IJCNIS Vol. 16, No. 2, 8 Apr. 2024
Cover page and Table of Contents: PDF (size: 767KB)
PDF (767KB), PP.117-133
Views: 0 Downloads: 0
Wireless Body Area Network, Malicious Nodes, Failure Links, Security, Trust Value, Modified RSA Cipher, Optimized Convolutional Neural Network-support Vector Machine
This paper proposes an intrusion detection system to prevent malicious node attacks that may result in failure links in wireless body area networks. The system utilizes a combination of Optimized Convolutional Neural Networks and Support Vector Machine techniques to classify nodes as malicious or not, and links as failure or not. In case of detection, the system employs a trust-based routing strategy to isolate malicious nodes or failure links and ensure a secure path. Furthermore, sensitive data is encrypted using a modified RSA encryption algorithm. The experimental results demonstrate the improved network performance in terms of data rate, delay, packet delivery ratio, energy consumption, and network security, by providing effective protection against malicious node attacks and failure links. The proposed system achieves the highest classification rate and sensitivity, surpassing similar methods in all evaluation metrics.
Mohammed Abdessamad Goumidi, Ehlem Zigh, Naima Hadj-Said, Adda Belkacem Ali-Pacha, "A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.2, pp.117-133, 2024. DOI:10.5815/ijcnis.2024.02.10
[1]A. Ghumro, A. Ahmed, and A. K. Memon, “Node Misbehavior Attacks in WBAN: Effects and Countermeasures”.
[2]I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks,” Journal of Sensors, vol. 2016, pp. 1–16, 2016, doi: 10.1155/2016/4731953. I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks,” Journal of Sensors, vol. 2016, pp. 1–16, 2016, doi: 10.1155/2016/4731953.
[3]R. K. Dhanaraj, R. H. Jhaveri, L. Krishnasamy, G. Srivastava, and P. K. R. Maddikunta, “Black-Hole Attack Mitigation in Medical Sensor Networks Using the Enhanced Gravitational Search Algorithm,” Int. J. Unc. Fuzz. Knowl. Based Syst., vol. 29, no. Supp02, pp. 297–315, Dec. 2021, doi: 10.1142/S021848852140016X.
[4]Anguraj, D.K., Smys, S. Trust-Based Intrusion Detection and Clustering Approach for Wireless Body Area Networks. Wireless Pers Commun 104, 1–20 (2019). https://doi.org/10.1007/s11277-018-6005-x.
[5]A. R. Bhangwar, P. Kumar, A. Ahmed, and M. I. Channa, “Trust and Thermal Aware Routing Protocol (TTRP) for Wireless Body Area Networks,” Wireless Pers Commun, vol. 97, no. 1, pp. 349–364, Nov. 2017, doi: 10.1007/s11277-017-4508-5.
[6]S. Ramaswamy and U. D. Gandhi, “Trust-Based Data Communication in Wireless Body Area Network for Healthcare Applications,” BDCC, vol. 6, no. 4, p. 148, Dec. 2022, doi: 10.3390/bdcc6040148.
[7]D. K. E. Al. Damanpreet Kaur Et Al., and TJPRC, “Privacy Preserved Healthcare System for Wireless Body Area Networks,” IJMPERD, vol. 10, no. 3, pp. 12191–12202, 2020, doi: 10.24247/ijmperdjun20201166.
[8]S. Shin, S. Choi, K. Won, and S. Shin, “Preprocessed symmetric RSA authentication for wireless body area networks in space,” in Proceedings of the Conference on Research in Adaptive and Convergent Systems, Chongqing China: ACM, Sep. 2019, pp. 230–235. doi: 10.1145/3338840.3355675.
[9]A. Basnet, A. Alsadoon, P. W. C. Prasad, O. H. Alsadoon, L. Pham, and A. Elchouemi, “A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring,” Int. j. commun. netw. inf. secur., vol. 11, no. 1, Apr. 2022, doi: 10.17762/ijcnis.v11i1.3801.
[10]G. Kaur and N. Kaur, “Cost Effective Energy Efficient and Secure Routing Protocol (CESR) for WBAN,” IJCA, vol. 169, no. 4, pp. 37–43, Jul. 2017, doi: 10.5120/ijca2017914727.
[11]M. Ramadan, Y. Liao, F. Li, S. Zhou, and H. Abdalla, “IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks,” Mobile Netw Appl, vol. 25, no. 1, pp. 223–233, Feb. 2020, doi: 10.1007/s11036-019-01215-9.
[12]K. Kalaiselvi, L. Vanitha, K. Deepa Thilak, T. Rajesh Kumar, S. Saranya, and K. Kumaresan, “RETRACTED ARTICLE: Performance Analysis of Malicious and Link Failure Detection System Using Deep Learning Methodology,” Wireless Pers Commun, vol. 127, no. S1, pp. 25–26, Dec. 2022, doi: 10.1007/s11277-021-08790-9.
[13]U. Gulen, A. Alkhodary, and S. Baktir, “Implementing RSA for Wireless Sensor Nodes,” Sensors, vol. 19, no. 13, p. 2864, Jun. 2019, doi: 10.3390/s19132864.
