This document proposes a lightweight trust-based authentication framework for security in wireless personal area networks (WPANs). The framework divides nodes into primary and secondary groups through network slicing. It calculates trust values for nodes based on direct, indirect, and integrated trust models. The trust values are used to authenticate nodes' requests to access WPAN resources. The framework aims to distinguish valid requests from untrustworthy nodes to enhance security while maintaining energy efficiency in WPANs.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat
modeling as a part of requirements engineering in secure software development provides a structured
approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities
in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for
privacy threat modeling in relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to specify characteristics
of a cloud privacy threat modeling methodology, different steps in the proposed methodology and
corresponding products. In addition, a case study has been implemented as a proof of concept to
demonstrate the usability of the proposed methodology. We believe that the extended methodology
facilitates the application of a privacy-preserving cloud software development approach from requirements
engineering to design.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
Providing security in Mobile Ad Hoc Network is crucial problem due to its open shared wireless medium,
multi-hop and dynamic nature, constrained resources, lack of administration and cooperation.
Traditionally routing protocols are designed to cope with routing operation but in practice they may be
affected by misbehaving nodes so that they try to disturb the normal routing operations by launching
different attacks with the intention to minimize or collapse the overall network performance. Therefore
detecting a trusted node means ensuring authentication and securing routing can be expected. In this
article we have proposed a Trust and Q-learning based Security (TQS) model to detect the misbehaving
nodes over Ad Hoc On Demand Distance-Vector (AODV) routing protocol. Here we avoid the misbehaving
nodes by calculating an aggregated reward, based on the Q-learning mechanism by using their historical
forwarding and responding behaviour by the way misbehaving nodes can be isolated.
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat
modeling as a part of requirements engineering in secure software development provides a structured
approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities
in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for
privacy threat modeling in relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to specify characteristics
of a cloud privacy threat modeling methodology, different steps in the proposed methodology and
corresponding products. In addition, a case study has been implemented as a proof of concept to
demonstrate the usability of the proposed methodology. We believe that the extended methodology
facilitates the application of a privacy-preserving cloud software development approach from requirements
engineering to design.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existingsecurity algorithms designed for these networks are insecure, in efficient, and have low detection accuracy for nodes’ misbehaviour. In this paper, a new approach has been proposed to bring out the complementary relationship between key distribution and misbehaviour detection for developing an integrated security solution for MANETs. The redundancy of routing inform ation in ad hoc networks is utilized to develop a highly reliable protocol that works even in presence of transient network
partitioning and Byzantine failure of nodes. The proposed mechanism is fully co-operative, and thus it is more robust as the vulnerabilities of the election algorithms used for choosing the subset of nodes for cooperation are absent. Simulation results show the effectiveness of the proposed protocol.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...IJNSA Journal
Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy. A review of previous research to date in the area of security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing algorithm and dynamic based rekeying implementation.
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
Security is the major challenge for Wireless Sensor Networks (WSNs). The sensor nodes are deployed in non controlled environment, facing the danger of information leakage, adversary attacks and other threats. Trust and Reputation models are solutions for this problem and to identify malicious, selfish and compromised nodes. This paper aims to evaluate varying collusion effect with respect to static (SW), dynamic (DW), static with collusion (SWC), dynamic with collusion (DWC) and oscillating wireless sensor networks to derive the joint resultant of Eigen Trust Model. An attempt has been made for the same by comparing aforementioned networks that are purely dedicated to protect the WSNs from adversary attacks and maintain the security issues. The comparison has been made with respect to accuracy and path length and founded that, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario. Additionally, it consumes more energy and resources in oscillating and collusive environments.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Improving Network Security in MANETS using IEEACKijsrd.com
Mobile ad hoc networks (MANETs) have attracted much attention due to their mobility and ease of deployment. However, the wireless and dynamic natures render them more vulnerable to various types of security attacks than the wired networks. The major challenge is to guarantee secure network services. We have identified the inadequate nature of EAACK in scenarios of link breakage, source maliciousness and partial packet dropping and hence we propose an improved algorithm called improved EAACK to tackle the security issues. High mobility of MANET nodes contributes to frequent link breakages in the network, which leads to path failures and route discovery processes. Route discovery is initialized through a broadcast mechanism usually. But, the overheads created through this cannot be neglected. The simulation results show that IEEACK scheme can prevent attacks from malicious nodes and improve the security performance of the whole network, especially in terms of the packet delivery ratio, the average end-to-end delay, the routing packet overhead and detection ratio of malicious nodes.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
One of the security issues in Wireless Sensor Networks (WSN) is intrusion detection. In this paper, we propose a new defence mechanism based on the Ad hoc On-Demand Vector (AODV) routing protocol. AODV is a reactive protocol designed for ad hoc networks and has excellent flexibility to be adapted to a new secure version. The main objective of the proposed secured AODV routing protocol is to protect WSN against malicious intrusion and defend against adversary attacks. This secured AODV protocol works well with the WSN dynamics and topology changes due to limited available resources. It establishes secure multi-hop routing between sensor nodes with high confidence, integrity, and availability. The secured AODV utilizes an existing intrusion dataset that facilitates new collection from all the exchanged packets in the network. The protocol monitors end to end delay and avoid any additional overhead over message transfer between sensor nodes. The experimental results showed that this secured AODV could be used to fight against malicious attacks such as black hole attacks and avoid caused large transmission delays.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...IJNSA Journal
Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy. A review of previous research to date in the area of security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing algorithm and dynamic based rekeying implementation.
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
Security is the major challenge for Wireless Sensor Networks (WSNs). The sensor nodes are deployed in non controlled environment, facing the danger of information leakage, adversary attacks and other threats. Trust and Reputation models are solutions for this problem and to identify malicious, selfish and compromised nodes. This paper aims to evaluate varying collusion effect with respect to static (SW), dynamic (DW), static with collusion (SWC), dynamic with collusion (DWC) and oscillating wireless sensor networks to derive the joint resultant of Eigen Trust Model. An attempt has been made for the same by comparing aforementioned networks that are purely dedicated to protect the WSNs from adversary attacks and maintain the security issues. The comparison has been made with respect to accuracy and path length and founded that, collusion for wireless sensor networks seems intractable with the static and dynamic WSNs when varied with specified number of fraudulent nodes in the scenario. Additionally, it consumes more energy and resources in oscillating and collusive environments.
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
In WSNs, end-to-end data communication security is required to combine data from source to destination. Combined data are transmitted in a path exist of connected links. All previous end to end routing protocols propose solutions in which each n every link uses a pair wise shared key to protect data. In this paper, we propose a novel design of secure end to end data communication. We give a newly published group key pre distribution scheme in this design, such that there is a unique group key, called path key, to protect data transmitted in the whole routing path. Specifically, instead of using several pair wise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique source to destination path key to protect data transmitted over the path. Our proposed protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by middle sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is several from all authentication schemes till now, which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure. Active Trust can importantly improve the data route success probability and ability opposite black hole attacks and can optimize network lifetime.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-stage secure clusterhead selection using discrete rule-set against unkn...IJECEIAES
Security is the rising concern of the wireless network as there are various forms of reonfigurable network that is arised from it. Wireless sensor network (WSN) is one such example that is found to be an integral part of cyber-physical system in upcoming times. After reviewing the existing system, it can be seen that there are less dominant and robust solutions towards mitigating the threats of upcoming applications of WSN. Therefore, this paper introduces a simple and cost-effective modelling of a security system that offers security by ensuring secure selection of clusterhead during the data aggregation process in WSN. The proposed system also makes construct a rule-set in order to learn the nature of the communication iin order to have a discrete knowledge about the intensity of adversaries. With an aid of simulation-based approach over MEMSIC nodes, the proposed system was proven to offer reduced energy consumption with good data delivery performance in contrast to existing approach.
