A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks
DOI:
https://doi.org/10.13052/jcsm2245-1439.1244Keywords:
WSNs, trust and reputation management models, ATSR, ML, ANN, backpropagation algorithm, routing cost function (RCF), internal attacksAbstract
Wireless sensor networks (WSNs) are vulnerable to security attacks due to the unbounded nature of the wireless medium, restricted node resources, and cooperative routing. Standard cryptography and authentication mechanisms help protect against external attacks, but a compromised node can easily bypass them. This work aims to protect WSNs against internal attacks, which are mostly launched from compromised nodes to disrupt the network’s operation and/or reduce its performance. The trust and reputation management framework provides a routing cost function for selecting the best secure next hop. Tuning the trust weights is essential to cope with the constant changes in the network environment, such as the sensor nodes’ behaviours and locations. To allow real-time operation, the proposed framework introduces an artificial neural network (ANN) in each sensor node that automatically adjusts the weights of the considered trust metrics according to the WSN state. A large dataset is generated to train and test the ANN using a multitude of simulated cases. A prototype is developed and tested using the J-Sim simulator to show the performance gain resulting from applying the adaptive trust model. The experimental results showed that the adaptive model has robust performance and has achieved an improved packet delivery ratio with reduced power consumption and reduced average packet loss. The results showed that when sensor nodes were static and malicious nodes were present, the average accuracy was 99.6%, while when they were in motion, it was 88.1%.
Downloads
References
C. D. McDermott and A. Petrovski, ‘Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks’, international journal of computer networks and communications, vol. 9, no. 4, 2017.
Z. Ye, T. Wen, Z. Liu, X. Song, and C. Fu, ‘An efficient dynamic trust evaluation model for wireless sensor networks’, In Sensors, vol. 2017, 2017.
H. Sharma, A. Haque, and F. Blaabjerg, ‘Machine learning in wireless sensor networks for smart cities: a survey’, Electronics (Basel), vol. 10, no. 9, p. 1012, 2021.
W. Fang, W. Zhang, W. Chen, T. Pan, Y. Ni, and Y. Yang, ‘Trust-based attack and defense in wireless sensor networks: a survey’, Wireless Communications and Mobile Computing, vol. 2020, 2020.
C. R. Morales, F. Rangel de Sousa, V. Brusamarello, and N. C. Fernandes, ‘Evaluation of Deep Learning Methods in a Dual Prediction Scheme to Reduce Transmission Data in a WSN’, Sensors, vol. 21, no. 21, p. 7375, 2021.
Y. Sun, M. Peng, Y. Zhou, Y. Huang, and S. Mao, ‘ Application of machine learning in wireless networks: Key techniques and open issues’, Proc. In IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp., 2019.
YG. Bhatti, ‘ Machine learning based localization in large-scale wireless sensor networks’, Sensors, vol. 18, no. 12, p. 4179, 2018.
F. Sanhaji, H. Satori, and K. Satori, ‘Clustering Based on Neural Networks in Wireless Sensor Networks’, in: Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, pp. 1–6, 2017.
P. Hankare, S. Babar, P. Mahalle, ‘Trust management approach for detection of malicious devices in siot’, ISSN 1846-6168 (Print), ISSN 1848-5588 (Online) Original scientific paper https://doi.org/10.31803/tg-20210204180217, vol. 15, no. 1, pp. 43–50, 2021.
Vasily A. Desnitsky, Igor V. Kotenko, Igor B. Parashchuk,’Neural Network Based Classification of Attacks on Wireless Sensor Networks’, IEEE, 2020.
A. Beheshtiasl and A. Ghaffari, ‘Secure and trust-aware routing scheme in wireless sensor networks’, in Wireless Personal Communications, vol. 107, no. 4, pp. 1799–1814, 2019.
J. Wang, X. Jing, Z. Yan, Y. Fu, W. Pedrycz, and L. T. Yang, ‘A survey on trust evaluation based on machine learning’, ACM Computing Surveys (CSUR), vol. 53, no. 5, pp. 1–36, 2020.
H. Rathore, ‘Case study: A review of security challenges, attacks and trust and reputation models in wireless sensor networks’, in Mapping Biological Systems to Network Systems, pp. 117–175, 2016.
F. Ishmanov and Y. bin Zikria, ‘Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues’, in Journal of Sensors, vol. 2017.
