You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

21 August 2020

A Security Concept Based on Scaler Distribution of a Novel Intrusion Detection Device for Wireless Sensor Networks in a Smart Environment

,
,
and
1
College of Computer and Information Engineering, Hohai University, Nanjing 211100, China
2
College of Hydrology and Water Resources, Hohai University, Nanjing 210098, China
3
Binjiang College, Nanjing University of Information Science & Technology, No. 333 Xishan Road, Wuxi 214105, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Security and Privacy in Wireless Sensor Network

Abstract

Following the significant improvement of technology in terms of data collection and treatment during the last decades, the notion of a smart environment has widely taken an important pedestal in the science industry. Built in order to better manage assets, smart environments provide a livable environment for users or citizens through the deployment of sensors responsible for data collection. Much research has been done to provide security to the involved data, which are extremely sensitive. However, due to the small size and the memory constraint of the sensors, many of these works are difficult to implement. In this paper, a different concept for wireless sensor security in smart environments is presented. The proposed security system, which is based on the scaler distribution of a novel electronic device, the intrusion detection system (IDS), reduces the computational functions of the sensors and therefore maximizes their efficiency. The IDS also introduces the concept of the feedback signal and “trust table” used to trigger the detection and isolation mechanism in case of attacks. Generally, it ensures the whole network security through cooperation with other IDSs and, therefore, eliminates the problem of security holes that may occur while adopting such a security technique.

1. Introduction

Scientific expertise today seems to be greatly focused on the security of wireless sensor networks (WSNs) and their performance. A WSN is a mobile ad-hoc network that is exposed to many threats. From the improvement of the technical system embedded in the sensors to the development of security techniques to offset the numerous attacks that these networks can face, nothing is left behind in the research into wireless sensor networks.
The various research carried out at great cost by researchers, institutions, academies, and even universities, confirms this impression: security performance has become the subject of the deployment of scientific ingenuity. Confidentiality of the data collected by the sensors, availability, integrity, or even intrusion detection, are the various essential security expectations to be met. To meet these requirements, several experts place particular emphasis on the use of encryption techniques for data protection (see works proposed by Zhang et al. [1], Gover et al. [2], Krontiris [3], Kumar et al. [4], Perrig et al. [5], Wang et al. [6], Zhu et al. [7], Girao et al. [8] and also Raj et al. [9]). These techniques are generally based on the utilization of keys for data encryption and decryption. Other experts going further have opted for the development of certain algorithms used by these sensors to identify malicious behavior within networks. Studies were done by Patil et al. [10], Singh et al. [11], Sonu et al. [12] and Jamshidi et al. [13], who presented techniques that address specific attacks like DoS (denial of service) attack, wormhole attack, sinkhole attack, and Sybil attack, respectively. These encryption techniques and algorithms suggested by the previous studies are implemented into the sensors themselves.
With the rise of the Internet of things (IoT) notion and the need to have access to collected data in a smart way, the concept of a cloud platform has also been rapidly gaining popularity in smart environments. The feature of a cloud platform is that any user can have access to the information in real time or later on. In order to prevent from data leaking during the communication, Wazid et al. [14] have presented a new lightweight authentication mechanism in cloud-based IoT environments. The mechanism suggests a joint authentication between the user and the sensor. The joint authentication allows the two devices to create a session key which will be used for any other communication. Also called LAM-CIoT (lightweight authentication mechanism in cloud-based IoT environment), the peculiarity of the proposed security relies on the fact that any user can have access to the data from the cloud server where the data are stored or directly from the sensor. The security part is performed with the help of a trust authority which is in charge of the network components registration.
This idea is also presented by Challa et al. [15], who introduced a novel authenticated key agreement scheme for cloud-assisted environments, especially for smart grid environment. Based on a cloud-assisted Cyber-Physical-System, the mechanism ensures two authentication levels (between a user and a cloud server, between a smart meter and a cloud server, etc.).
To sum up, if these presented mechanisms can help in securing the connection between a user and a sensor, or a sensor and the cloud (with the utilization of deterministic key management schemes), a problem concerning the sensor energy efficiency still remains. In fact, the mechanisms suggest the creation of a session key based on computational skills, which requires more energy. Also, by maintaining the created session key at the sensor side for future communication with a specific user, the problem of memory availability will soon occur since in this particular network configuration, the sensor may communicate with several users. Therefore, the implementation of the techniques and methods proposed by these authors is hard to achieve and may affect the performance of the wireless sensor networks since the sensors are really tiny and do not enjoy a large memory size.
Furthermore, Saia et al. [16] reported on the use of a blockchain-based distributed paradigm for data exchange between wireless-based devices, which they defined as Internet of Entities (IoE). The authors believed that this form of communication based on the decentralization model and a certification function offered by data exchange paradigms such as cryptocurrency could be useful in applications in Security, eHealth, and Smart Cities, where the trackers, which are the wireless devices, and in this case sensors, connect with entities which are people or things through a blockchain ledger to ensure the anonymity of communication and therefore, preserve data availability and freshness. However, data confidentiality, integrity, and authenticity could be compromised when this blockchain ledger becomes compromised.
Some other studies have suggested the use of intrusion detection systems (IDS), a security scheme which aims at detecting anomalies and attacks (actions that seek to jeopardize the system security factors) in wireless sensor networks. For example, Alrajeh et al. [17] in a review of intrusion detection systems for wireless sensor networks reported that generally, the IDS can only detect attacks but cannot prevent or respond; instead, it alerts network administrators about possible attacks well in time to stop or reduce the impact of the attack. This solely alerting mechanism of most IDS schemes as discussed by the authors could become problematic in cases where the sensors are deployed in hard to reach areas and the kind of threat requires the network administrator to physically check out the system for threat isolation.
Reviews of different intrusion detection schemes based on machine learning reported in the literature by da Costa et al. [18] reveal that the attacks on wireless sensor networks and IoT devices keep increasing and evolving, making security in these aspects a challenge. However, computer scientists worldwide are also progressing in the detection of these intrusion attacks and formulating various mechanisms (intrusion detection techniques) to identify them, although most of these mechanisms are specific-attack-based and usually involve time-, energy-, and memory-consuming processes in their intrusion detection processes.
Furthermore, Godala and Vaddella [19] in a recent study reported that IDS techinques in current literature comprised of: signature-based IDS, anomaly-based IDS, specification-based IDS, and Hhybrid-based IDS. Whereas the signature-based IDS mechanisms are used for known threats, the anomaly-based IDS techniques aim to identify unknown attacks by employing statistical, data mining, machine learning, and artificial intelligence approaches, among others, while the specification-based IDS schemes detect both known and unknown attacks and the hybrid-based IDS methods apply several combinations of the other techniques for intrusion detection. Their study revealed that the majority of the wireless security mechanisms based on the various IDS approaches focus only on specific types of attacks centered on specific layers of the WSN, without much consideration on other layer attacks, and also need more time and memory for implementation because of the techniques adopted for these intrusion detection schemes.
Considering these facts, this study, therefore, introduces a novel intrusion detection system (IDS), which is a device capable of ensuring a perfect security scheme for wireless sensor networks inside a smart environment. The device, which is also a sensor with much more energy power and memory space, assumes the computational functions meant for the sensors in the network and embraces the security aspect of the network by filtering all incoming and outgoing communication. Embedded with a sniffing program, the IDS makes use of a “trust table” which is created during the initialization of the wireless sensor network to maintain a certain trust level in the deployed environment by separating the genuine and malicious sensors, and therefore equips the intrusion detection device (IDS) with the ability to analyze all the sensor network traffic patterns. The advantage of such a device is that, regardless of the nature of the attack, the security is still guaranteed since the device makes use of its previously saved sensor data to estimate whether or not the new captured events in the network are genuine. We also suggest the deployment of several of the proposed IDSs (scaler distribution) working jointly to ensure the entire network security of the smart environment. That is, the IDS participates in the transmission while the data is being sent from one sensor area to another by making use of some cryptographic encryption techniques. This also allows the IDS to eliminate the dead zones, referred to as security holes, in the smart environment.