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
A SECURITY SUITE FOR WIRELESS BODY AREA NETWORKSIJNSA Journal
Wireless Body Area Networks (WBANs) have gained a lot of research attention in recent years since they offer tremendous benefits for remote health monitoring and continuous, real-time patient care. However, as with any wireless communication, data security in WBANs is a challenging design issue. Since such networks consist of small sensors placed on the human body, they impose resource and computational restrictions, thereby making the use of sophisticated and advanced encryption algorithms infeasible. This calls for the design of algorithms with a robust key generation / management scheme, which are reasonably resource optimal. This paper presents a security suite for WBANs, comprised of IAMKeys, an independent and adaptive key management scheme for improving the security of WBANs, and KEMESIS, a key management scheme for security in inter-sensor communication. The novelty of these schemes lies in the use of a randomly generated key for encrypting each data frame that is generated independently at both the sender and the receiver, eliminating the need for any key exchange. The simplicity of the encryption scheme, combined with the adaptability in key management makes the schemes simple, yet secure. The proposed algorithms are validated by performance analysis.
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
Trabajo realizado para la medición del grado de inseguridad de una red WiFi a la que se conecta un equipo. En él se analizan las medidas de seguridad, el riesgo y los motivos por los que existen las redes WiFi inseguras
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system.
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...IJCNCJournal
Cloud computing is widely used by organizations and individuals due to its flexibility and reliability. The trust model is important for cloud computing to detect malicious users and protect user privacy. The existing research faces the issues of local optima trap and overfitting problems when a training user node is idle for more time. This research proposed Weighted Coefficient Firefly Optimization Algorithm (WCFOA) with Support Vector Machine (SVM) for the trust model calculation and identifying paths with better Quality of Services (QoS). The weighted coefficient is added to the FOA model to balance the exploration and exploitation in the search of identifying optimal path based on reliability score. The WC-FOA method measures the link reliability in the model and SVM detects the malicious users in the model. The WC-FOA model selects the optimal path for transmission in terms of trust and efficient QoS parameters. The entropy measure and link reliability are provided as input to the SVM model for the detection of attacks in the network. The WCFOA-SVM model has 96% malicious user detection, whereas the Random Forest Hierarchical Ant Colony Optimization (RF-HEACO) has 92 % accuracy.
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...IJCNCJournal
Cloud computing is widely used by organizations and individuals due to its flexibility and reliability. The trust model is important for cloud computing to detect malicious users and protect user privacy. The existing research faces the issues of local optima trap and overfitting problems when a training user node is idle for more time. This research proposed Weighted Coefficient Firefly Optimization Algorithm (WCFOA) with Support Vector Machine (SVM) for the trust model calculation and identifying paths with better Quality of Services (QoS). The weighted coefficient is added to the FOA model to balance the exploration and exploitation in the search of identifying optimal path based on reliability score. The WC-FOA method measures the link reliability in the model and SVM detects the malicious users in the model. The WC-FOA model selects the optimal path for transmission in terms of trust and efficient QoS parameters. The entropy measure and link reliability are provided as input to the SVM model for the detection of attacks in the network. The WCFOA-SVM model has 96% malicious user detection, whereas the Random Forest Hierarchical Ant Colony Optimization (RF-HEACO) has 92 % accuracy.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
Secured node detection technique based on artificial neural network for wirel...IJECEIAES
The wireless sensor network is becoming the most popular network in the last recent years as it can measure the environmental conditions and send them to process purposes. Many vital challenges face the deployment of WSNs such as energy consumption and security issues. Various attacks could be subjects against WSNs and cause damage either in the stability of communication or in the destruction of the sensitive data. Thus, the demands of intrusion detection-based energy-efficient techniques rise dramatically as the network deployment becomes vast and complicated. Qualnet simulation is used to measure the performance of the networks. This paper aims to optimize the energy-based intrusion detection technique using the artificial neural network by using MATLAB Simulink. The results show how the optimized method based on the biological nervous systems improves intrusion detection in WSN. In addition to that, the unsecured nodes are affected the network performance negatively and trouble its behavior. The regress analysis for both methods detects the variations when all nodes are secured and when some are unsecured. Thus, Node detection based on packet delivery ratio and energy consumption could efficiently be implemented in an artificial neural network.
Similar to A trust-based authentication framework for security of WPAN using network slicing (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
A trust-based authentication framework for security of WPAN using network slicing
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 11, No. 2, April 2021, pp. 1375∼1387
ISSN: 2088-8708, DOI: 10.11591/ijece.v11i2.pp1375-1387 r 1375
A trust-based authentication framework for security of
WPAN using network slicing
Sazia Parvin1
, Amjad Gawanmeh2
, Sitalakshmi Venkatraman3
, Ali Alwadi4
, Jamal N. Al-Karaki5
, Paul
D. Yoo6
1,3
Melbourne Polytechnic, Victoria, Australia
2
Department of Electrical Engineering, College of Engineering and IT, University of Dubai, Dubai, United Arab Emirates
4
School of Engineering, Auckland University of Technology Auckland, New Zealand
5
Department of Information Security Engineering Technology, Abu Dhabi Polytechnic, Abu Dhabi, United Arab Emirates
5
Department of Computer Engineering, The Hashemite University, Zarqa-Jordan
6
Department of Computer Science and Information Systems, Birkbeck College, University of London, London, United
Kingdom
Article Info
Article history:
Received Apr 25, 2020
Revised Aug 7, 2020
Accepted Aug 18, 2020
Keywords:
Authentication
Security
Substantiality
Trust
WPAN
ABSTRACT
New technologies and their seamless wireless interconnectivity bring along many chal-
lenges including security and privacy issues that require immediate attention. Wireless
personal area networks (WPANs) are characterized by limited energy resources and
computing power which call for lightweight security mechanisms in these networks as
a mandatory requirement. In this paper, a lightweight trust-based framework for node
authentication in WPAN is proposed. Our main objective is to minimise the effort
in distinguishing valid requests of trustworthy nodes from invalid requests of mali-
cious nodes that can result in network compromises. We achieve this through network
slicing which divides the network into primary and secondary virtual networks. The
proposed framework has three-fold benefits. Firstly, it authenticates nodes’ requests
based on a novel method of trust value calculation. Secondly, the framework maintains
energy efficiency while authenticating nodes’ requests to access WPAN resources. Fi-
nally, the framework provides a solution for the biasing problem that can arise due
to unexpected behaviour of malicious users in WPANs. The framework efficacy is
illustrated by using a case study to show how it can accurately capture trust relations
among nodes while preventing malicious behavior.
