Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

An enhanced AES-GCM based security protocol for securing the IoT communication

https://doi.org/10.17586/2226-1494-2023-23-4-711-719

Abstract

In the recent years, the devices in Internet of Things (IoT) are growing exponentially due to the emergence of many sophisticated applications. This tremendous growth leads to serious security challenges and the devices of Wireless Sensor Networks should be protected from various attacks. IoT can be confgured dynamically without fxed infrastructure and the devices are communicated with one another in an Ad-hoc manner. The work presents the classifcation of various DDoS attacks in the IoT environment and provides a solution for replay attack. All variations of DDoS attacks are modeled using UML based activity modeling. This clearly understands the behavior of each version of attacks and their performance in the environment. The modeling also helps to construct a solution to prevent this attack from its execution. The work also proposed a trust based protocol for replay attacks which allows the attack inside the network and blocks it after identifying the attack based on its specifc behavior. The network performance is improved after implementing this proposed protocol inside the network with help of simulation under realistic conditions. The performance metrics considered in the work are energy, packet loss, computational time and throughput. The paper compares the performance with the state-of-the-art schemes such as Effcient Distributed Deterministic Key and Hash-based Message Authentication Code. The experimental analysis proved that the proposed scheme outperforms the other state-of-the-works in terms of computational cost, throughput, and delay

About the Authors

A. B. Feroz Khan
Syed Hameedha Arts and Science College
India

A.B. Feroz Khan — PhD, Assistant Professor

sc 57209466258

Kilakarai, Ramanathapuram, 623806



S. Kalpana Devi
RV University
India

S. Kalpana Devi — Assistant Professor

sc 57211952643

Bengaluru, 560059



K. Rama Devi
Panimalar Engineering College
India

K. Rama Devi — PhD, Associate Professor

sc 56708714800

Chennai, 600069



References

1. Rao N.S.V., Poole S.W., Ma C.Y.T., He F., Zhuang J., Yau D.K.Y. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Analysis, 2016, vol. 35, no. 4, pp. 602– 616. https://doi.org/10.1111/risa.12362

2. Wang J., Yang G., Sun Y., Chen S. Defending against Sybil attacks based on received signal strength in wireless sensor networks. Chinese Journal of Electronics, 2008, vol. 17, no. 4, pp. 611–614.

3. Khan G.A., Anandharaj G. A Cognitive energy effcient and trusted routing model for the security of wireless sensor networks: CEMT. Wireless Personal Communications, 2021, vol. 119, no. 4, pp. 3149– 3159. https://doi.org/10.1007/s11277-021-08391-6

4. Meena U., Sharma A. Secure key agreement with rekeying using FLSO routing protocol in wireless sensor network. Wireless Personal Communications, 2018, vol. 101, no. 2, pp. 1177–1199. https://doi.org/10.1007/s11277-018-5755-9

5. Renold A.P., Ganesh A.B. Energy effcient secure data collection with path-constrained mobile sink in duty-cycled unattended wireless sensor network. Pervasive and Mobile Computing, 2019, vol. 55, pp. 1–12. https://doi.org/10.1016/j.pmcj.2019.02.002

6. Vasudeva A., Sood M. Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, 2018, vol. 120, pp. 78–118. https://doi.org/10.1016/j.jnca.2018.07.006

7. Verma R., Darak S.J., Tikkiwal V., Joshi H., Kumar R. Countermeasures against jamming attack in sensor networks with timing and power constraints. Proc. of the 11th International Conference on Communication Systems & Networks (COMSNETS), 2019, pp. 485–488. https://doi.org/10.1109/comsnets.2019.8711437

8. Fadele A.A., Othman M., Hashem I.A.T., Yaqoob I., Imran M., Shoaib M. A novel countermeasure technique for reactive jamming attack in internet of things. Multimedia Tools and Applications, 2019, vol. 78, no. 21, pp. 29899–29920. https://doi.org/10.1007/s11042-018-6684-z

9. Jia L., Xu Y., Sun Y., Feng S., Anpalagan A. Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wireless Communications, 2018, vol. 25, no. 6, pp. 120–128. https://doi.org/10.1109/mwc.2017.1700363

10. Korzhuk V., Groznykh A., Menshikov A., Strecker M. Identifcation of attacks against wireless sensor networks based on behaviour analysis. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2019, vol. 10, no. 2, pp. 1–21. https://doi.org/10.22667/JOWUA.2019.06.30.001

11. Yao Y., Xiao B., Wu G., Liu X., Yu Z., Zhang K., Zhou X. Multichannel based sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Transactions on Mobile Computing, 2019, vol. 18, no. 2, pp. 362–375. https://doi.org/10.1109/tmc.2018.2833849

12. Gezici S., Bayram S., Kurt M.N., Gholami M.R. Optimal jammer placement in wireless localization systems. IEEE Transactions on Signal Processing, 2016, vol. 64, no. 17, pp. 4534–4549. https://doi.org/10.1109/tsp.2016.2552503

13. Sun H., Chen C., Hsu S. Mobile jamming attack and its countermeasure in wireless sensor networks. Proc. of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), 2017, pp. 457–462. https://doi.org/10.1109/ainaw.2007.255

14. Muraleedharan R., Osadciw L.A. Jamming attack detection and countermeasures in wireless sensor network using ant system. Proceedings of SPIE, 2006, vol. 6248, pp. 62480G. https://doi.org/10.1117/12.666330

15. Strasser M., Danev B., Čapkun S. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks, 2010, vol. 7, no. 2, pp. 1–29. https://doi.org/10.1145/1824766.1824772

16. Sasikala E., Rengarajan N. An intelligent technique to detect jamming attack in wireless sensor networks (WSNs). International Journal of Fuzzy Systems, 2015, vol. 17, no. 1, pp. 76–83. https://doi.org/10.1007/s40815-015-0009-4

17. Alaba F.A., Awodele O., Afolabi I. Security challenges in internet of things (IoT) enabled healthcare systems. Proc. of the 2017 International Conference on Computing Networking and Informatics. IEEE, 2017, pp. 1–7.

18. Kumar P.H., AnandhaMala G.S. HMAC-R: Hash-based message authentication code and Rijndael-based multilevel security model for data storage in cloud environment. Journal of Supercomputing, 2023, vol. 79, no. 3, pp. 3181–3209. https://doi.org/10.1007/s11227-022-04714-x

19. Zhang X., He J., Wei Q. EDDK: Energy-effcient distributed deterministic key management for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2011, no. 1, pp. 765143. https://doi.org/10.1155/2011/765143

20. Chaganti R., Bhushan B., Ravi V. A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions. Computer Communications, 2023, vol. 197, pp. 96–112. https://doi.org/10.1016/j.comcom.2022.10.026


Review

For citations:


Feroz Khan A.B., Kalpana Devi S., Rama Devi K. An enhanced AES-GCM based security protocol for securing the IoT communication. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2023;23(4):711-719. https://doi.org/10.17586/2226-1494-2023-23-4-711-719

Views: 14


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)