Cyber-Physical System Leveraging EFDPN for WSN-IoT Network Security: Comparison
Please note this is a comparison between Version 2 by Camila Xu and Version 1 by Qaisar Abbas.

A wireless sensor network (WSN), which is made up of different kinds of sensors with limited resources, is an important part of monitoring an environment and sending important data to a designated node, also called a sink, through different communication protocols.

  • wireless sensor network (WSN)
  • internet of things (IoT)
  • security
  • cyber-physical system
  • intrusion detection
  • farmland fertility feature selection (F3S)

1. Introduction

A wireless sensor network (WSN) [1,2][1][2], which is made up of different kinds of sensors with limited resources, is an important part of monitoring an environment and sending important data to a designated node, also called a sink, through different communication protocols. These data are then relayed to a base station for meticulous analysis and processing, catered to the specific demands of contemporary applications. Renowned for their efficacy in remote monitoring, WSNs have a promising future, finding applicability in critical domains such as border surveillance, industrial inspection, commercial utilities, health monitoring, and environmental and infrastructure surveillance [3].
Conversely, the Internet of Things (IoT) [4,5][4][5] embodies an intricate network of interconnected smart devices tasked with the collection, processing, optimization, and dissemination of valuable data through internet channels. Each device, identifiable by a unique IP address or identifier, facilitates autonomous data exchange, enhancing the convenience and efficiency of daily activities through technological advancements [6,7,8][6][7][8]. However, this burgeoning development is not devoid of challenges, predominantly concerning security [9].
The extensive integration of IoT into daily life and the surge in remote device operations necessitate a unified platform facilitating seamless communication amongst a diverse array of devices [10,11,12][10][11][12]. This prerequisite has spurred the creation of specific IoT frameworks, outlining the architectural blueprint for selected applications and thus working towards standardizing IoT security protocols.
WSN and IoT [13,14][13][14] stand as potent forces capable of spearheading a societal transformation towards a smarter, more connected world. Despite their distinctive characteristics, they are occasionally utilized interchangeably owing to similarities in their processing power, memory storage, and communication capabilities. Both networks hold remarkable potential in real-time applications [15,16[15][16][17],17], yet they suffer from persistent security challenges at the device level [18].

2. Development and Validation of a Cyber-Physical System Leveraging EFDPN for Enhanced WSN-IoT Network Security

This section investigates various intrusion detection approaches used to safeguard WSN-IoT networks, wherein the positives and negatives of each model are discussed based on their performance. Pundir et al. [24][19] investigated the different types of security challenges in WSN-IoT networks. The different types of security requirements were also discussed in this study for protecting WSN-IoT networks from intrusions. The following categories of potential threats could greatly affect WSN-IoT networks: eavesdropping, impersonation attacks, DoS attacks, malware attacks, database attacks, and man-in-the-middle attacks. Baraneetharan et al. [25][20] discussed the impacts of using machine learning algorithms for intrusion detection in WSN-IoT systems. In this study, classification, regression, and clustering-based machine learning algorithms were discussed with regard to intrusion detection in WSN-IoT networks. Moreover, the suggested intrusion detection approaches were compared based on the parameters of prediction accuracy, memory requirements, network architecture, and energy consumption. Among other models, the hybrid IDS frameworks are more suitable for WSN due to their improved energy efficiency and precise detection operation. Jiang et al. [26][21] deployed a lightweight Gradient Boost Mechanism (GBM)-based cyber-physical system for smart-networking environments. Amouri et al. [27][22] designed a cross-layered IDS-framework-based linear regression model for increasing the security of WSN-IoT networks. The authors aim to detect common malicious activities like blackholes, flooding, and DDoS within networks [28][23]. The suggested model has the major drawbacks of an increased false-positive rate and time consumption for attack detection. Singh et al. [29][24] presented a comprehensive review to examine the different types of machine-learning-based intrusion detection approaches. This paper covers a few well-known and recently developed ML algorithms to highlight their strengths and weaknesses. This will assist researchers in choosing the best algorithm for their studies. Damasevicius et al. [30][25] utilized a new annotated dataset named LITNET-2020 for classifying normal and intrusive events pertaining to WSN-IoT systems. In addition, the authors suggested some other cyber-attack datasets for IoT security. Safaldin et al. [31][26] implemented a binary gray-wolf optimization algorithm incorporated with the standard SVM mechanism for detecting intrusions in WSNs. When recommending a fitness function for assessing each subset of the selected feature, the significance of accuracy and the overall number of features were taken into account. According to the total number of features, the prediction performance of the classifier was determined in the cited work. Here, the SVM uses a dimensionality-reduced feature set for intrusion identification and classification. Some of the merits of using SVM include better scalability, high process speed, and low complexity with a reduced feature set. Krishnan et al. [32][27] introduced an anomalous intrusion detection and prevention protocol for WSN-IoT networks. The authors aimed to increase the reliability of a network and provide an expanded time frame for an organization. Jayanayudu et al. [33][28] utilized hybrid Shuffled Frog Leap (SFL) and Ant Lion Optimization (ALO) algorithms to develop an intrusion detection framework for protecting WSN-IoT systems. Typically, securing data while improving energy efficiency is one of the most challenging network problems in present times. Increased attention to security is necessary while monitoring IDS using IoT-WSN systems. The authors of the suggested paper presented a safe routing intrusion prevention architecture for IoT-WSN networks. Moreover, they concentrated on the enhancement of network efficiency and defense against fraudulent attacks. Here, the greedy strategy was used for data routing, offering energy efficient solutions with security. Hussain et al. [34][29] presented a comprehensive literature review examining various routing strategies for low-powered IoT systems. Here, the assessment was carried out based on identification, screening, eligibility, and inclusion. Moreover, their work investigated the strengths and limitations of several security-based routing methodologies used in WSN-IoT networks. Al Sawafi et al. [35][30] implemented a hybrid deep-learning-based intrusion detection framework for WSN-IoT networks. In this paper, the authors intended to mitigate security attacks by analyzing a network traffic dataset. According to the pre-trained features, the authors’ framework categorizes normal and malicious networking traffic in the network. Maheswari and Karthika [36][31] constructed a multi-tiered intrusion detection (MDIT) framework for safeguarding WSN-IoT networks. Here, the Spotted Hyena Optimization (SHO) algorithm, integrated with the standard LSTM deep learning algorithm, was used to detect malicious events in cyber-data.