This is an open access article under the CC BY-SA license.
Corresponding Author:
Amjad Gawanmeh
College of Engineering and IT
University of Dubai, Dubai, UAE
Email: amjad.gawanmeh@ud.ac.ae
1. INTRODUCTION
Recent rapid advancements in wireless communications, sensor technologies, and the Internet of
things (IoT) have resulted in the evolution of wireless body area network (WBAN) and wireless personal area
networks (WPAN) into an interdisciplinary networking paradigm, connecting people with various real-time
applications including healthcare, sports, entertainment and social media [1–5]. WPAN is a very common and
prevailing technology that is used to monitor and collect data from a physical environment through sensors
that can be attached to the person, implanted, or deployed around the person’s confined area. While a WBAN
interconnects independent nodes (e.g. sensors and actuators) that are present in, on, or around a human body, a
Journal homepage: http://ijece.iaescore.com
2. 1376 r ISSN: 2088-8708
WPAN is a connected network of devices centered on an individual’s personal workspace. Due to their inherent
limitations in memory and power, they are vulnerable to malicious attacks since current security solutions are
not suitable to protect each node as well as dynamic topology of distributed data processing in WSN [6, 7].
Weak security in WSN can have an adverse impact that could even result in life-threatening condi-
tions in healthcare [6]. In addition, different types of short range wireless networks are constantly expanding
with various devices attached as demonstrated in [8]. The various types of WPANs applications raises sev-
eral issues related to preserving data confidentiality and privacy [9]. With the increased use of WPANs in
various applications that can impact both personal and professional life, it is important to build a lightweight
trust-based authentication framework for ensuring their security [10, 11]. With this aim, the focus of this
research is to propose a security framework to safeguard WPAN with a simplified and lightweight trust man-
agement mechanism. Several studies have demonstrated the feasibility of security attacks on these types of
networks [12], thus, WPAN is considered as a threat by individuals due to the existing vulnerabilities in pro-
tecting their personal data and privacy [13].
Traditional authentication and trust management methods of WPAN are ineffective and the current
security situation warrants an efficient lightweight security method with minimum overhead. Such a solution
must address several security concerns in WPANs: i) a malicious node in WPAN could abuse its resources
with selfish behavior; ii) a malicious node treated as a primary user could stop secondary nodes from using the
network; and iii) malicious nodes could create biased nodes with traditional trust management schemes as their
true trust values are not known. While trust in WPAN has been discussed in the current state of the art [14],
the method applied are not suitable for WPAN. Firstly, most trust-based schemes are applied only for routing
problem in WPANs and not for prevention of access to untrustworthy node. Secondly, due to the difficulty
in calculating the true trust values for biased nodes for authentication in WPAN context, there is paucity of
research to address this problem. Finally, to the best of our knowledge, no solution for authentication in WPAN
using trust management scheme exists to enhance security in WPANs using network slicing, where nodes
belong to either a primary or a secondary virtual group.
Several methods were proposed to address security in wireless application oriented networks, includ-
ing the work reported in [8], which addressed the issue of detecting impersonation attack in wireless WiFi.
Recently, time-bound lightweight frameworks that are services-based in processing security policies are stud-
ied [15]. Some security approaches are tool-based and focus on the network routing protocols as well as
authentication and encryption techniques [16]. Existing WPAN security methods are predominantly limited
in solving a specific problem [17, 13]. Many new models and metrics for trust evaluation proposed are not
generic and consider specific location-based privacy, backward broadcasting or tunnelling issues [18, 19]. Such
schemes require hybrid security architectures that use different algorithms for different problems. In previous
work, Sazia et al. [20] proposed trust-based authentication mechanism in cognitive radio networks (CRNs)
to secure the spectrum sharing process. However, it did not address trust-biasing problem. Subsequently,
Sazia et al. [21] proposed a community-based grouping technique to ensure the trust-based authentication pro-
cess in CRNs, and in [22] secondary node authentication in WBAN was introduced. However, it lacked the
proof of trust evaluation for authentication. Trust is important as it is a measure of a node’s reliability and
security within the network throughout its communication with other nodes. Other works have limited focus of
trust in healthcare applications for quality of data delivery and network operations [23].
This paper aims to address the issue of node authentication in WPANs in general. It proposes a novel
lightweight method that can enhance the security of WPAN taking into consideration the topology and nature
of the network paradigm. Existing solutions are resource extensive while WPAN do not have computational
power. Further, some nodes or implanted devices are difficult to be maintained with limited power supply,
and WPANs have dynamic and mobile characteristics. So far, WPAN can only support low security require-
ment applications, such as athletes’ wearables, and critical applications, such as continuous heart monitoring
devices. These form our research motivation in proposing a reliable lightweight security mechanism for node
authentication in WPANs.
2. NODE AUTHENTICATION IN WPANS BASED ON TRUST
In WPAN/WBAN, the sensors and devices might be wearable, implanted or used for personal mon-
itoring. Such sensors and monitoring devices are usually designed with minimal complexity and low power
consumption in order to maximize battery life. However, existing security primitive operations, such as hash-
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
3. Int J Elec & Comp Eng ISSN: 2088-8708 r 1377
ing and encryption, require powerful processing and high resources making them unsuitable for these sensors
and devices. Therefore, in this paper, we propose a lightweight framework for trust management and authenti-
cation of nodes in WPAN. The framework treats the WPAN as cognitive radio enabled wireless network, and
divides nodes into two types, primary user (PU) and secondary user (SU). PU is a trusted node in WPAN that
is physically secure, and SU is a node that cognitively operates through the WPAN without causing harmful
interference to the PU. In addition, there is a device that allows other wireless devices to connect to a wired
or wireless network using WiFi, or related standards. In addition, Further, our framework consists two units
called base stations, the primary user base station (PUBS) and secondary user base station (SUBS).
2.1. System model and architecture
Figure 1 depicts the proposed trust based authentication WPAN architecture by dynamically dividing
nodes into two groups: primary and secondary. This architecture fits well for WPAN due to the mobility of the
network and the dynamics of its topology that allows nodes to be part of the network based on several aspects,
including time, and location.
Figure 1. System architecture for the trust-based authentication framework for WPAN/WBAN
The key components of the framework include the (Base station) which acts as a point of contact
between primary nodes as well as secondary nodes. The architecture contains on primary user base station
(PUBS) that connects primary nodes, and a secondary user base station (SUBS) that connects secondary nodes.
In addition, the certificate authority (CA) is used to maintain trust values for all nodes as well as for updating the
trust repository whenever requested from the PUBS or SUBS. In addition, it plays a role in the authentication
process. Finally, Trust repository acts as a database for nodes’ trust values. Since the trust value is publicly
known, its integrity is achieved storing a private trust value for every node locally. The private trust value is
only visible to the CA so that it can be validated against any malicious modification.
2.2. Operation of trust-based authentication framework
This section shows how nodes can join the WPAN as secondary nodes using the proposed architecture.