H. Deng, X. Sun, B. Wang, and Y. Cao, ‘Selective forwarding attack detection using watermark in WSNs’, ISECS International Colloquium on Computing, Communication, Control, and Management, vol. 3, pp. 109–113, 2009.
Y. Cho and G. Qu, ‘Detection and prevention of selective forwarding-based denial-of-service attacks in WSNs’, in: International Journal of Distributed Sensor Networks, vol. 9, no. 8, p. 205920, 2013.
H. Alzaid, M. Alfaraj, S. Ries, A. Jøsang, M. Albabtain, and A. Abuhaimed, ‘Reputation-based trust systems for wireless sensor networks: A comprehensive review’, in IFIP International Conference on Trust Management, pp. 66–82, 2013.
C.B. Vinutha, N. Nalini and B.S. Veeresh, ‘Energy Efficient Wireless Sensor Network Using Neural Network Based Smart Sampling and Reliable Routing Protocol’, IEEE WiSPNET conference, 2017.
A. Akbas, H. U. Yildiz, A. M. Ozbayoglu, and B. Tavli, ‘Neural network based instant parameter prediction for wireless sensor network optimization models’, in Wireless Networks, vol. 25, no. 6, pp. 3405–3418, 2019.
B. Jaint, V. Singh, L. K. Tanwar, S. Indu, and N. Pandey, ‘An efficient weighted trust method for malicious node detection in clustered wireless sensor networks’, in 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), pp. 1183–1187, 2018.
Bassam Hasan, Sameer Alani, Mohammed Ayad Saad, ‘Secured node detection technique based on artificial neural network for wireless sensor network’, International Journal of Electrical and Computer Engineering (IJECE), February 2021.
F. Ishmanov, S. W. Kim, and S. Y. Nam, ‘A robust trust establishment scheme for wireless sensor networks’, in Sensors, vol. 15, no. 3, pp. 7040–7061, 2015.
F. Ghasemi, ‘Secure Geographic Routing in Wireless Sensor Networks’, Master of Science University of Gothenburg, Gothenberg, Sweden, 2013.
B. Karp and H.-T. Kung, ‘GPSR: Greedy perimeter stateless routing for wireless networks’, in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243–254, 2000.
T. Zahariadis, H. C. Leligou, S. Voliotis, S. Maniatis, P. Trakadas, and P. Karkazis, ‘Energy-aware secure routing for large wireless sensor networks’, WSEAS Transactions on Communications, vol. 8, no. 9, pp. 981–991, 2009.
T. Zahariadis et al, ‘Design and implementation of a trust-aware routing protocol for large WSNs’, in: International Journal of Network Security & Its Applications (IJNSA), vol. 2, no. 3, pp. 52–68, 2010.
H.-C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, ‘Combining trust with location information for routing in wireless sensor networks’, Wireless Communications and Mobile Computing, vol. 12, no. 12, pp. 1091–1103, 2012.
T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, ‘A novel trust-aware geographical routing scheme for wireless sensor networks’, Wirel Pers Commun, vol. 69, no. 2, pp. 805–826, 2013.
Theodore Zahariadis, Helen C. Leligou, Panagiotis Trakadas, Stamatis Voliotis, ‘Mobile Networks Trust management in wireless sensor networks’, Wiley InterScience, Published online 8 April 2010.
T. Zahariadis, P. Trakadas, S. Maniatis, P. Karkazis, H. C. Leligou, and S. Voliotis, ‘Efficient detection of routing attacks in wireless sensor networks’, in 2009 16th International Conference on Systems, Signals and Image Processing, pp. 1–4, 2009.
S. Voliotis, T. Zahariadis, H. C. Leligou, D. Bargiotas, P. Trakadas, and P. Karkazis, ‘A Scalable Geographical Routing approach for Wireless Sensor Networks’, IWSSIP, 2010.
P. Trakadas, S. Maniatis, P. Karkazis, T. Zahariadis, H.-C. Leligou, and S. Voliotis, ‘A novel flexible trust management system for heterogeneous wireless sensor networks’, in 2009 International Symposium on Autonomous Decentralized Systems, pp.1–6, 2009.
Y. Stelios, N. Papayanoulas, P. Trakadas, S. Maniatis, H. C. Leligou, and T. Zahariadis, ‘A distributed energy-aware trust management system for secure routing in wireless sensor networks’, International Conference on Mobile Lightweight Wireless Systems, pp. 85–92, 2009.
