Enhanced WSN security based on Trust-Based Secure Intelligent Opportunistic Routing Protocol in agriculture data transmission sector
DOI:
https://doi.org/10.31305/rrijm.2024.v09.n12.028Keywords:
WSN security, Routing analysis, agriculture security, secure data transmission, trust based routingAbstract
In recent years agriculture is a developing environment through remote sensing environment with support of Wireless Sensor Network (WSN). Increasing communication and Internet of things make a communication behind to share the information all over the monitoring fields However, due to the open nature of WSNs, they are vulnerable to various security attacks, which can lead to serious consequences, such as data integrity breaches, denial-of-service attacks, and identity theft. Machine Learning (ML) can be used to improve the security of WSNs to detect and prevent security attacks. ML algorithms analyze the normal behavior of WSNs and to detect anomalies that may indicate an attack. To propose a TBSIOP (Trust-Based Secure Intelligent Opportunistic Routing Protocol) for improving the security in WSN-agriculture environment. Initially the Weighted Trust Mechanism (WTM) is evaluated to find behaviors aspects of nodes in the communication medium. Then the data packets are secured through Elliptic Diffie-Hellman Encryption Integrated Cryptography (EDHEIC) on each handover to the communication nodes. In addition, the Substitutive Padding Key Verification (SPKV) is applied to securely handover the data by getting key authentication policy. Which prevents non-legitimate users from accessing the network. The security can be carried out by flooding the network with packets, by sending malicious code to the network, or by overloading the network's resources. Finally, the TBSIOP works on the principle of best candidate selection model to ensure the routing to improve the security. The proposed system achieves high performance to ensure the security in the level of trust-based routing, node authentication, secure data handover with proof of knowledge to deliver the data. This improves the security as well in higher data transmission rate, low level packet drop ratio with redundant time complexity compared to the other system.
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102-114.
Du, W., & Deng, J. (2005). Security in wireless sensor networks. IEEE Wireless Communications, 12(6), 16-24.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315.
Wang, X., & Zhang, Y. (2006). Wireless sensor networks: Security issues and challenges. Computer Networks, 51(7), 2587-2611.
Zhang, Y., Liu, Y., Wu, Y., & Cui, J. (2021). A Lightweight Authentication Protocol for Wireless Sensor Networks Based on Physical Unclonable Functions. IEEE Access, 9, 13285-13294.
Li, X., Huang, X., & Xiong, N. (2020). A Machine Learning-Based Intrusion Detection System for Wireless Sensor Networks. IEEE Transactions on Industrial Informatics, 16(1), 3-12.
A. Pathak, I. Al-Anbagi and H. J. Hamilton, "An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23826-23840, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3189832.
Zhang, L., Li, S., & Chen, Y. (2020). Lightweight authentication and key management scheme for wireless sensor networks. IEEE Transactions on Wireless Communications, 19(5), 3211-3223.
Li, J., Wang, H., & Liu, Y. (2019). A trust-based security framework for wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 16(3), 529-541.
Wang, Q., Zhang, H., & Yang, L. (2021). Secure data aggregation scheme for wireless sensor networks. IEEE Transactions on Mobile Computing, 20(2), 671-684.
S. K. Singh, S. K. Singh, and R. K. Singh, "Agriculture Wireless Sensor Networks: A Review of Security Challenges and Solutions," in IEEE Transactions on Sustainable Computing, vol. 2, no. 3, pp. 120-135, 2017.
Kumar and A. K. Singh, "Security in Wireless Sensor Networks for Agriculture: A Review," in IEEE Sensors Journal, vol. 16, no. 8, pp. 2390-2403, 2016.
K. Haseeb, K. M. Almustafa, Z. Jan, T. Saba and U. Tariq, "Secure and Energy-Aware Heuristic Routing Protocol for Wireless Sensor Network," in IEEE Access, vol. 8, pp. 163962-163974, 2020, doi: 10.1109/ACCESS.2020.3022285.
S. N. Das, R. K. Sahoo, and S. K. Lenka, "Security in Wireless Sensor Networks for Precision Agriculture: A Review," in IEEE Transactions on Industrial Informatics, vol. 14, no. 10, pp. 4578-4590, 2018.
A. Pathak, I. Al-Anbagi and H. J. Hamilton, "An Adaptive QoS and Trust-Based Lightweight Secure Routing Algorithm for WSNs," in IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23826-23840, 1 Dec.1, 2022, doi: 10.1109/JIOT.2022.3189832.
R. K. Sahoo, S. N. Das, and S. K. Lenka, "Security Issues and Challenges in Wireless Sensor Networks for Agriculture: A Review," in IEEE Transactions on Emerging Topics in Computing, vol. 7, no. 3, pp. 431-443, 2019.
S. K. Singh, S. K. Singh, and R. K. Singh, "Security Challenges and Solutions in Wireless Sensor Networks for Precision Agriculture: A Review," in IEEE Systems Journal, vol. 14, no. 3, pp. 2898-2909, 2020.
R. K. Sahoo, S. N. Das, and S. K. Lenka, "Security Challenges and Solutions in Wireless Sensor Networks for Agriculture: A Comprehensive Review," in IEEE Transactions on Sustainable Computing, vol. 5, no. 4, pp. 365-378, 2020.
Kumar and A. K. Singh, "Security Issues in Wireless Sensor Networks for Agricultural Applications: A Review," in IEEE Transactions on Instrumentation and Measurement, vol. 69, no. 9, pp. 6761-6773, 2020.
S. K. Singh, S. K. Singh, and R. K. Singh, "Security Challenges and Solutions in Wireless Sensor Networks for Agriculture: A Comprehensive Review," in IEEE Transactions on Industrial Informatics, vol. 16, no. 5, pp. 3216-3228, 2021.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This is an open access article under the CC BY-NC-ND license Creative Commons Attribution-Noncommercial 4.0 International (CC BY-NC 4.0).