Figure 2 shows the steps, where the node request is made by the node to the WPAN. The request is processed
into the BS, which in turn calculates a trust value for the node, and communicate it with the CA. The CA
first checks for biasing, and if detected, the biasing algorithm is used to handle this situation. Otherwise, the
authentication decision is made based on the calculated trust value. The decision is communicated, and the
trust value is updated if necessary.
The first step of the proposed method is to perform trust calculation for candidate nodes. When a
node wants to use the network resources i.e. as a secondary node, the SUBS calculates its corresponding
trust value. this is achieved by asking all member nodes of the SUBS to assign a trust value to the candidate
node. Once every member communicates back its recommended value, based on history of the node, the SUBS
aggregates the received trust values and obtains one for the candidate node. If the node is deemed trustworthy,
then it is either authenticated by the SUBS or the request is forwarded to the PUBS. In this case, the PUBS
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)
4. 1378 r ISSN: 2088-8708
also calculates the candidate node’s trust value to decide its eligibility to access the required resources. This
is done through the trust based authentication framework process as shown in Figure 2. Any calculated trust
value of the candidate node must be communicated to the CA to process it. Once a trust value is calculated,
authentication process is started. Authentication is performed based on trust value and a predefined threshold.
While processing trust value through the CA, a biasing check is performed, if the calculated trust value is
found biased, then SUBS handle this situation by marking nodes with improper trust value is biased. Trust
calculation, authentication, and biasing are discussed in more detail in the following two sections.
Node Request
BS Trust
Calculation
Trust processed
in CA
Bias Detection
Algorithm
Bias Resolution
Algorithm
Accept Node
Authentication
Decision
Reject Node
Figure 2. Trust based authentication framework
3. TRUST EVALUATION
In a real life scenario, large number of connected devices, such as wearable devices, smart devices,
WBSN nodes, devices with tags, etc get connected dynamically making trust calculation becomes a continuous
process. We define trust in WPAN as a degree of reliability and security that can be ensured when a SU
requests to access any PU’s node. In this context, trust is calculated for authenticating a SU’s request and
to determine whether the SU can be allowed to use a PU’s free spectrum or other network resources without
causing any security breach or malicious attack in the WPAN. In our proposed framework, we calculate the
candidate SU node’s trust comprehensively using the direct trust, indirect trust and integrated trust evaluation
models, which are described next. Our proposal differs from the methods adopted in literature [24, 25] as it is
uniquely modeled for WPAN. Figure 3 shows a scenario for trust evaluation models in our proposed framework
by depicting the different trust relationships between a candidate SU node and other member PU nodes. The
trust values calculated using three trust evaluation models, namely direct trust, indirect trust and integrated
trust, with trust values are in the range of 0 (complete distrust) and 1 (complete trust). In the next subsections,
we explain the process adopted in calculating the candidate node’s trust value using various scenarios of the
member node relationships established.
Node 1
Node 4
Node 3
Node 2
Direct trust
D
i
r
e
c
t
t
r
u
s
t
Direct trust
Indirect trust
Direct trust
Candidate
Node
Figure 3. A scenario for trust evaluation models
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
5. Int J Elec & Comp Eng ISSN: 2088-8708 r 1379
3.1. Direct trust value calculation
In this model, we evaluate the direct trust of a candidate node by proposing a computation method for
determining a quantitative direct trust value. The direct trust value of a node is calculated by other member
nodes if a direct relationship has been established between them via some past interaction and cooperation
experiences. Let us denote the direct trust value as TDirecttrust. In Figure 3, node 2 represents the candidate
SU node, and it has established direct communication links with both node 1 and node 4. Hence, node 1
and node 4 will use the direct trust evaluation model based on the past communication link to calculate the
candidate node’s trust value.
A candidate node’s direct trust value is determined based on the member nodes that have established a
direct communication link or cooperation. In a dynamic WPAN, the relationships between nodes keep chang-
ing. Hence, the trust values determined by the member nodes have to be constantly monitored by the base
station according to the users’ multi-attribute trust values. A historic record of information about all the past
communication links established are maintained in a table of cooperation records as shown in Table 1. The
candidate node’s trust value is calculated based on its attribute values. In our proposed approach, each at-
tribute has three values associated, namely the number of successes (Si, i = 1, 2....n), the number of failures
(Fi, i = 1, 2...n) and the amount of cooperation (Ci, i = 1, 2, ....n). We assume equal values assigned between
the users for cooperative/non-cooperative behavior during their interaction process.
Table 1. Cooperation record table
Attributes Success Failure Cooperation Sum
A1 S1 F1 C1
A2 S2 F2 C2
.... .... .... ....
An Sn Fn Cn
We define the cooperation sum used in Table 1 as the total sum of the number of successes and failures
of a candidate node’s request or event and is represented by Ci = Si + Fi, i = 1, 2, ...n. The trust value for
attribute Ai can be computed based on the values in Table 1 and then can be used to calculate the candidate
node’s overall trust value (denoted by TDirecttrust) with n attributes Ai, i = 1, 2, ..n by combining the trust
values for each attribute TAi
as follows:
TDirecttrust =
n
P
i=1
TAi
n
P
i=1
TAi +
n
P
i=1
(1 − TAi )
, where TAi
=
Si
Ci
, (1)
3.2. Indirect trust value calculation
In order to evaluate the indirect trust of a candidate node in the absence of any direct communication
link with another node, we consider the recommendations from the neighboring member nodes. The past
interactions between the surrounding member nodes and the candidate node is used to establish the indirect
trust value of the candidate node. In this model, each member node that does not have any past communication
link or cooperation experience with the candidate node will then make a request to other neighboring member
nodes for providing recommendations about the candidate node. By this method, the candidate node’s trust
is calculated indirectly Let us denote such an indirect trust value as TIndirecttrust. As shown in Figure 3,
node 3 has no direct communication link with the candidate node (node 2). However, node 3 has a direct
communication with node 1 and node 4. Hence, node 3 can facilitate a request to node 1 and node 4 to make
a recommendation about the candidate node. Therefore, the indirect trust evaluation model will be adopted for
node 3 to compute the candidate node’s trust value.
According to the second scenario of our trust evaluation model, where the member node does not have
direct communication link or cooperation established with the candidate node, an indirect trust value is calcu-
lated. In this case, the member node makes a request to other neighboring member nodes for recommendations
about the candidate node. We divide these surrounding nodes into three different types, namely reliable nodes
(trustworthy nodes), unknown nodes and unreliable nodes. Reliable nodes are those surrounding nodes that
have provided trustworthy recommendations in the past. Let (Treliable) denote the trust value recommended
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)
6. 1380 r ISSN: 2088-8708
by such reliable nodes. Unknown nodes are those surrounding nodes from whom the member node has not
solicited recommendations in the past. Let (Tunknown) represent the trust value recommended by these un-
known nodes. Based on history of events, if a neighboring node has provided incorrect recommendations in the
past, it is considered as an unreliable node. Let (Tunreliable) denote the trust value recommended by unreliable
nodes. In the Indirect Trust value calculation, the member node considers the recommendations from reliable
and unreliable nodes only and not from the unreliable nodes. In addition, a weight factor which represents the
degree of utility/importance based on the events that were monitored and quantified are given to distinguish
between the recommendations from reliable and unknown nodes. It is logical to expect a higher weight factor
assigned to reliable nodes’ recommendations as that of unknown nodes. The trust values of both Treliable and
Tunknown are required to be first calculated in order to determine the candidate node’s Indirect Trust value.