Motivation and Novelty

The proliferation of wireless sensor networks (WSNs) in human livelihood is expected to increase due to the active developments in technology and widespread application of the Internet of Things paradigm in computer networks across the world [18]. Attacks on WSNs are inevitable due to this interconnectivity and therefore, network security has become a present-day challenge. However, destruction and loss of information can be prevented and/or greatly minimized with the appropriate wireless sensor network security scheme.
Godala and Vaddella [19], after reviewing several different current IDS security techniques, recommended the development of a cross-layer IDS that can detect the different attacks, of which may occur in different layers of the WSN. This is the innovation which this study brings across, where the IDS proposed in this study performed a hybrid-based intrusion detection system on all layers because it is a novel device equipped with sufficient memory, energy, and security to perform attack detection and isolation simultaneously on sensors, as well as the data being processed and transmitted.
Neisse et al. [20] also offered a model for intrusion detection based on a system of trust relationships to govern the communications among devices in IoT-based environments. In our study, we go further in securing this trust relationship through a sensor trust table in the IDS device to prevent the sensors from having to save their multiple interconnection relationships in their already insufficient memory space.
Finally, to the best of our knowledge, no study has suggested the use of an intrusion detection system which does not involve computation by the wireless sensors themselves in the detection process. The studies reviewed depend on the sensors actually performing the attack detection work before forwarding to the next level in the network or the base station.
Also, the reviewed works do not involve automatic isolation of threats in the wireless network but depend on the isolation from the base station when threats or attacks which disrupt the network functions are detected, which in cases of eavesdropping, the attack message might not get to the base station on time for timely attack isolation, causing much more loss of information in the wireless sensor network deployment area. Our work involves automatic isolation of threats before further investigation by the base station administrator, for better data protection.