T. Zahariadis, H. Leligou, P. Karkazis, and P. Trakadas, ‘Energy efficiency and implementation cost of trust-aware routing solutions in WSNs’, in2010 14th Panhellenic Conference on Informatics, pp. 194–198, 2010.
M. García-Otero et al., ‘Secure geographic routing in ad hoc and wireless sensor networks’, inEURASIP Journal on Wireless Communications and Networking, vol. pp. 1–12, 2010.
H. C. Leligou et al., ‘The impact of indirect trust information exchange on network performance and energy consumption in wireless sensor networks’, in Proceedings ELMAR-2011, pp. 153–156, 2011.
A. Yasin and K. Sabaneh, ‘Enhancing Wireless Sensor Network Security using Artificial Neural Network based Trust Model’, Int. J. Adv. Comput. Sci. Appl, vol. 7, no. 9, pp. 222–228, 2016.
Fuad A. Ghaleb, Anazida, Zainal, Murad, A. Rassam, and Fathey Mohammed, ‘An Effective Misbehavior Detection Model using Artificial Neural Network for Vehicular Ad hoc Network Applications’, IEEE Conference on Application, Information and Network Security (AINS), 2017.
Farah Sanhaji, Hassan Satori, Khalis Satori, ‘Cluster Head Selection based on Neural Networks in Wireless Sensor Networks’ 978-1-5386-7850-3/19/$31.00, IEEE, 2019.
Y. Trofimova, A. M. Moucha, and P. Tvrdik, ‘Application of neural networks for decision making and evaluation of trust in ad-hoc networks’, in 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), ‘pp. 371–377, 2017.
R. Azmi, M. Hakimi, and Z. Bahmani, ‘Dynamic reputation based trust management using neural network approach’, in International Journal of Computer Science Issues (IJCSI), vol. 8, no. 5, p. 161, 2011.
J. Krenek, K. Kuca, O. Krejcar, P. Maresova, V. Sobeslav, and P. Blazek, ‘Artificial neural network tools for computerised data modeling and processing’, in 2014 IEEE 15th International Symposium on Computational Intelligence and Informatics (CINTI), pp. 255–260, 2014.
G. Mahalakshmi, E. Uma, M. Vinitha, and M. Aroosiya, “VANET: Trust Evaluation Using Artificial Neural Network”, in Advances in Parallel Computing Technologies and Applications, IOS Press, pp. 9–17, 2021.
D. P. Kumar, T. Amgoth, and C. S. R. Annavarapu, ‘Machine learning algorithms for wireless sensor networks: A survey’, Information Fusion, vol. 49, pp.1–25, 2019.
H. Kaur and S. Sahore, ‘A survey on wireless sensor network (wsn) security using AI methods’, Int. J. Latest Trends Eng. Technol, vol. 7, no. 4, pp. 234–239, 2016.
M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, ‘Machine learning in wireless sensor networks: Algorithms, strategies, and applications’, in IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996–2018, 2015.
G. M. Jinarajadasa and S. R. Liyange, ‘A survey on applying machine learning to enhance trust in mobile adhoc networks’, in 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE), pp. 195–201, 2020.
Yi Zhao, ‘Combination of Wireless sensor network and artificial neural network: A new approach of Modeling’, in 2013.
A. F. Gad, A. F. Gad, and S. John, ‘Practical computer vision applications using deep learning with CNNs’, Springer, 2018.
A. F. Gad and F. E. Jarmouni, ‘Introduction to Deep Learning and Neural Networks with PythonTM: A Practical Guide’, Academic Press, 2020.
R. v Kulkarni and G. K. Venayagamoorthy, ‘Neural network based secure media access control protocol for wireless sensor networks’, in 2009 international joint conference on neural networks, pp. 1680–1687, 2009.
B. Rajasekaran and C. Arun, ‘Detection of malicious nodes in wireless sensor networks based on features using neural network computing approach’, International Journal of Recent Technology and Engineering, vol. 7, no.4, pp. 188–192, 2018.
A. Sobeih et al., ‘J-sim: A simulation environment for wireless sensor networks’, in 38th Annual Simulation Symposium, pp. 175–187, 2005.
Y. G. G. H. C. H. H. K. L. K. N. L. H. L. A. S. H. T. H. Z. R. Zheng. Wei-peng Chen, ‘https://sites.google.com/site/jsimofficial/’, 2013.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Cyber Security and Mobility
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.