A Novel SDN-Based Security Framework for Wireless Sensor Networks Using TDCNN and PGF-ECC

被引:0
|
作者
Kumar M. [1 ]
Mukherjee P. [2 ]
Verma S. [3 ]
Kavita [3 ]
Jhanjhi N.Z. [4 ]
Vimal S. [5 ]
Almutain B. [6 ]
机构
[1] Department of IT, MIT Art, Design and Technology University, Pune
[2] Pretium Enterprise Solutions Pvt Ltd, Bangalore
[3] Department of Computer Science and Engineering, Uttaranchal University, Dehradun
[4] School of Computer Science and Engineering, Taylor’s University
[5] Department of Computer Science and Engineering, Ramco Institute of Technology, Tamilnadu
[6] Digital Transformation Department, King Abdulaziz City for Science and Technology, Riyadh
关键词
Deep Convolution Neural Network; Elliptic Curve Cryptography; Horse Optimization Algorithm; Network Security; Wireless Sensor Network;
D O I
10.22967/HCIS.2023.13.029
中图分类号
学科分类号
摘要
Wireless sensor networks (WSN) comprise a huge number of stationary or mobile sensor nodes that considerably support multi-hop communication. Intruder attacks such as wormholes, spoofing, etc., make it more susceptible in turn influence WSN’s confidentiality. Therefore, utilizing tanh activation function centered deep convolution neural network (TDCNN) and polynomial Galois field elliptical curve cryptography (PGF-ECC), a novel approach named malicious node detection and privacy preservation of software-defined WSN is conceptualized in this work. Many measures have been taken in the work for assuring security. Utilizing taxicab metric centered KMedoid (TM-KMedoid) algorithm, the sensor nodes of the network are initially sorted into clusters. After that, using the Horse optimization algorithm (HOA), the cluster head (CH) selection is performed where the best node in the cluster is selected as the CH. Next, the data packets are transferred by the CH to the base station (BS) via the software-defined networking (SDN) controller. The SDN controller is applied with a TDCNN classifier that predicts the node’s trustworthiness for detecting whether the node is malicious or not. The data is transferred to BS if the node is a trusted one else, the node gets rejected. The PGF-ECC algorithm is employed for ensuring the data’s secure transmission to the BS. The proposed method’s performance is contrasted with the existent systems in an experimental evaluation. It exhibits superior performance when analogized to top-notch techniques, and highly assures the network’s authenticity. © 2023, Human-centric Computing and Information Sciences. All Rights Reserved.
引用
收藏
相关论文
共 50 条
  • [21] An SDN-Based Wireless Authentication and Access Control Security Solution
    Han, Yanyan
    Li, Guohao
    Feng, Binbin
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 179 - 189
  • [22] NO Stack: A SDN-based Framework for Future Cellular Networks
    Mi, Xiang
    Tian, Zhigang
    Xu, Xibin
    Zhao, Ming
    Wang, Jing
    2014 INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2014, : 497 - 502
  • [23] Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors
    Portilla, J.
    Otero, A.
    de la Torre, E.
    Riesgo, T.
    Stecklina, O.
    Peter, S.
    Langendoerfer, P.
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2010,
  • [24] A Novel Framework for Misbehavior Detection in SDN-based VANET
    Sultana, Rukhsar
    Grover, Jyoti
    Tripathi, Meenakshi
    2020 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2020,
  • [25] Security framework for wireless sensor networks
    Prasad N.R.
    Alam M.
    Wireless Personal Communications, 2006, 37 (3-4) : 455 - 469
  • [26] An SDN-Based Dynamic Security Architecture for Space Information Networks
    Wang, Ziqi
    Cui, Baojiang
    Yao, Shen
    Jiang, Meiyi
    SPACE INFORMATION NETWORKS, SINC 2019, 2020, 1169 : 99 - 111
  • [27] A security framework for wireless sensor networks
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J. China Univ. Post Telecom., SUPPL. 2 (118-122):
  • [28] A Security Framework for Wireless Sensor Networks
    Stent, Stuart
    COMMUNICATION AND NETWORKING, 2009, 56 : 444 - 454
  • [29] A Stochastic Game Approach for Collaborative Beamforming in SDN-Based Energy Harvesting Wireless Sensor Networks
    Bao, Xuecai
    Liang, Hao
    Liu, Yuan
    Zhang, Fenghui
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9583 - 9595
  • [30] An SDN-based Network Architecture for Extremely Dense Wireless Networks
    Ali-Ahmad, Hassan
    Cicconetti, Claudio
    de la Oliva, Antonio
    Mancuso, Vincenzo
    Sama, Malla Reddy
    Seite, Pierrick
    Shanmugalingam, Sivasothy
    2013 IEEE WORKSHOP ON SOFTWARE DEFINED NETWORKS FOR FUTURE NETWORKS AND SERVICES (SDN4FNS 2013), 2013,