3. The Newly Proposed Intrusion Detection Device (IDS)

3.1. The IDS Model

The new proposed intrusion detection system (IDS) is an electronic device capable of ensuring a perfect security scheme for wireless sensor networks inside a smart environment. The IDS architecture is centered on three (3) functional modules: an energy module, a detection module, and a communication module. The device supports the IEEE (Institute of Electrical and Electronics Engineers) 802.15.4 protocol and is also equipped with a Random-Access-Memory (RAM) and a Read-Only-Memory (ROM) for data and programs’ storage. The modules are interconnected using an advanced microcontroller bus architecture (AMBA). The AMBA is a commonly used standard to interconnect the System on Chip (SoC) design [48]. A general overview of the IDS is presented in Figure 3.
Figure 3. The intrusion detection system (IDS) architecture overview.
The energy module empowers the device with sufficient energy, while the detection module ensures the network monitoring and the execution of the detection and the isolation process. On the other hand, the communication module is responsible for wireless communication functions. It broadcasts all the necessary instructions, especially during the transmission of the feedback signal. The communication module also includes a MAC (Medium Access Control) and physical layer.
To guarantee an efficient power system to the module, the battery is empowered by a solar power system. The solar power system will allow the system to be functional at all times and enjoy a longer life period. This will be useful in cases where the device has to be deployed in a hostile environment where human access would be difficult.
The major role of the IDS is to take over all the computational functions of the sensors since the sensor energy resource and memory size is a big challenge. It is embedded with a sniffer program to analyze the entire sensor network environment activities and report all malicious behavior in the network. From route requesting, route establishment, message transmission, and message reception to network configuration, the device captures, without modifying, all the flowing data over the sensor network. This is done based on the watchdog approach that allows the device to overhear all ongoing communication inside the network. The IDS works according to all the network protocols deployed in the sensor network. All the sniffed information is processed and stored in the device. The sniffer program works along with other programs which compare the sniffed data to the one that was previously stored in the IDS memory. Based on the comparison results, a decision is made by the IDS (whether the network is secure or not).
The IDS introduces the concept of the “trust table” (TT), which is composed of two tables: the genuine sensor table (GST) and the blacklisted sensor table (BST). Each table is composed of node identification, geographic location, and, if possible, the serial number of the sensor. The GST is important as it allows the IDS to confirm whether or not a sensor can be treated as a threat. The TT is a database made up of: the number of sensors (NS), displaying the total number of sensors in a sensor area, the number of backlisted sensors (NBS), and the ID, which is the device identification in the network. The TT, like the other programs, is created or installed during the sensors network initialization or deployment.

3.2. The IDS Performance against Attacks

Providing a good security scheme for the WSNs should be the priority of network administrators, especially since different hacking techniques are being developed and used by malicious people to retrieve sensitive data. Our proposed new intrusion detection device has superior authority over all sensors and data inside the network.
Another important role of the IDS is to broadcast the feedback signal (F.S). The feedback signal is a broadcast message which is sent to all the genuine sensors in the network to activate threat isolation in cases of attacks. The feedback signal is an alert that is sent to the sensors with specific instruction. The packet frame mainly contains data which includes necessary information about the threat. Figure 4 presents some of the information that is in the F.S.
Figure 4. Malicious sensor information sent in the feedback signal (F.S).
In computer networks, each device is set to have unique identification (ID). This ID is used to identify the device inside any network. The intrusion detection system, IDS, after detecting the intruder or the sensor acting maliciously, includes its ID into the F.S. The location refers to the position of the malicious sensor inside the network. All the other sensors avoid this position while a new route or path is being calculated for data redirecting. The type refers to the nature of the attack or threat. The role of the IDS in a sensor network during transmission is given in Figure 5.
Figure 5. Proposed scaler distribution of IDSs in a smart environment.
As presented in Figure 5, every sensor requesting for a route or data transmission is considered suspect unless the IDS provides formal approval about its identity and “innocence” inside the network. The efficiency against this kind of attack is proven, especially when an attacker creates an illusion to the sensor transmitting the data that the selected path is the shortest path for data transmission to the sink node. The detection and isolation mechanism presented in Figure 5 is implemented as follows:
START
 S1: Sensor_1
 SS: Suspected_Sensor
 SSid: Suspected_Sensor_ID
 TT: Trust_Table
 BL: Blacklisted_List
 FS: Feedback_Signal_for_isolation
 r: SS_request
 CTS: Clear_to_Send_message
 S: All_Sensors_in_the_network

  If SS sends r to S1 then // Intruder asks sensor_1 to share information with it
  Get SSid; // The IDS acknowledges the suspected sensors identity

  If SSid ∈ TT then // IDS determining if the suspected node is in the trust table
  Deliver CTS to S1; // IDS delivering a clear to send signal to sensor_1
  Else
  Deliver FS to S; // IDS delivering feedback signal to all the sensors, including Sensor_1
  Store SSid in BL; // IDS storing the suspected sensors ID in the backlisted list
  End if
  End if
 End if
END
Our proposed security system is also able to detect and isolate any previous genuine sensor that later turned rogue inside the network. The cause of a sensor turning rogue could be due to the occurrence of some internal failure. One of the well-known behaviors of such a threat is that the involved sensor could start dropping the received packets. This could have a severe impact on the sensor network as it leads to data loss or energy drainage for both the transmitting node and the rogue sensor. In this kind of situation, the involved detection and isolation steps when packets are being dropped in the network are presented below:
START
 S1: Sensor_1
 RS: Rogue_Sensor
 RSid: Rogue_Sensor_ID
 TT: Trust_Table
 P: Packets
 BL: Blacklisted_List
 FS: Feedback_Signal_for_isolation
 r: SS_request
 S: All_Sensors_in_the_network