The process of calculating trust value from reliable nodes consists of two steps: i) the member node
retrieves the trust values stored locally from the reliable nodes they have directly evaluated; and ii) the member
node receives trust values from reliable nodes who have provided the recommendations about the candidate
node’s trust value. The member node combines all these trust values and computes Treliable using 2.
Treliable =
nreliable
P
i=1
TMRi
× TRCi
nreliable
(2)
where TMRi denotes the trust value from member node (M) to i th reliable node (R);
TRCi
denotes the trust value from reliable node (R) to candidate node (C) and
nreliable denotes the total number of reliable nodes.
Next, the trust values from unknown nodes Tunknown are calculated using 3.
Tunknown =
nunknown
P
k=1
TUCk
nunknown
(3)
where TUCk
denotes the trust value from kth unknown node to candidate node and
nunknown denotes the total number of unknown nodes.
Let us denote a weight Wreliable to be allocated to the reliable nodes’ trust value Treliable and a weight
Wunknown to be assigned to unknown nodes’ trust value Tunknown. We use the approach given in [Reference
thesis] to allocate the weights, Wreliable and Wunknown.
We adopt the traditional weighted approach to calculate the candidate node’s overall Indirect Trust
value as follows, where Wreliable + Wunknown = 1 and Wreliable, Wunknown ∈ [0, 1]:
TIndirecttrust = TreliableWreliable + TunknownWunknown (4)
3.3. Integrated trust value calculation
It is typical that WPAN exhibits dynamic situations from time to time, establishing direct as well as
indirect communication links between the nodes. An integrated trust evaluation model is proposed here for
situations where both direct and the indirect trust values have been computed. In this model, we combine both
direct trust and indirect trust values from member nodes in order to compute the candidate node’s overall trust
value indirectly. Let us denote the integrated trust value as Tig. In Figure 3, both node 1 and node 4 has
established both direct and indirect communication links with the candidate node (node 2). Therefore, node 1
and node 4 will adopt the integrated trust evaluation model to combine the direct trust as well as Indirect Trust
values computed from both links for determining the candidate node’s overall trust value.
In the third scenario of trust evaluation model of our proposed framework, the Integrated Trust value
of a candidate node is calculated for situations when the candidate node has established both direct and indirect
communication links with member nodes. In this case based on the requirements of a certain task, each member
node assigns different weights using the weighted approach. Let us denote Wdt as the weight for the direct
trust value and Wit as the weight for the indirect trust value. Then, the candidate node’s Integrated Trust value
is calculated by the following equation, where Wdt + Wit = 1 and Wdt, Wit ∈ [0, 1]
Tig = Wdt × Tdt + Wit × Tit (5)
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
7. Int J Elec & Comp Eng ISSN: 2088-8708 r 1381
These calculations determine if a cooperation between nodes have taken place and each member node updates
the Integrated Trust value of its cooperation node (candidate node) accordingly. The SUBS can now make a
decision on an SU’s request to authenticate access to PU’s network based on the above calculated trust value.
While the above trust evaluation model works for existing SU in the network, it does not cater to situations
when a new user who has securely joined a secondary network of the WPAN makes a request to access the
PU’s network, This is because the trust value may not be available with the PUBS or other PUs. Hence, we
propose a bootstrapping method to address such a new SU case scenario in the next subsection.
3.4. Bootstrapping of trust value calculation
We propose a bootstrapping method for the PUBS to determine the trust value for a newly joined SU
under two main methods: i) Triangular Trust value calculation; and ii) Reference Trust value calculation. The
algorithm for bootstrapping a new SU’s trust value is provided in the following three steps:
−A newly joined SU requests the SUBS to access the PU’s free spectrum. This request is subjective to
the trust value determined by the SUBS and is based on: i) its joining process to the secondary network;
and ii) its behaviour pattern observed for a certain period of time. On successful completion of this
authentication process, the SUBS sends the request to the PUBS for further action.
−When the PUBS receives the request from the SUBS for the SU to access the primary network, the
authentication is based on the SU’s trust value. At this stage, since the SU node has no trust value with
either the PUBS or the other PUs, triangular trust value calculation method is invoked, which is based on
the trust relationship between the PUBS and SUBS.
−There are two pathways: i) a trust relationship exists between PUBS and SUBS-SU’s trust value is based
on the triangular trust value calculation method; or ii) no trust relationship exists between the SUBS and
PUBS-trustworthy member nodes in the secondary network are used by the PUBS and the SU’s trust
value is based on reference trust value calculation method.
We provide a detailed algorithm of trust value calculations under both triangular trust and reference
trust methods in the following subsections.
3.4.1. Triangular trust value calculation
This bootstrapping method is used when some trust relationship exists between the SUBS and PUBS.
The triangular trust calculation method is used here to determine the trust value of a new SU when it has a
relationship with the SUBS but not with the PUBS. Let us assume the trust relationship between PUBS −→
SUBS; SUBS −→ SU1 for calculating the trust value of the SU node (SU1), and denote TP UBS,SU1 as the
trust value of the PUBS for the SU node (SU1). Assuming the trust value between PUBS and SUBS to be 0.8,
and the trust value between SUBS and SU1 to be 0.7, we have TP UBS,SUBS = 0.8 and TSUBS,SU1 = 0.7, we
can calculate the Triangular Trust value between the PUBS and SU1 as follows:
TP UBS,SU1 = TP UBS,SUBS ∗ TSUBS,SU1 = 0.8 ∗ 0.7 = 0.56
3.4.2. Reference trust value calculation
This bootstrapping method is used in cases where there is no relationship between PUBS and SUBS.
The reference trust value calculation for a newly joined SU is based on the recommendations from other users.
The difference here from the indirect trust value calculation method is that the SUs and not the PUs request
for recommendations from the PUBS. Here, various trust values received are collected and the average of these
values are computed to determine the overall trust value for the new SU. As shown in Figure 4, let us assume
the trust relationship between different nodes such that PUBS trusts SU2 and SU3 with a value of 0.5 and 0.6,
respectively, and SU1 who is a newly joined SU has a trust value of 0.5 with SU2 and 0.4 with SU3. In this
case, the average trust value between the PUBS and SU1 is determined as follows:
TP UBS,SU1 =(TP UBS,SU2 ∗ TSU2,SU1 + TP UBS,SU3 ∗ TSU3,SU1))/2 = (0.5 ∗ 0.5 + 0.6 ∗ 0.4)/2 =
0.249 =⇒ 0.25
Finally, the PUBS decides to declare whether the SU node (SU1) is trustworthy or not based on
whether the above computed trust value (either through Triangular Trust relationship or Reference Trust rela-
tionship) is greater than the predefined threshold value (Tthreshold) or not. Hence, the predefined threshold
value plays a major role in determining the minimum level of trust required by the PUBS.
