Cargando…
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The exi...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9609864/ https://www.ncbi.nlm.nih.gov/pubmed/36298399 http://dx.doi.org/10.3390/s22208046 |
_version_ | 1784819127141007360 |
---|---|
author | Soundararajan, Rajasoundaran Rajagopal, Maheswar Muthuramalingam, Akila Hossain, Eklas Lloret, Jaime |
author_facet | Soundararajan, Rajasoundaran Rajagopal, Maheswar Muthuramalingam, Akila Hossain, Eklas Lloret, Jaime |
author_sort | Soundararajan, Rajasoundaran |
collection | PubMed |
description | The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques. |
format | Online Article Text |
id | pubmed-9609864 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-96098642022-10-28 Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks Soundararajan, Rajasoundaran Rajagopal, Maheswar Muthuramalingam, Akila Hossain, Eklas Lloret, Jaime Sensors (Basel) Article The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques. MDPI 2022-10-21 /pmc/articles/PMC9609864/ /pubmed/36298399 http://dx.doi.org/10.3390/s22208046 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Soundararajan, Rajasoundaran Rajagopal, Maheswar Muthuramalingam, Akila Hossain, Eklas Lloret, Jaime Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title | Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title_full | Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title_fullStr | Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title_full_unstemmed | Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title_short | Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks |
title_sort | interleaved honeypot-framing model with secure mac policies for wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9609864/ https://www.ncbi.nlm.nih.gov/pubmed/36298399 http://dx.doi.org/10.3390/s22208046 |
work_keys_str_mv | AT soundararajanrajasoundaran interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks AT rajagopalmaheswar interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks AT muthuramalingamakila interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks AT hossaineklas interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks AT lloretjaime interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks |