COMPLEX TECHNIQUE FOR DETECTION AND ANALYSIS OF SECURITY INCIDENTS IN WIRELESS SENSOR NETWORKS
https://doi.org/10.55452/1998-6688-2025-22-4-40-59
Abstract
The article comprises issues of cyber-physical security of wireless sensor networks (WSN). Modern WSNs are vulnerable to a wide class of attacks, such as sinkhole and wormhole attacks, man-in-the-middle attacks, data substitution attacks, universal network attacks, etc. In practice, the ability to protect WSNs from this type of attacks is hampered by the variety of possible impacts, highly specialized focus of the infrastructure and limited resources of network nodes. This article proposes a comprehensive technique for identifying security incidents in WSNs for effective attack detection and incident response, which will minimize potential damage and ensure uninterrupted network operation. The novelty of the technique includes its complexity, the ability to identify various cyber-physical threats and ensure high accuracy and completeness of incident detection, taking into account the distributed structure and dynamics of changes in the composition of WSN nodes. The technique has been tested on a WSN fragment operating on the ZigBee protocol to monitor the characteristics of the atmospheric air of an industrial facility or a city. The developed technique will help improve the quality and timeliness of detecting security incidents in wireless sensor networks, which will enhance the resilience of networks to external and internal malicious influences and prevent long-term interruptions in the operation of the infrastructure in the event of successful attacks.
About the Authors
Т. К. ZhukabayevaKazakhstan
PhD, Professor
Astana
E. M. Mardenov
Kazakhstan
MSc
Astana
A. Тanirbergenov
Kazakhstan
PhD, acting Associate Professor
Astana
References
1. Alansari, Z., Anuar, N.B., Kamsin, A., Belgaum, M.R. A systematic review of routing attacks detection in wireless sensor networks. PeerJ Computer Science, 8, e1135 (2022).
2. Kaushal, K., Kaur, T. A survey on attacks of WSN and their security mechanisms. International Journal of Computer Applications, 118 (18) (2015).
3. Ali, A., Ming, Y., Chakraborty, S., Iram, S. A comprehensive survey on real-time applications of WSN. Future Internet, 9 (4), 77 (2017).
4. Kamaruzzaman, M., Chandra, A. Integration of wireless sensor network in robotics. Machine Learning for Robotics Applications, 71–84 (2021).
5. Elsadig, M.A. Detection of denial-of-service attack in wireless sensor networks: A lightweight machine learning approach. IEEE Access, 11, 83537–83552 (2023).
6. Ismail, S., El Mrabet Z., Reza, H. An ensemble-based machine learning approach for cyber-attacks detection in wireless sensor networks. Applied Sciences, 13 (1), 30 (2022).
7. Sharma, N., Kaushik, I., Agarwal, V.K., Bhushan, B., Khamparia, A. Attacks and security measures in wireless sensor network. Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and Applications, 237–268 (2021).
8. Oztoprak, A., Hassanpour, R., Ozkan, A., Oztoprak, K. Security challenges, mitigation strategies, and future trends in wireless sensor networks: A review. ACM Computing Survey, 57 (4), 1–29 (2024).
9. Monjur, M.M.R., Heacock, J., Calzadillas, J., Mahmud, M.S., Roth, J., Mankodiya, K., Yu, Q. Hardware security in sensor and its networks. Frontiers in Sensors, 3, 850056 (2022).
10. Chen, Y.Y., Xu, B., Long, J. Information security assessment of wireless sensor networks based on bayesian attack graphs. Journal of Intelligent & Fuzzy Systems, 41 (3), 4511–4517 (2021).
11. Subasini, C.A., Karuppiah, S.P., Sheeba, A., Padmakala, S. Developing an attack detection framework for wireless sensor network- based healthcare applications using hybrid convolutional neural network. Transactions on Emerging Telecommunications Technologies, 32 (11), e4336 (2021).
12. Delwar, T.S., Aras, U., Mukhopadhyay, S., Kumar, A., Kshirsagar, U., Lee, Y., et al. The intersection of machine learning and wireless sensor network security for cyber-attack detection: a detailed analysis. Sensors, 24 (19), 6377 (2024).
13. Premkumar, M., Ashokkumar, S.R., Jeevanantham, V., Mohanbabu, G., AnuPallavi, S. Scalable and energy efficient cluster based anomaly detection against denial of service attacks in wireless sensor networks. Wireless Personal Communications, 129 (4), 2669–2691 (2023).
14. Chen, N., Qiu, T., Daneshmand, M., Wu, D.O. Robust networking: Dynamic topology evolution learning for Internet of Things. ACM Transactions on Sensor Networks (TOSN),17 (3), 1–23 (2021).
15. Duan, G., Lv H., Wang H., Feng G., Li X. Practical cyber attack detection with continuous temporal graph in dynamic network system. IEEE Transactions on Information Forensics and Security (2024).