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)
8. 1382 r ISSN: 2088-8708
PUBS
SU3
SU1
SU2
0.5
0.5
0.6 0.4
0.25
Figure 4. A new SU node within a reference trust relationship
4. AUTHENTICATING AND BIASING PROBLEM RESOLUTION
If a node is eligible to access the network resources, then, it will authenticated by the BS. This is done
by having the SUBS compares the computed trust value, T, against the predefined threshold, (Tthreshold). The
candidate node is authenticated only if its trust value is greater than the required threshold, otherwise it request
is rejected. On the other hand, the SUBS may forward the request to the PUBS, which also obtains the node’s
trust value and validates it against the authentication threshold. The node is authenticated only if it has trust
value higher than the threshold. There are several advantages of adopting this mechanism. First, the network
can support two levels of authentication. Second, certain nodes might be authenticated for certain resources
but not for others, and finally, the threshold of authentication can be adjusted in order to relax or strict access
based on how critical the application is.
Biasing may occur only at the SUBS, therefore, it is processed by the SUBS by asking the CA to pro-
vide the current candidate node’s trust value, if there is one. The SUBS also obtain a trust recommended values
from member nodes. The CA validates the candidate node’s trust value it has through the public and private
repositories, and communicates a validated one to the SUBS. The SUBS compares the computed received value
from CA with the calculated one through members. If there is a difference, then the SUBS mark the candidate
node’s trust value as biased. SUBS then check the value communicated from members node before and after
the biasing occurs. The SUBS then reports nodes that provide different trust values are ‘malicious node’ or
‘biased by a malicious node’. This information is communicated to all of SUBS member nodes.
Tdt =
n
P
i=1
TAi
n
P
i=1
TAi
+
n
P
i=1
(1 − TAi
)
=
0.57 + 0.71 + 0.42
(0.57 + 0.71 + 0.42) + (1 − 0.57) + (1 − 0.71) + (1 − 0.42)
= 0.56
(6)
Treliable =
nreliable
P
i=1
TMRi
× TRCi
nreliable
=
0.45 ∗ 0.5 + 0.6 ∗ 0.45 + 0.5 ∗ 0.7
3
= 0.28 (7)
5. PERFORMANCE EVALUATION
We assume that none of the nodes is biased. The input parameters for the two networks are the
number candidate nodes, the number of nodes in the network, and the threshold for trust. The first network acts
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
9. Int J Elec & Comp Eng ISSN: 2088-8708 r 1383
as secondary network and has 5 nodes. The second network acts as a primary network and also has 5 member
nodes and one base station. We also assume that each has 3 criteria for trust. We also assume that a threshold
trust value of 0.6 is initially used. Trust value calculation is conducted by members in the two networks using
direct trust, and then communicated with the base station. The final trust value is them calculated by the base
station and sent to the CA. The final trust value is then used to check for biasing make a decision about user
authentication.
In this section we demonstrate authentication based on the trust value, where we consider three cases
for node validation in both networks, in the first we address node authentication is granted in the secondary
network, then node authentication is granted in the primary network, and finally, node authentication is denied.
For authentication in the secondary network, we assume that node 2 is the candidate node in the secondary
network, and that the rest of nodes will provide their trust recommendation about node 2 to the secondary
network base station. It is also assumed that nodes are fair and not biased. We conducted simulation by
generating 100 repetitive cases for the success and failure for each time period for three criteria, where trust
value for the candidate node is assigned using equations 1 and 6. The trust values of the candidate node
recommended from the four nodes in the secondary network for different time periods are shown in Table 2.
Therefore, the average trust value of the candidate node for every criteria can be calculated. For instance for
the first criteria it is equal to : 0.81+0.32+0.76+0.99
4 = 0.72. Then, the final trust value of the candidate node
calculated from the using the three different criteria as :0.72+0.67+0.45
3 = 0.61.
Table 2. Recommended trust value calculated from nodes in the secondary network using three criteria
Candidate Node Node number in ‘Network 1’ Criteria 1 Criteria 2 Criteria 3
4*Node 2 1 0.818 0.996 0.645
3 0.321 0.045 0.998
4 0.763 0.316 0.959
5 0.996 0.855 0.487
In the next step, the computed trust value is compared with the trust threshold and the decision is
made based on this comparison, as shown in Table 3. Since he computed final trust value of 0.61 is larger than
the threshold value of 0.6, the SUBS authenticates the candidate node to accept its request to use the network
resources or forwards its request to the secondary network as shown in Table 3.
Table 3. Authentication of candidate node in the secondary network
Candidate node Trust Value of Candidate node Final trust value Threshold value ≥ threshold ? Decision
Criteria 1 Criteria 2 Criteria 3 3*
Node 2 0.72 0.67 0.45 0.61 0.6 Yes Request is
Network 1’ authenticated
or forwarded to
‘ ‘Network 2’
For authentication in the primary network, we demonstrate an authentication request for a candidate
node for the resources in the primary network. We assume that the primary network has five nodes and three
criteria, where node 5 is assumed to be the candidate node. The member nodes of the primary network calculate
the trust value for node 5 using direct trust from different time periods using three criteria as illustrated in Table
4. The average trust value of the candidate node for each criteria is calculated, for instance, for criteria 1 it
is 0.59+0.95+0.76+0.93
4 = 0.81. The base station calculates the final trust value using :0.81+0.55+0.77
3 = 0.71,
which is then communicates it to the CA. This value is also used compared with the threshold of 0.6, and as a
result, the candidate node is granted access to the primary network as illustrated in Table 5.
In this example we show request rejected case, where the same steps in the first case are performed,
where node number 2 in the secondary network is the candidate node. Table 5 shows the final calculated trust
value of 0.3 is less than the threshold value, therefore, the request is not authenticated in the secondary network.
In other words, the candidate node is not considered valid and in its own network, therefore, the base station of
the secondary network does not forward the request to access the primary network resources. Next, we consider
the biased nodes case where a number of biased nodes takes part in the authentication process of certain nodes.
This example will show how biasing is detected, and how the base station resolves this issue along with the CA.
We assume that the secondary network has 5 nodes, and that node 3 is the candidate node. We will also assume
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)
10. 1384 r ISSN: 2088-8708
that some member nodes will intentionally assign biased trust values for the candidate node. Once biasing is
detected, resolution is performed by the network as demonstrated.