  If RS drops P then // rogue sensor starts dropping packets sent by Sensor_1
  Alert S1; // alert sensor_1 to search for new route
  Deliver FS to S; // IDS delivering feedback signal to all the sensors, including Sensor_1
  Store RSid in BL; // IDS storing the suspected sensors ID in the backlisted list
  End if
END
Every IDS periodically conducts a check-up of the sensor network. This enables the IDS to ensure the accuracy of previously stored information to make sure nothing has been changed, just like a sensor updating process. The IDS starts by getting access to the “trust table.” Basically, the system verifies if the number of the previously stored sensors, NS, is still the same compared to the new updated number. This is done by just comparing two values. Considering NS, the value of the stored number of sensors, and NS’, the updated value of the stored number of sensors at the present time, Ta. If the values are the same (NS = NSTa) then the IDS concludes that there were no new malicious entries. On the other hand, if NSNS’, then the IDS concludes that there have been sensor entries into the network. Therefore, the intruder is located, and its information is saved in the device memory in the list of blacklisted sensors and broadcasted to the other sensors of the network through the feedback signal (F.S). The sensors, upon receiving the message, proceed to the isolation of the blacklisted sensor by avoiding communication with it in the future. If D is the intrusion detection process of an IDS, the detection process can be presented as:
D = { s a f e   i f   N S   = N S T a u n s a f e   i f   N S   N S T a  
The steps of the algorithm are presented below:
START

i: int
k: int
n: int
 SA: Sensor_Area
 NS’: Number_of_Sensor_at_time _a
 NS: Number_of_Sensor_in the_network_initially
 TT: Trust_Table
 IS: Intruder_Sensor
 ISid: Intruder_sensor_ID
 BL: Blacklisted_List
 FS: Feedback_Signal_for_isolation
 S: All_Sensors_in_the_network

 k = 0
 For i → 0 to n
 i = i + 1
 k = k + 1
  If k = NS then // IDS comparing the number of sensors NS’ in the sensor area at present to
  the one in TT
  Conclude SA is safe;
  Else
  Locate IS;
  Get ISid;
  Broadcast F.S to S; // IDS Broadcasting an F.S which contains the intruder sensors ID and
  location
  Store ISid in BL; // IDS storing the Intruder_Sensor ID in the backlisted list
  End if
End if
END

