,Lie Die,Zhiqiang Wei, “Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks,” Sensors (Basel, Switzerland) vol. 18,11 3907. 13 Nov. 2018, doi:10.3390/s18113907.
S.G. Hymlin Rose, T. Jayasree,” Detection of jamming attack using timestamp for WSN,”Ad Hoc Networks, Volume 91,2019,101874,
https://doi.org/10.1016/j.adhoc.2019.101874.
Gautam, A.K., Kumar, R.,”A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks,” SN Appl. Sci. 3, 50 (2021), https://doi.org/10.1007/s42452-020-04089-9
X. Huan, K. S. Kim, S. Lee, E. G. Lim and A. Marshall, "Improving Multi-Hop Time Synchronization Performance in Wireless Sensor Networks Based on Packet-Relaying Gateways With Per-Hop Delay Compensation," in IEEE Transactions on Communications, vol. 69, no. 9, pp. 6093-6105, Sept. 2021, doi: 10.1109/TCOMM.2021.3092038.
Huang Y, Zhang G, Kong M, He F. New timestamp mark–based energy efficient time synchronization method for wireless sensor networks. International Journal of Distributed Sensor Networks. 2022;18(11). doi:10.1177/15501329221135516.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.