Table 4. Recommended trust value calculated from nodes using three criteria in primary network
Candidate Node Node number in ‘Network 2’ Criteria 1 Criteria 2 Criteria 3
4*Node 5 1 0.599 0.996 0.645
3 0.960 0.045 0.998
4 0.765 0.316 0.959
5 0.931 0.855 0.487
Table 5. Recommended trust value calculated from nodes using three criteria in primary and secondary
networks
Candidate node Trust Value of Candidate node Final trust value Threshold value ≥ threshold ? Decision
Criteria 1 Criteria 2 Criteria 3 3*
Node 2 in 0.81 0.55 0.77 0.71 0.6 Yes Request is
‘Network 1’ authenticated
Node 4 in 0.21 0.33 0.47 0.33 0.6 No Request is
‘Network 1’ Declined
The candidate node’s trust value is calculated by the member nodes in ‘Network 1’, where all member
nodes are fair. For criteria 1, four nodes in ‘Network 1’ assign a trust value to the candidate node accordingly,
as shown in Table 6 shows trust value for candidate node 3 before biasing. The final trust value for the candidate
node as calculated by the base station in the secondary network is 0.8056+0.7842+0.5032
3 = 0.6976. This value
is communicated to the CA, which stores it as the same for private value and public value for each node in the
database before biasing. Assuming that member node 5 is biased, and that it will assign false trust values for
the candidate node, the base station calculates the final trust value for node 3 in network 1 becomes 0.69, 0.93,
and 0.57 for the three criteria with final value of 0.80, which is different from the trust value computed before
biasing takes place. Once this trust value is communicated with the CA, it will be detected as biased due to
large difference. In order to resolve this problem, the CA identifies all the trust values for all member nodes
in both networks in the repository and forwards the information to the base station in the secondary network
where biasing was initiated. This example shows how the biased value is detected in the secondary network.
Once a biasing is detected, the case station checks for the trust value assigned by its nodes for all criteria as
illustrated in Table 7, which shows that node 5 was biased with its trust assignment. Therefore, the secondary
network base station communicates this information to all nodes in the network and excludes the biased node
from further contributions in the trust calculation.
Table 6. Trust value calculated in secondary network using three criteria
Candidate Node number Criteria 1 Criteria 2 Criteria 3
Node in ‘Network 1’
4*Node 2 1 0.701 0.998 0.555
2 0.983 0.787 0.582
4 0.973 0.983 0.182
5 0.584 0.376 0.725
Table 7. Trust value calculated for biasing detection in secondary network for different criteria
Criteria Criteria Node number Trust value before biasing Trust value after biasing Similar Decision
4*1 Node 1 0.7016 0.7016 Yes Not biased
Node 2 0.9833 0.9833 Yes Not biased
Node 4 0.9737 0.9737 Yes Not biased
Node 5 0.5843 0.9999 No Biased
4*2 Node 1 0.9982 0.9982 Yes Not biased
Node 2 0.7866 0.7866 Yes Not biased
Node 4 0.9833 0.9833 Yes Not biased
Node 5 0.3760 0.9999 No Biased
4*3 Node 1 0.5554 0.5554 Yes Not biased
Node 2 0.5826 0.5826 Yes Not biased
Node 4 0.1822 0.1822 Yes Not biased
Node 5 0.7253 0.9999 No Biased
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
11. Int J Elec & Comp Eng ISSN: 2088-8708 r 1385
6. CONCLUSION
In WPANs, certain untrustworthy nodes may have unauthorized access to certain resources due to
high mobility of nodes. This affects the normal operation of the WPAN, as well as the ability to manipulate
data being collected and is crucial if the data is either sensitive or used in mission critical decisions. In addition,
any malicious activity by untrustworthy nodes can degrade the network performance and may cause malfunc-
tioning of the whole WPAN. Since WPANs operate with sensors and devices that have resource limitations,
a lightweight secure communication of nodes in WPANs is the main focus in this work as compared to other
wireless paradigms, such as WiFi. This paper proposed a trust-based framework for authentication in WPAN
that uses the concept of network slicing in order to virtually treat the WPAN as two separate entities: primary,
and secondary networks. The method is based on obtaining an evaluation of trust for nodes that are willing to
join the WPAN. A method is provided in order to maintain trust repository which is used to overcome bias-
ing problem that arise from trust based authentication. The proposed trust based framework was shown to be
lightweight and therefore can help in attaining secure communication among sensors and devices in WPAN.
REFERENCES
[1] L. Chen, S. Thombre, K. J”arvinen, E. S. Lohan, A. Al’en-Savikko, H. Lepp”akoski, M. Z. H. Bhuiyan,
S. Bu-Pasha, G. N. Ferrara, S. Honkala, “Robustness, security and privacy in location-based services for
future iot: A survey,” IEEE Access, vol. 5, pp. 8956-8977, 2017.
[2] G. Sharma and S. Kalra, “A secure remote user authentication scheme for smart cities e-governance
applications,” Journal of Reliable Intelligent Environments, vol. 3, no. 3, pp. 177-188, 2017.
[3] W. Liu, K. Nakauchi, and Y. Shoji, “A neighbor-based probabilistic broadcast protocol for data dissemi-
nation in mobile iot networks,” IEEE Access, vol. 6, pp. 12 260-12 268, 2018.
[4] A. Gawanmeh and A. Alomari, “Taxonomy analysis of security aspects in cyber physical systems appli-
cations,” IEEE International Conference on Communications Workshops, pp. 1-6, 2018.
[5] B. Maram, J. Gnanasekar, G. Manogaran, and M. Balaanand, “Intelligent security algorithm for unicode
data privacy and security in iot,” Service Oriented Computing and Applications, vol. 13, no. 1, pp. 3-15,
2019.
[6] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in internet-of-things,”
IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250-1258, 2017.
[7] J. JIANG and H. Guangjie, “Survey of trust management mechanism in wireless sensor network,” Netinfo
Security, vol. 20, no. 4, p. 12, 2020.
[8] M. E. Aminanto, R. Choi, H. C. Tanuwidjaja, P. D. Yoo, and K. Kim, “Deep abstraction and weighted
feature selection for wi-fi impersonation detection,” IEEE Transactions on Information Forensics and
Security, vol. 13, no. 3, pp. 621–636, 2018.
[9] D. He, S. Zeadally, N. Kumar, and J.-H. Lee, “Anonymous authentication for wireless body area networks
with provable security,” IEEE Systems Journal, 2016.
[10] F. Rahman, M. E. Hoque, and S. I. Ahamed, “Anonpri: A secure anonymous private authentication pro-
tocol for rfid systems,” Information Sciences, vol. 379, pp. 195-210, 2017.
[11] S. Mowla, N. Sinha, R. Ganiga, and N. P. Shetty, “Trust enhanced role based access control using genetic
algorithm,” International Journal of Electrical and Computer Engineering, vol. 8, no. 6, pp. 4724-4734,
2018.
[12] S. Chaudhary, A. Singh, and K. Chatterjee, “Wireless body sensor network (wbsn) security and privacy
issues: A survey,” International Journal of Computational Intelligence and IoT, vol. 2, no. 2, 2019.
[13] R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, “A lightweight privacy-preserving data aggregation
scheme for fog computing-enhanced iot,” IEEE Access, vol. 5, pp. 3302-3312, 2017.
[14] K. Saleem, K. Zeb, A. Derhab, H. Abbas, J. Al-Muhtadi, M. A. Orgun, and A. Gawanmeh, “Survey on
cybersecurity issues in wireless mesh networks based ehealthcare,” IEEE 18th International Conference
on e-Health Networking, Applications and Services (Healthcom), pp. 1–7, 2016.
[15] V. Sharma, K. Lee, S. Kwon, J. Kim, H. Park, K. Yim, and S.-Y. Lee, “A consensus framework for
reliability and mitigation of zero-day attacks in iot,” Security and Communication Networks, vol. 2017,
2017.