3.3. Scaler Distribution of the IDS and the Cooperation

To increase its performance efficiency, several sensors are allocated to a particular IDS. By doing so, the IDS can build a virtual fence around the sensors under its authority, and all incoming and outgoing transmissions are filtered. An overview of the IDS building a virtual fence around the sensor area is presented in Figure 6.
Figure 6. The intrusion detection device building a virtual fence around the sensor area.
Figure 6 shows a sensor area (SA) composed of ten (10) sensors. The IDS monitors these sensors. To be able to manage a given number of sensors, the IDS is set to have a communication module capable of covering a wide communication range. This enables the IDS to ensure its monitoring functions and to protect the network from attacks.
A smart environment may contain thousands of sensors. We therefore propose the implementation and use of several distributed IDSs in the smart environment. The IDSs are to cooperate in a perfect symphony. This cooperation will still guarantee the security of the data while being transmitted from cell to cell.
Figure 7 shows a smart environment that includes several sensors distributed into various sensor areas. Also called cells, a specific IDS manages each sensor area. The IDSs are also involved in inter-cells data transmission, where they ensure the authenticity of the incoming and outgoing data from their respective cells to the other cells in the smart environment.
Figure 7. Proposed scaler distribution of IDSs in a smart environment.
Between each IDS deployed sensor area exists some unattended to gaps, referred to as dead zones in this study. Figure 8 gives an illustration of the dead zones.
Figure 8. Dead zones in the distribution of IDSs in a smart environment.
As presented in Figure 8, the dead zones are the ones that are not covered by any IDS. The presence of the dead zones might be a vulnerability to the network, thus leading to a security hole. A malicious person can also try to intercept or alter the data while it is passing through this hole, thereby disrupting the security of the entire smart environment. To guarantee the security of transmitted data while it is in a dead zone, each IDS encrypts the data before forwarding from its sensor area to another sensor area.
Therefore, the first step of the entire proposed security system occurs at the beginning of the deployment of the network. In fact, during the initialization, each IDS receives many sensors under its authority. The trust table is then created, and all the sensors’ information is saved inside the IDS. The IDSs also acknowledge the sensor gate identity. The sensor gate (the nearest sensor to the IDS) is the last sensor in the data routing process. During the initialization, each IDS is also loaded with some keys based on the cryptography techniques. The IDSs are loaded with essential elements that will be used during their entire existence. An example of an IDSs key elements for IDS1 is illustrated by:
I D S 1 = { ( P r 1 ,   P k 2 ,   ,   P k n ) }
where Pr1 is the IDS1 private key used for data decryption, Pk2 is the IDS2 public key used for data encryption, and Pkn is used by IDS1 to encrypt data sent to IDSn.
The keys are generated based on mathematical principles by randomly selecting two prime numbers p and q, and an odd number e, which is coprime to φ (n), such that [49]:
1 < e < φ ( n )
After the number n = p . q the number d = e 1 m o d ( φ ( n ) ) is also computed using Euclid’s algorithm. In this case, (n, e) is the public key while (n, d) is the private key. An illustration of the private and public key definitions is given in Figure 9.
Figure 9. Public and private key mathematical definition.
After the generation of the keys, the private one is kept secret by the transmitting IDS while the public one is broadcasted into the network.
Considering a message, M, to be transmitted to a user, A, such that:   0 M n A , the encrypted message also called ciphertext, C, is obtained through:
C = E A ( M ) = m o d   n A   M e A
where E represents the encryption algorithm and (nA, eA) is the user, A, public key.
Figure 10 demonstrates the cooperation between two (2) IDSs, IDS1 and IDS2, in the scaler distribution process of IDS deployment in a smart environment to ensure the perfect security scheme, where M is the transmitted data, SA1 is sensor area 1, SA2 is sensor area 2, Pr1 and Pk1 represent IDS1 private and public keys respectively, Pr2 and Pk2 are IDS2 private and public keys respectively, α(1,2) is the cooperation mechanism between IDS1 and IDS2 in providing a perfect security scheme during the data transmission, and γ1 is the transmission channel used by IDS1 to transmit the encrypted message, EM.
Figure 10. A cooperation mechanism between two IDSs.
Considering the demonstration in Figure 10, we assume that sensor 1, which is located in sensor area 1 (SA1), is transmitting data to the sink node (base station) located in sensor area 2 (SA2). Both of the IDSs participate in the intrusion detection process and ensure the success of the message forwarding until it reaches the sink node or base station.
The general equation of the cooperation mechanism between IDS1 and IDS2 and with n number of IDSs can be demonstrated as:
α ( 1 , 2 ) = { Y   i f   ( I D S ( 1 , 2 ) E M · γ )   i s   T R U E N   i f   ( I D S ( 1 , 2 ) E M · γ )   i s   F A L S E
where γ is the transfer channel between IDS1 and IDS2. Therefore, if IDS2 is able to decrypt the data sent by IDS1, then the cooperation is successful, otherwise, the cooperation has failed, and the data is not transmitted.
As shown in Figure 10, IDS1 and IDS2 are responsible (locally) for the message transmission and the detection of any entry attempt in their respective sensor areas. The sensor gate in sensor area 1 is sensor 4 (S4), while the sensor 5 is the sensor gate in sensor area 2 (SA2). The sensor gate is the last sensor in the routing chain to transfer the data to the IDS. The selection of the sensor gate is not predetermined and depends on the transmission route whenever a transmission is to be engaged. In this scenario, sensor S1 starts transmission after the route has been established in a multi-hop communication manner. This means that the data is transferred from sensor to sensor until it reaches the sensor gate, which also relays it to IDS1. Once IDS1 receives the data, it will then encrypt the data using the public key (PK2) shared by the IDS2 during the initialization period. The encrypted message, EM, is now forwarded to IDS2 through γ1. Once IDS2 receives the data, it will go ahead and decrypt the message to be sent to sensor 5 (S5), which is the sensor gate in sensor area 2. The data or message is now transferred to the sink node or BS following the routes S6, S7, and BS, as viewed in Figure 10.
Figure 11 shows the expanded schematic layout of the cooperation between IDSs in two sensor areas in a smart environment, as revealed in Figure 10. Figure 11 further expatiates the message transfer process (which is done by multi-hop communication techniques) from sensor area 1 (SA1) through IDS1 whiles it filters the data from its sensor area using a method based on the watchdog or sniffing method, and the functions of IDS1 and IDS2 by working together through encryption algorithms to overcome the dead zones between their respective sensor areas before the data is transmitted to the base station in sensor area 2 (SA2), with IDS2 also locally ensuring that the data received in its sensor area is authentic.
Figure 11. Schematic layout of the intercommunication between sensor areas with scaler IDS deployment.
All IDSs present in a smart environment are equipped to intercommunicate to enable smooth and secure data processing and transmission in the whole region. This intercommunication is represented in Figure 12, showing an overview of a cluster hierarchy of communication between three (3) IDSs deployed in a smart environment. An IDS device does not only supervise the sensors in its sensor area but also affirms the security of the other IDSs in communication with it in the process of their joint cooperation mechanism through the novel developed cryptographic encryption algorithms.
Figure 12. An overview of the IDS intercommunication hierarchy in a smart environment.