[14]M. A. Goumidi, N. Hadj-Said, A. B. Ali-Pacha and E. Zigh, "Detection of Malicious Nodes in WBAN using a Feed Forward Back Propagation Neural Network," 2022 International Conference of Advanced Technology in Electronic and Electrical Engineering (ICATEEE), M'sila, Algeria, 2022, pp. 1-6, doi: 10.1109/ICATEEE57445.2022.10093101.
[15]research scholar , pacific university (PAHER), Udaipur ,Rajasthan, India., M. Goswami*, Dr. P. Sharma, HOD CSE , pacific university (PAHER), Udaipur ,Rajasthan, India, A. Bhargava, and Assistant Professor CSE, , pacific university (PAHER), Udaipur ,Rajasthan, India, “Black Hole Attack Detection in MANETs using Trust Based Technique,” IJITEE, vol. 9, no. 4, pp. 1446–1451, Feb. 2020, doi: 10.35940/ijitee.D1497.029420.
[16]L. Maheshavel and C. Senthilkumar, “Mitigation of black hole attack in MANETs: A sequence no-based approach,” J. Phys.: Conf. Ser., vol. 1917, no. 1, p. 012011, Jun. 2021, doi: 10.1088/1742-6596/1917/1/012011.
[17]B. Sen, M. G. Meitei, K. Sharma, M. K. Ghose, and S. Sinha, “Mitigating Black Hole Attacks in MANETs Using a Trust-Based Threshold Mechanism,” vol. 13, no. 7, 2018.
[18]R. Patidar and R. Bhartiya, “Modified RSA cryptosystem based on offline storage and prime number,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi, Tamilnadu, India: IEEE, Dec. 2013, pp. 1–6. doi: 10.1109/ICCIC.2013.6724176.
[19]R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, Feb. 1978, doi: 10.1145/359340.359342.
[20]K. Tejaswini and M. Y. Adilakshmi, “Black hole Attack Detection Using Machine Learning Algorithms in MANET – Performance Comparision,” vol. 07, no. 06, 2020.
[21]“Detection and Interception of Black Hole Attack with Justification using Anomaly based Intrusion Detection System in MANETs,” IJRTE, vol. 8, no. 2S11, pp. 2392–2398, Nov. 2019, doi: 10.35940/ijrte.B1274.0982S1119.
[22]S. Arockia Jayadhas and S. Emalda Roslin, “Link Failure Detection in Multimedia Sensor Networks Using Multi-Tier Clustering Based VGG-CNN Classification Approach,” IJCNA, vol. 8, no. 6, p. 693, Dec. 2021, doi: 10.22247/ijcna/2021/210719.
[23]R. Dass et al., “A Cluster-Based Energy-Efficient Secure Optimal Path-Routing Protocol for Wireless Body-Area Sensor Networks,” Sensors, vol. 23, no. 14, p. 6274, Jul. 2023, doi: 10.3390/s23146274.
[24]A. Kaur and J. Kaur, “Trust based Security Protocol to mitigate black hole Attacks in Mobile Adhoc Networks,” In Review, preprint, Oct. 2022. doi: 10.21203/rs.3.rs-2197795/v1.
[25]M. Singh, G. Mehta, C. Vaid, and P. Oberoi, “Detection of Malicious Node in Wireless Sensor Network Based on Data Mining,” in 2012 International Conference on Computing Sciences, Phagwara, India: IEEE, Sep. 2012, pp. 291–294. doi: 10.1109/ICCS.2012.24.
[26]S. S. Bhalsagar, M. D. Chawhan, Y. Suryawanshi, and V. K. Taksande, “Performance Evaluation of Routing Protocol Under Black hole Attack In Manet And Suggested Security Enhancement Mechanisms,” vol. 8, no. 5, 2019.
[27]“Ant Colony Optimization Based Modified AODV for Secure Routing in Mobile Ad Hoc Networks,” IJIES, vol. 14, no. 6, pp. 115–124, Dec. 2021, doi: 10.22266/ijies2021.1231.11.
[28]S. Shin, K. Won, and S. Shin, “Size efficient preprocessed symmetric rsa for wireless body area network,” SIGAPP Appl. Comput. Rev., vol. 20, no. 1, pp. 15–23, Apr. 2020, doi: 10.1145/3392350.3392352.
[29]C. Senthilkumar and N. Kamaraj, “Mitigation of Blackhole Attack Using Trusted AODV,” Australian Journal of Basic and Applied Sciences, 2015.
[30]K. N. Ambili and Jimmy Jose, “Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems,” in Information Science and Applications, K. J. Kim and H.-Y. Kim, Eds., in Lecture Notes in Electrical Engineering, vol. 621. Singapore: Springer Singapore, 2020, pp. 631–638. doi: 10.1007/978-981-15-1465-4_62.
[31]R. Alattas, “Detecting black-hole attacks in WSNs using multiple base stations and check agents,” in 2016 Future Technologies Conference (FTC), San Francisco, CA, USA: IEEE, Dec. 2016, pp. 1020–1024. doi: 10.1109/FTC.2016.7821728.