INTEGRATION OF SECURITY AND FAULT TOLERANCE IN SENSOR NETWORKS BASED ON THE ANALYSIS OF ENERGY CONSUMPTION AND TRAFFIC
DOI:
https://doi.org/10.28925/2663-4023.2024.25.390400Keywords:
Internet of Things, IoT, information security, sensor network, energy resources, fault tolerance, threats, anomalies, reliability, nodesAbstract
This article examines the functioning of sensor networks as a key component of the Internet of Things (IoT) technology, which facilitates integration between the physical and digital worlds. It analyzes the challenges sensor networks face, including limited resources, node failures, scalability, and security threats. The main components of sensor networks are discussed: sensors, smart elements, gateways, and communication modules that enable data collection and transmission for further analysis. Attention is drawn to the fact that sensor networks are often targets of malicious attacks, such as DDoS, Sinkhole, and routing attacks, which necessitate the development of new protection methods. The paper thoroughly examines threats from illegitimate elements in sensor networks that can disrupt network operations, cause data leaks, and affect network resilience and fault tolerance by exhausting resources. To effectively detect such nodes, it is proposed to apply mechanisms for traffic analysis, energy consumption monitoring, and encryption. The nature of failures in sensor networks and the interrelationship between fault tolerance and security are explored. Probabilities of failure for networks of different sizes are calculated, and mechanisms for improving fault tolerance, including node redundancy, self-healing algorithms, and fault tolerance mechanisms, are proposed. A methodology for detecting malicious nodes based on traffic and energy characteristics analysis is suggested. It was found that nodes exceeding threshold values for the number of transmitted packets or energy consumption may be malicious. It is noted that combining various methods will improve the accuracy of detecting malicious nodes at early stages, significantly enhancing the level of information security in sensor networks. Prospects for further research into the development of new protective mechanisms and improvements in the fault tolerance of sensor networks are highlighted.
Downloads
References
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 76, 146–164. https://doi.org/10.1016/j.comnet.2014.11.008
Barabash, O. V., Dovzhenko, N. M., & Ausheva, N. M. (2024). An integrated approach to security in sensor networks. XI All-Ukrainian scientific and practical conference of young scientists, 223–224.
Liu, D., & Ning, P. (2007). Security for Wireless Sensor Networks. Advances in Information Security (ADIS), 28. https://doi.org/10.1007/978-0-387-46781-8
Zhang, H., Liu, J., & Kato, N. (2018). Threshold Tuning-Based Wearable Sensor Fault Detection for Reliable Medical Monitoring Using Bayesian Network Model. IEEE Syst. J. 12, 1886–1896. https://doi.org/10.1109/JSYST.2016.2600582
Openko, P., Dovzhenko, N., Orikhovsky, P., & Ikaev, D. (2024). Ensuring reliability and security in modern wireless sensor networks based on the implementation of the RSSI metric. Air power of Ukraine, 1(6), 131–136. https://doi.org/10.33099/2786-7714-2024-1-6-131-136
Dovzhenko, N., Barabash, O., Ausheva, A., Ivanichenko, Y., & Obushnyi S. (2023). Comprehensive Analysis of Efficiency and Security Challenges in Sensor Network Routing. In Cybersecurity Providing in Information and Telecommunication Systems, CPITS-II 2023, vol. 3550, 275–280.
Zawaideh, F. (2019). An Efficient Weighted Trust-Based Malicious Node Detection Scheme for Wireless Sensor Networks. Int. J. Commun. Syst. 32, 3878. https://doi.org/10.1002/dac.3878
John, A., Isnin, F. I., & Madni, S. H. H. (2023). Current security threats in applications of wireless sensor network. International Journal of Engineering, Science and Technology (IJonET), 5(3), 255–272. https://doi.org/10.46328/ijonest.174
Ahmad, R, Wazirali, R, & Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22(13), 4730. https://doi.org/10.3390/s22134730
Barabash, O., Ausheva, N., Skladannyi, P., Ivanichenko, Y., & Dovzhenko, N. (2024). Technical aspects of building a fault-tolerant sensor network infrastructure. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(24), 185–195. https://doi.org/10.28925/2663-4023.2024.24.185195
Kim, T., Vecchietti, L. F., Choi, K., Lee, S., & Har, D. (2021). Machine Learning for Advanced Wireless Sensor Networks: A Review. IEEE Sens. J. 21, 12379–12397. https://doi.org/10.1109/JSEN.2020.3035846
Karpenko, A., Bondarenko, T., Ovsiannikov, V., & Martyniuk, V. (2020). Ensuring information security in wireless sensor networks. Electronic professional scientific publication “Cybersecurity: Education, Science, Technology”, 2(10), 54–66. https://doi.org/10.28925/2663-4023.2020.10.5466
Jain, U., & Hussain, M. (2018). Wireless Sensor Networks: Attacks and Countermeasures. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3170185
Karlof, C., & Wagner D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks. 1(2–3), 293–315. https://doi.org/10.1016/s1570-8705(03)00008-8
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Надія Довженко, Євген Іваніченко, Павло Складанний, Наталія Аушева

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.