Cargando…

Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The exi...

Descripción completa

Detalles Bibliográficos
Autores principales: Soundararajan, Rajasoundaran, Rajagopal, Maheswar, Muthuramalingam, Akila, Hossain, Eklas, Lloret, Jaime
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9609864/
https://www.ncbi.nlm.nih.gov/pubmed/36298399
http://dx.doi.org/10.3390/s22208046
_version_ 1784819127141007360
author Soundararajan, Rajasoundaran
Rajagopal, Maheswar
Muthuramalingam, Akila
Hossain, Eklas
Lloret, Jaime
author_facet Soundararajan, Rajasoundaran
Rajagopal, Maheswar
Muthuramalingam, Akila
Hossain, Eklas
Lloret, Jaime
author_sort Soundararajan, Rajasoundaran
collection PubMed
description The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques.
format Online
Article
Text
id pubmed-9609864
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96098642022-10-28 Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks Soundararajan, Rajasoundaran Rajagopal, Maheswar Muthuramalingam, Akila Hossain, Eklas Lloret, Jaime Sensors (Basel) Article The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques. MDPI 2022-10-21 /pmc/articles/PMC9609864/ /pubmed/36298399 http://dx.doi.org/10.3390/s22208046 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Soundararajan, Rajasoundaran
Rajagopal, Maheswar
Muthuramalingam, Akila
Hossain, Eklas
Lloret, Jaime
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title_full Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title_fullStr Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title_full_unstemmed Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title_short Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks
title_sort interleaved honeypot-framing model with secure mac policies for wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9609864/
https://www.ncbi.nlm.nih.gov/pubmed/36298399
http://dx.doi.org/10.3390/s22208046
work_keys_str_mv AT soundararajanrajasoundaran interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks
AT rajagopalmaheswar interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks
AT muthuramalingamakila interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks
AT hossaineklas interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks
AT lloretjaime interleavedhoneypotframingmodelwithsecuremacpoliciesforwirelesssensornetworks