3.4. Advantages of the Newly Proposed Intrusion Detection Device

The reliability of a security technique or method strongly depends on the conditions set for balanced and integrated security in general.
The advantages of the intrusion detection device compared to the other existing works are depicted in Table 1.
Table 1. The IDS advantages based on some security conditions.
As indicated in Table 1, the reliability of a security technique or method strongly depends on the conditions set for general security. However, the list of these conditions has been expanded in this study to include other factors necessary to promote perfect security for both sensor networks and smart environments. Therefore, a proposed technique must be able to detect and isolate any intrusion, and it must provide a platform for the entire distributed network in a smart environment to be resilient to adapt, even in the event of an intrusion. By implementing all the computational functions, it must allow the sensors to benefit from a sufficient source of energy and memory capacity. Due to their diversity, the various works presented in the literature meet the different requirements in different ways, but not in a complete sense. When these techniques, in certain cases, meet safety conditions, they consume a lot of energy. The major problem is that some of the techniques only protect and/or guarantee the data that are forwarded between sensors. While some still manage to detect threats, their threat isolation remains problematic. Better still, the safety of smart environments remains a mystery for these proposed works, especially since they do not take into account the energy and the memory efficiency of the sensors. Some authors, such as Patil et al. [10], Singh et al. [11], Sonu et al. [12], Jamshidi et al. [13], Nadiammai and Hemalatha [43], and Almomani and Alenezi [42], presented techniques that address specific attacks. The downside to these techniques is that, in the event of different attacks, the entire network becomes extremely vulnerable. The immune system proposed by Patil et al. [10] is effective for the detection of danger signals capable of interfering with the signals transmitted in sensor networks. Still, such a system cannot preserve the integrity of all sensor networks that could be deployed over a large area (smart environment).
On the other hand, the novel intrusion detection device proposed in this study, by the concept of the virtual fence, ensures the integrity, the authenticity, the availability, the freshness, and the non-repudiation of the data because by sniffing the whole network and by filtering all the signals which are sent the outside network, the sensors can, therefore, ensure that all the messages received come from a reliable source. In other words, any sensor which receives a message or a route request knows that the latter has already been carefully checked by the detector (IDS) assigned to its zone. Therefore, all the messages transmitted are fresh and authentic. With this technique, the IDS solves the memory problem through the use of keys, as suggested by Zhang et al. [1], Gover et al. [2], Krontiris [3], Kumar et al. [4], Perrig et al. [5], Wang et al. [6], Zhu et al. [7], and Girao et al. [8]. In the same way, the IDS, by assuming all the computational functions of the whole network, allows the sensors to save their energy resources. Unlike the techniques presented in earlier existing works, the IDS allows total isolation of a threat in the event of detection. This detection and this isolation are only made possible by the introduction of the concept of the “trust table” and the feedback signal, which is a first in the field of security embedded in equipment other than the sensors, but acting as a sensor within the network. Finally, the table demonstrates that the IDS is capable of providing joint security for sensor networks and smart cities simultaneously, which is made possible by a spatial distribution of several IDSs in a smart city to prevent oversaturation of the computational functions of the IDSs and to ensure their effectiveness.

4. Conclusions

The rapid advancement of science over the past few decades in the field of telecommunications, and the pressing need for data collection, data processing, and data transmission, has led to new technology: wireless sensor networks (WSNs). A wireless sensor network, which is a set of interconnected sensors, is commonly used in several fields for data collecting, sharing, and forwarding. The rise of this new technology has brought a new touch in almost every domain. From weather forecasting, earthquake forecasting, mobile unit tracking, and agricultural forecasts, to border surveillance, WSNs tremendously aid humans in their daily lives. Examples include smart houses, smart parking, smart buildings, smart streets, and smart mobility, among others.
On the other hand, the sensitivity of the processed data or information by the sensors gives rise to attempts by malicious individuals who want to either intercept, damage, or corrupt this information. To provide better security schemes to WSNs, much work and research have been conducted. There are various existent methods that are widely accepted and used to provide security for wireless sensor networks. However, these works, which are mostly algorithms or cryptography-based in the sensors themselves, can affect the efficiency of the sensors and the entire network (in terms of energy consumption due to the micro sizes of the sensors).
In this paper, a different and novel approach has been proposed for providing a better security scheme for wireless sensor networks, especially in smart environments. The proposed security scheme, the intrusion detection system (IDS), is an electronic device with the characteristic of a sensor. This intrusion detection system computes the algorithms which are necessary for the detection and the isolation of any intruder or genuine node, which turns rogue in a WSN. The IDS generates a virtual fence around sensors by filtering all incoming and outgoing data transmission processes.
This isolation system is made possible by the implementation of a “trust table” (TT) system, which keeps records of all sensors in an IDSs’ sensor area used by the IDS to prove the authenticity of sensors and data transmission requests to prevent disruption of service. The isolation process of this novel system is further executed by the introduction of the Feedback Signal (F.S), an alert message broadcast about the malicious sensor, sent by the IDS to all genuine sensors in its sensor area to prevent future communication and message routing through the corrupted sensor.
The IDS also actively participates in the data transmission across sensor areas based on cooperation with other deployed or distributed IDSs over a large geographic environment by equipping the deployed IDS with the ability of data encryption and decryption. This is to eliminate the threats that may occur while the data is traveling from one sensor area to another through the dead zones, which are uncovered by the IDSs inside the smart environment.
Comparing this new intrusion detection system with the various existent mechanisms suggested for wireless sensor network security, the proposed IDS does not only tackle all the specific attacks related to WSNs but guarantees the entire network security. The IDS, compared to the existing works, releases the sensors from any computational functions, which might require more memory space and drain their energy. The IDS presents an all-in-one security solution for the WSNs by also resolving the security hole problem.
Future work would involve employing a new algorithm that enables the IDS to maintain a trust level with genuine mobile sensors (which do not belong to any sensor area), joining and leaving its communication range without being considered as malicious. This is in relation with the security mechanism of the IDS device where it supervises the wireless network to compare the number of sensors in its sensor area (where the sensors are mostly fixed in particular geographical positions) to maintain utmost security. With the advancement of technology in the future, mobile devices or sensors may be required to be employed in an already deployed region for particular purposes. The IDS therefore needs to recognize these mobile devices as being part of its sensor area and not as intruders.