References

  1. Hasan, M.Z.; Hanapi, Z.M. Efficient and Secured Mechanisms for Data Link in IoT WSNs: A Literature Review. Electronics 2023, 12, 458.
  2. Begum, B.A.; Nandury, S.V. Data Aggregation Protocols for WSN and IoT Applications–A Comprehensive Survey. J. King Saud Univ. Comput. Inf. Sci. 2023, 35, 651–681.
  3. Sudha, I.; Mustafa, M.A.; Suguna, R.; Karupusamy, S.; Ammisetty, V.; Shavkatovich, S.N.; Ramalingam, M.; Kanani, P. Pulse jamming attack detection using swarm intelligence in wireless sensor networks. Optik 2023, 272, 170251.
  4. Ramana, K.; Revathi, A.; Gayathri, A.; Jhaveri, R.H.; Narayana, C.L.; Kumar, B.N. WOGRU-IDS—An intelligent intrusion detection system for IoT assisted Wireless Sensor Networks. Comput. Commun. 2022, 196, 195–206.
  5. Biswas, P.; Samanta, T.; Sanyal, J. Intrusion detection using graph neural network and Lyapunov optimization in wireless sensor network. Multimed. Tools Appl. 2023, 82, 14123–14134.
  6. Reddy, G.; Kadiyala, S.; Potluri, C.S.; Saravanan, P.S.; Athisha, G.; Mukunthan, M.; Sujaritha, M. An Intrusion Detection Using Machine Learning Algorithm Multi-Layer Perceptron (MlP): A Classification Enhancement in Wireless Sensor Network (WSN). Int. J. Recent Innov. Trends Comput. Commun. 2022, 10, 139–145.
  7. Choudhary, V.; Srivastava, A.; Kumar, A.; Taruna, S. Comparative Analysis of Security Issues and Trends in IoT and WSN. SAMRIDDHI J. Phys. Sci. Eng. Technol. 2022, 14, 216–222.
  8. Alwan, M.H.; Hammadi, Y.I.; Mahmood, O.A.; Muthanna, A.; Koucheryavy, A. High Density Sensor Networks Intrusion Detection System for Anomaly Intruders Using the Slime Mould Algorithm. Electronics 2022, 11, 3332.
  9. Ahmed, S.H.; Rani, S. A hybrid approach, Smart Street use case and future aspects for Internet of Things in smart cities. Future Gener. Comput. Syst. 2018, 79, 941–951.
  10. Zrelli, A.; Nakkach, C.; Ezzedine, T. Cyber-Security for IoT Applications based on ANN Algorithm. In Proceedings of the 2022 International Symposium on Networks, Computers and Communications (ISNCC), Shenzhen, China, 19–22 July 2022; pp. 1–5.
  11. Kumar, A.; Agrawal, K.K. Energy-Efficient Resource Allocation and Routing Protocols for IoT-based WSN: A Review. In Proceedings of the 2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bengaluru, India, 27–28 January 2023; pp. 363–369.
  12. Samara, A.M.; Bennis, I.; Abouaissa, A.; Lorenz, P. A survey of outlier detection techniques in IoT: Review and classification. J. Sens. Actuator Netw. 2022, 11, 4.
  13. Vishnu, V.M. ProSD-edgeIoT: Protected cluster assisted SDWSN for tetrad edge-IoT by collaborative DDoS detection and mitigation. Cyber-Phys. Syst. 2023, 9, 144–173.
  14. Kumar, A.; Dhabliya, D.; Agarwal, P.; Aneja, N.; Dadheech, P.; Jamal, S.S.; Antwi, O.A. Cyber-internet security framework to conquer energy-related attacks on the internet of things with machine learning techniques. Comput. Intell. Neurosci. 2022, 2022, 8803586.