16. Nguyen, V.L., Lin, P.C., Hwang, R.H. Energy depletion attacks in low power wireless networks. IEEE Access, 7, 51915–51932 (2019).
17. Poornima, I.G.A., Paramasivan, B. Anomaly detection in wireless sensor network using machine learning algorithm. Computer Communications, 151, 331–337 (2020).
18. Ayadi, A., Ghorbel, O., Obeid, A.M., Abid, M. Outlier detection approaches wireless sensor networks: A survey. Computer Networks, 129, 319–333 (2017).
19. Rajasegarar, S., Leckie, C., Palaniswami, M. Anomaly detection in wireless sensor networks. IEEE Wireless Communications, 15 (4), 34–40 (2008).
20. Lakshmi, H.N., Anand, S., Sinha, S. Flooding attack in wireless sensor network-analysis and prevention. International Journal of Engineering and Advanced Technology, 8 (5), 1792–1796 (2019).
21. Dubey, A., Meena, D., Gaur, S. A survey in hello flood attack in wireless sensor networks. International Journal of Engineering Research and Technology, 3, 1882–1887 (2014).
22. Hu, Y.C., Perrig, A., Johnson, D.B. Wormhole attacks in wireless networks // IEEE Journal on Selected Areas in Communications, 24 (2), 370–380 (2006).
23. Rehman, A.U., Rehman, S.U., Raheem, H. Sinkhole attacks in wireless sensor networks: A survey. Wireless Personal Communications, 106, 2291–2313 (2019).
24. Xiao, L., Greenstein, L.J., Mandayam, N.B., Trappe, W. Channel-based detection of sybil attacks in wireless networks. IEEE Transactions on Information Forensics and Security, 4 (3), 492–503 (2009).
25. de Oliveira, M.S., Steffen, V., de Francisco, A.C., Trojan, F. Integrated data envelopment analysis, multi-criteria decision making, and cluster analysis methods: Trends and perspectives. Decision Analytics Journal, 8, 100271 (2023).
26. Jiang, Y., Atif, Y., Ding, J. Cyber-physical systems security based on a cross-linked and correlated vulnerability database. International Conference on Critical Information Infrastructures Security (Cham: Springer International Publishing, 2019), pp. 71–82.
27. Marsh, D.W., Baldwin, R.O., Mullins, B.E., Mills, R.F., Grimaila, M.R. A security policy language for wireless sensor networks. Journal of Systems and Software, 82 (1), 101–111 (2009).
28. Livani, M.A., Abadi, M. A PCA-based distributed approach for intrusion detection in wireless sensor networks. 2011 International Symposium on Computer Networks and Distributed Systems (CNDS) (IEEE, 2011), pp. 55–60.
29. Luo, T., Nagarajan, S.G. Distributed anomaly detection using autoencoder neural networks in WSN for IoT. 2018 IEEE International Conference on Communications (ICC) (IEEE, 2018), pp. 1–6.
30. John, A., Isnin, I.F.B., Madni, S.H.H., Faheem, M. Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms. Intelligent Systems with Applications, 22, 200381 (2024).
31. Zahra, F., Jhanjhi, N.Z., Brohi, S.N., Khan, N.A., Masud, M., AlZain, M.A. Rank and wormhole attack detection model for RPL-based internet of things using machine learning. Sensors, 22 (18), 6765 (2022).
32. Alghamdi, R., Bellaiche, M. A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks. Computers & Security, 125, 103014 (2023).
33. Zhukabayeva, T., et al. A traffic analysis and node categorization-aware machine learning-integrated framework for cybersecurity intrusion detection and prevention of WSNs in smart grids. IEEE Access, 2024.
34. Adamova, A., Zhukabayeva, T., Mardenov, Y. Machine learning in action: An analysis of its application for fault detection in wireless sensor networks. 2023 IEEE International Conference on Smart Information Systems and Technologies (SIST) (IEEE, 2023), pp. 506–511.
35. Mardenov, Y., Adamova, A., Zhukabayeva, T., Othman, M. Enhancing fault detection in wireless sensor networks through support vector machines: A comprehensive study. Journal of Robotics and Control (JRC), 4 (6), 868–877 (2023).
36. Zhukabayeva, T., Adamova, A., Karabayev, N., Mardenov, Y., Satybaldina, D. Comprehensive vulnerability analysis and penetration testing approaches in smart city ecosystems. 2024 8th International Symposium on Innovative Approaches in Smart Technologies (ISAS) (IEEE, 2024), pp. 1–6.
Review
For citations:
Zhukabayeva Т.К., Mardenov E.M., Тanirbergenov A. COMPLEX TECHNIQUE FOR DETECTION AND ANALYSIS OF SECURITY INCIDENTS IN WIRELESS SENSOR NETWORKS. Herald of the Kazakh-British Technical University. 2025;22(4):40-59. (In Russ.) https://doi.org/10.55452/1998-6688-2025-22-4-40-59
JATS XML