[16] C. Deepa and B. Latha, “Hhsrp: A cluster based hybrid hierarchical secure routing protocol for wireless
sensor networks,” Cluster Computing, pp. 1-17, 2017.
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)
12. 1386 r ISSN: 2088-8708
[17] N.-N. Dao, Y. Kim, S. Jeong, M. Park, and S. Cho, “Achievable multi-security levels for lightweight
iot-enabled devices in infrastructureless peer-aware communications,” IEEE Access, vol. 5, pp. 26743-
26753, 2017.
[18] Y. Wang, Z. Cai, X. Tong, Y. Gao, and G. Yin, “Truthful incentive mechanism with location privacy-
preserving for mobile crowdsourcing systems,” Computer Networks, vol. 135, pp. 32-43, 2018.
[19] I. Ullah, M. A. Shah, A. Wahid, A. Mehmood, and H. Song, “Esot: A new privacy model for preserving
location privacy in internet of things,” Telecommunication Systems, vol. 67, no. 4, pp. 553-575, 2018.
[20] S. Parvin, S. Han, B. Tian, and F. Hussain, “Trust-based authentication for secure communication in
cognitive radio networks,” Int. Conference on Embedded and Ubiquitous Computing, pp. 589-596, 2010.
[21] S. Parvin and F. K. Hussain, “Trust-based security for community-based cognitive radio networks,” IEEE
26th Int. Con. on Advanced Information Networking and Applications (AINA), pp. 518-525, 2012.
[22] S. Parvin, A. Gawanmeh, S. Venkatraman, A. Alwadi, and J. N. Al-Karaki, “Efficient lightweight mecha-
nism for node authentication in wbsn,” Advances in Science and Engineering Technology International
Conferences (ASET), pp. 1-6, 2018.
[23] A. Gawanmeh and Y. Iraqi, “Formal analysis of collision prevention of two wireless personal area net-
works,” Procedia Computer Science, vol. 80, pp. 2362-2366, 2016.
[24] A. R. Dhakne and P. N. Chatur, “Tcnpr: Trust calculation based on nodes properties and recommenda-
tions for intrusion detection in wireless sensor network,” International Journal of Computer Science and
Network Security (IJCSNS), vol. 16, no. 12, p. 1, 2016.
[25] Z. Ye, T. Wen, Z. Liu, X. Song, and C. Fu, “An efficient dynamic trust evaluation model for wireless
sensor networks,” Journal of Sensors, vol. 2017, 2017.
BIOGRAPHIES OF AUTHORS
Sazia Parvin is a Lecturer at Melbourne Polytechnic in Information Technology, Victoria. She is
working as adjunct fellow as data and system security researcher at the School of Business, UNSW,
Canberra. Her research interests include network security, trust management, cyber systems, cloud
computing, big data analytics, system software and intelligent information systems. Her research is
published in various top ranked publications. She has published over 27 research papers in her fields
of interest as journals and international conferences. She is an Associate Editor for International Jour-
nal of Computer System Science and Engineering (IJCSSE) and International Journal of Engineering
Intelligent Systems (IJEIS). She has achieved several prestigious Research Grants from Australia
and South Korea. She is also the recipient of the ’Gold Medal’ Bachelor of Computer Science and
Engineering Award from Jahangirnagar University in 2004.
Amjad Gawanmeh (M’2011, Sm’2017) is an Associate Professor at the University of Dubai, UAE
and affiliate Adjunct professor, Concordia University Montreal, Canada. He has two edited books,
3 book chapters, more than 25 peer reviewed Scopus indexed journal papers, and more than 50 peer
reviewed conference papers. He was visiting scholar at Syracuse University, University of Quebec,
and Concordia University. He is the Editor in Chief for the International Journal of Cyber-Physical
Systems (IJCPS) IGI, an associate editor for IEEE Access Journal, and for Human-centric Computing
and Information Sciences Journal, Springer. He acted as guest editor for several special issues. He
is on the reviewer board for several journals in IEEE, Elsevier, Wiley, and many others. He acted as
a member of the executive committee for IPCCC conference. He has co-chaired several conference
workshops and special sessions organized in key conferences. He is an IEEE senior member.
Sitalakshmi Venkatraman is currently the Information Technology Lecturer and Discipline Leader
for Business Information Systems at the School of Engineering, Construction & Design, Melbourne
Polytechnic, Australia. She earned her PhD in Computer Science, with a doctoral thesis titled “Effi-
cient Parallel Algorithms for Pattern Recognition”, from National Institute of Industrial Engineering
in 1993. In the past 25 years, Sita’s work experience involves both industry and academics - devel-
oping turnkey projects for IT industry and teaching a variety of IT courses for tertiary institutions, in
India, Singapore, New Zealand, and more recently in Australia since 2007.
Int J Elec & Comp Eng, Vol. 11, No. 2, April 2021 : 1375 – 1387
13. Int J Elec & Comp Eng ISSN: 2088-8708 r 1387
Ali Alwadi is a graduated master student in electrical and computer engineering from Auckland Uni-
versity of Technology Auckland, New Zealand. He earned his MASC in engineering in 2017. Before
that, he gradated from Yarmouk university, Irbid, Jordan in electrical and computer engineering. He
worked in companies in the area of telecommunication and computer engineering in Jordan and New
Zealand. He currently works as a technical Consultant for Bravura Solutions in New Zealand.
Jamal N. Al-Karaki (M’96, SM’12) received the Ph.D. degree from Iowa State University. He is an
accomplished information security and technology expert with more than 15 years of versatile IT ex-
perience and expertise in corporate systems and network security architecture and management along
with IT projects management, network and IT infrastructure design and implementation, and change
management throughout the project life cycle in public and private sectors. He is the Co-Founder and
Division Head of Information Security Engineering Technology with Abu Dhabi Polytechnic (AD-
Poly), Abu Dhabi, United Arab Emirates Before Joining ADPoly in 2012, he served as the Dean, the
Department Head, the IT Manager, and the Principal Researcher in multinational environments. He
has authored or co-authored over 50 published refereed technical articles in scholarly international
journals and proceedings of international conferences.
Paul Yoo Paul is currently with the CSIS within Birkbeck College at the University of London and
leading BIDA Data-Driven Cyber Security Laboratory. Prior to this, he held academic/research posts
in Cranfield (Defence Academy of the UK), Sydney (USyd) and South Korea (KAIST). In his career,
he has amassed more than 100 prestigious journal and conference publications, has been awarded
more than US$ 2.5 million in project funding, and a number of prestigious international and na-
tional awards for his work in advanced data analytics, machine learning and secure systems research,
notably IEEE Outstanding Leadership Award, Capital Markets CRC Award, Emirates Foundation
Research Award, and the ICT Fund Award. Most recently, he won the prestigious Samsung award
for research to protect IoT devices using machine-learning approach and Research England’s Global
Challenge Research Fund (GCRF) for research to protect global environment (e.g. marine resources)
using edge intelligence techniques.
A trust-based authentication framework for security of WPAN using network slicing (Sazia Parvin)