Author Contributions

Conceptualization, K.R.C.B.; Funding acquisition, L.X.; Investigation, K.R.C.B., L.X., and T.D.B.; Methodology, K.R.C.B.; Project administration, L.X.; Supervision, L.X. and Z.C.; Validation, L.X. and Z.C.; Visualization, K.R.C.B. and T.D.B.; Writing—original draft, K.R.C.B.; Writing—review and editing, K.R.C.B. and T.D.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Jiangsu Science and Technology Support Plan (Industry) Project (No. BE2014140).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, X.; He, J.; Wei, Q. EDDK: Energy-efficient distributed deterministic key management for wireless sensor networks. Eur. J. Wirel. Commun. Netw. 2011, 2011, 1–11. [Google Scholar] [CrossRef]
  2. Grover, J.; Sharma, S. Security issues in wireless sensor network—A review. In Proceedings of the 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India, 7–9 September 2016; pp. 397–404. [Google Scholar]
  3. Krontiris, I. Intrusion Prevention and Detection in Wireless Sensor Networks. Ph.D. Thesis, Universität Mannheim, Mannheim, Germany, 2008. [Google Scholar]
  4. Kumar, Y.; Munjal, R.; Kumar, K. Wireless sensor networks and security challenges. Int. J. Comput. Appl. RTMC 2012, 9, 17–21. [Google Scholar]
  5. Perrig, A.; Stankovic, J.; Wagner, D. Security in wireless sensor networks. Commun. ACM 2004, 47, 53–57. [Google Scholar] [CrossRef]
  6. Wang, Y.; Attebury, G. Byrav Ramamurthy A survey of security issues in wireless sensor networks. CSE J. Artic. 2006, 8, 2–23. [Google Scholar]
  7. Zhu, S.; Setia, S.; Jajodia, S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. 2006, 2, 500–528. [Google Scholar] [CrossRef]
  8. Girao, J.; Westhoff, D.; Mykletun, E.; Araki, T. TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw. 2006, 5, 1073–1089. [Google Scholar] [CrossRef]
  9. Raj, B.; Mudali, U.K. Sensor Science and Technology; Alpha Science International Ltd.: Oxford, UK, 2017; ISBN 9781842659403. [Google Scholar]
  10. Patil, S.; Chaudhari, S. DoS attack prevention technique in wireless sensor networks. Procedia Comput. Sci. 2016, 79, 715–721. [Google Scholar] [CrossRef]
  11. Singh, R.; Singh, J.; Singh, R. WRHT: A hybrid technique for detection of Wormhole attack in wireless sensor networks. Mob. Inf. Syst. 2016, 1–13. [Google Scholar] [CrossRef]
  12. Sonu, J.L.; Malar, K.J. Detection of Sybil Attack in Wireless Sensor Networks. Int. Res. J. Eng. Technol. 2017, 4, 1717–1718. [Google Scholar]
  13. Jamshidi, M.; Darwesh, A.M.; Lorenc, A.; Ranjbari, M.; Meybodi, M.R. A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks. IEIE Trans. Smart Process. Comput. 2018, 7, 457–466. [Google Scholar] [CrossRef]
  14. Wazid, M.; Das, A.K.; Bhat, K.V.; Vasilakos, A.V. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 2019, 150, 102496. [Google Scholar] [CrossRef]
  15. Challa, S.; Das, A.K.; Gope, P.; Kumar, N.; Wu, F.; Vasilakos, A.V. Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Futur. Gener. Comput. Syst. 2020, 108, 1267–1286. [Google Scholar] [CrossRef]
  16. Saia, R.; Carta, S.; Recupero, D.R.; Fenu, G. Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices. In Proceedings of the SENSORNETS 2019—Proceedings of the 8th International Conference on Sensor Networks, Prague, Czech Republic, 26–27 February 2019; pp. 77–84. [Google Scholar]
  17. Alrajeh, N.A.; Khan, S.; Shams, B. Intrusion detection systems in wireless sensor networks: A review. Int. J. Distrib. Sens. Netw. 2013, 2013, 167575. [Google Scholar] [CrossRef]
  18. da Costa, K.A.P.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C. Internet of Things: A survey on machine learning-based intrusion detection approaches. Comput. Netw. 2019, 151, 147–157. [Google Scholar] [CrossRef]
  19. Godala, S.; Vaddella, R.P.V. A study on intrusion detection system in wireless sensor networks. Int. J. Commun. Netw. Inf. Secur. 2020, 12, 127–141. [Google Scholar]
  20. Neisse, R.; Steri, G.; Fovino, I.N.; Baldini, G. SecKit: A Model-based Security Toolkit for the Internet of Things. Comput. Secur. 2015, 54, 60–76. [Google Scholar] [CrossRef]
  21. Kumari, S.; Rathi, G.; Attri, P.; Kumar, M. Types of sensors and their applications. Int. J. Eng. Res. Dev. 2014, 10, 72–85. [Google Scholar]
  22. Pham, C. Wireless Sensor Network: From Theory to Practice; Université de Pau et des Pays de L’Adour: Oran, Algeria, 2013. [Google Scholar]
  23. Asim, L. Anomaly Detection in Wireless Sensor Networks; University of Jyväskylä: Jyväskylä, Finland, 2016. [Google Scholar]