  15. Sheron, P.F.; Sridhar, K.; Baskar, S.; Shakeel, P.M. A decentralized scalable security framework for end-to-end authentication of future IoT communication. Trans. Emerg. Telecommun. Technol. 2019, 31, e3815a.
  16. VenkataRao, S.; Ananth, V. A Hybrid Optimization Algorithm and Shamir Secret Sharing Based Secure Data Transmission for IoT based WSN. Int. J. Intell. Eng. Syst. 2021, 14, 498–506.
  17. Ismail, S.; Reza, H. Evaluation of Naïve Bayesian Algorithms for Cyber-Attacks Detection in Wireless Sensor Networks. In Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, 6–9 June 2022; pp. 283–289.
  18. Subburayalu, G.; Duraivelu, H.; Raveendran, A.P.; Arunachalam, R.; Kongara, D.; Thangavel, C. Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier. J. Appl. Secur. Res. 2021, 18, 402–420.
  19. Pundir, S.; Wazid, M.; Singh, D.P.; Das, A.K.; Rodrigues, J.J.; Park, Y. Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access 2019, 8, 3343–3363.
  20. Baraneetharan, E. Role of machine learning algorithms intrusion detection in WSNs: A survey. J. Inf. Technol. Digit. World 2020, 2, 161–173.
  21. Jiang, S.; Zhao, J.; Xu, X. SLGBM: An intrusion detection mechanism for wireless sensor networks in smart environments. IEEE Access 2020, 8, 169548–169558.
  22. Amouri, A.; Alaparthy, V.T.; Morgera, S.D. A machine learning based intrusion detection system for mobile Internet of Things. Sensors 2020, 20, 461.
  23. Gopalakrishnan, S. Performance analysis of malicious node detection and elimination using clustering approach on MANET. Circuits Syst. 2016, 7, 748–758.
  24. Singh, G.; Khare, N. A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int. J. Comput. Appl. 2022, 44, 659–669.
  25. Damasevicius, R.; Venckauskas, A.; Grigaliunas, S.; Toldinas, J.; Morkevicius, N.; Aleliunas, T.; Smuikys, P. LITNET-2020: An annotated real-world network flow dataset for network intrusion detection. Electronics 2020, 9, 800.
  26. Safaldin, M.; Otair, M.; Abualigah, L. Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 1559–1576.
  27. Hemanand, D.; Reddy, G.V.; Babu, S.S.; Balmuri, K.R.; Chitra, T.; Gopalakrishnan, S. An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). Int. J. Intell. Syst. Appl. Eng. 2022, 10, 285–293.
  28. Jayanayudu, D.; Sudhir, A.C. Shuffled Frog Leap and Ant Lion Optimization for Intrusion Detection in IoT-Based WSN. In Proceedings of Fourth International Conference on Computer and Communication Technologies; Springer: Singapore, 2023; pp. 17–26.
  29. Hussain, M.Z.; Hanapi, Z.M. Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review. Electronics 2023, 12, 482.
  30. Al Sawafi, Y.; Touzene, A.; Hedjam, R. Hybrid Deep Learning-Based Intrusion Detection System for RPL IoT Networks. J. Sens. Actuator Netw. 2023, 12, 21.
  31. Maheswari, M.; Karthika, R. A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks. Intell. Autom. Soft Comput. 2022, 33, 365–3822022.
More
Video Production Service