  24. Awodele, O.; Onuiri, E.E.; Okolie, S.O. Vulnerabilities in Network Infrastructures and Prevention/Containment Measures. In Proceedings of the Informing Science & IT Education Conference (InSITE); Informing Science Institute: Santa Rosa, CA, USA, 2012. [Google Scholar]
  25. Sen, J. A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 2009, 1, 55–78. [Google Scholar]
  26. Ekong, V.E.; Ekong, U.O. A survey of security vulnerabilities in wireless sensor networks. Niger. J. Technol. 2016, 35, 392–397. [Google Scholar] [CrossRef][Green Version]
  27. Ouafaa, I.; Salah-ddine, K.; Jalal, L.; Said, E.H. Review on the attacks and security protocols for wireless sensor networks. Eur. J. Sci. Res. 2013, 101, 455. [Google Scholar]
  28. Lupu, T.-G. Main types of attacks in wireless sensor networks. Recent Adv. Signals Syst. 2 2009, 9, 180–185. [Google Scholar]
  29. Messai, M.-L. Classification of attacks in wireless sensor networks. In Proceedings of the International Congress on Telecommunication and Application, Bejaia, Algeria, 23–24 April 2014. [Google Scholar]
  30. Riaz, M.N.; Buriro, A.; Mahboob, A. Classification of attacks on wireless sensor networks: A survey. Int. J. Wirel. Microw. Technol. 2018, 8, 15–39. [Google Scholar] [CrossRef]
  31. Mpitziopoulos, A.; Gavalas, D.; Konstantopoulos, C.; Pantziou, G. A survey on jamming attacks and countermeasures in WSNs. IEEE Commun. Surv. Tutor. 2009, 11, 42–56. [Google Scholar] [CrossRef]
  32. Alquraishee, A.G.A.; Kar, J. A survey on security in wireless sensor networks. Contemp. Eng. Sci. 2014, 7, 135–147. [Google Scholar] [CrossRef]
  33. Santhi, G.; Sowmiya, R. A survey on various attacks and countermeasures in wireless sensor networks. Int. J. Comput. Appl. 2017, 159, 7–11. [Google Scholar] [CrossRef]
  34. Marigowda, C.K.; Shingadi, M. Security vulnerability issues in wireless sensor networks: A short survey. Int. J. Adv. Res. Comput. Commun. Eng. 2013, 2, 2765–2770. [Google Scholar]
  35. Raymond, D.R.; Midkiff, S.F. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Comput. 2008, 7, 74–81. [Google Scholar] [CrossRef]
  36. Xing, K.; Srinivasan, S.S.R.; Rivera, M.; Li, J.; Cheng, X. Attacks and countermeasures in sensor networks: A survey. In Network Security; Huang, S., MacCallum, D., Du, D.Z., Eds.; Springer: Boston, MA, USA, 2005; pp. 1–28. [Google Scholar]
  37. Asha, P.N.; Mahalakshmi, T.; Archana, S.; Lingareddy, S.C. Wireless sensor networks: A survey on security threats issues and challenges. Int. J. Comput. Sci. Mob. Comput. 2016, 5, 249–267. [Google Scholar]
  38. Kaplantzis, S.; Shilton, A.; Mani, N.; Şekerciǧlu, Y.A. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In Proceedings of the 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, Melbourne, QLD, Australia, 3–6 December 2007; pp. 335–340. [Google Scholar]
  39. Otoum, S.; Kantarci, B.; Mouftah, H. Adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures. In Proceedings of the IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  40. Zhang, R.; Xiao, X. Intrusion detection in wireless sensor networks with an improved NSA based on space division. J. Sens. 2019, 2019, 1–20. [Google Scholar] [CrossRef]
  41. Han, L.; Zhou, M.; Jia, W.; Dalil, Z.; Xu, X. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 2019, 476, 491–504. [Google Scholar] [CrossRef]
  42. Almomani, I.; Alenezi, M. Efficient Denial of Service Attacks Detection in Wireless Sensor Networks. J. Inf. Sci. Eng. 2018, 34, 977–1000. [Google Scholar]
  43. Nadiammai, G.V.; Hemalatha, M. Effective approach toward Intrusion Detection System using data mining techniques. Egypt. Inform. J. 2014, 15, 37–50. [Google Scholar] [CrossRef]
  44. Kamble, J.R.; Rangdale, S.P. Intrusion detection using data mining techniques. Int. J. Sci. Res. 2014, 3, 1142–1145. [Google Scholar]
  45. Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [Google Scholar] [CrossRef]
  46. Mansouri, A.; Majidi, B.; Shamisa, A. Metaheuristic neural networks for anomaly recognition in industrial sensor networks with packet latency and jitter for smart infrastructures. Int. J. Comput. Appl. 2018, 1–10. [Google Scholar] [CrossRef]
  47. Wang, H.; Gu, J.; Wang, S. An effective intrusion detection framework based on SVM with feature augmentation. Knowl. Based Syst. 2017, 136, 130–139. [Google Scholar] [CrossRef]
  48. Koti, M.R.; Meshram, M.D. An overview of advance microcontroller bus architecture relate on APB bridge. Int. J. Sci. Res. Publ. 2013, 3, 1–3. [Google Scholar]
  49. Biham, E. Tutorial on Public Key Cryptography–RSA; Technion: Haifa, Israel, 2005; pp. 386–407. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.