School of Computing Science and Engineering, VIT Bhopal University, Kothri Kalan 466114, India.
Department of ECE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, India.
Sensors (Basel). 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046.
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques.
无线媒体访问控制 (WMAC) 协议通过处理各种数据帧来转发它们到邻居传感器节点。在这种情况下,WMAC 策略需要安全的数据通信规则和入侵检测程序来保护数据免受攻击者的攻击。现有的安全媒体访问控制 (MAC) 策略为信道攻击者提供了预期和可预测的实践。这些安全策略很容易被任何智能攻击或恶意行为所破坏。所提出的无线交错蜜罐框架模型 (WIHFM) 在每个传感器节点中实现了基于分布式蜜罐的安全机制,以对各种攻击者做出反应。所提出的 WIHFM 创建了一个最优的无线传感器网络 (WSN) 信道模型、无线交错蜜罐帧 (WIHF)、基于安全哈希的随机帧交错原理、以节点为中心的蜜罐引擎和信道覆盖技术。与各种现有的 MAC 安全策略相比,所提出的模型将不可预测的 IHF 转换为针对信道攻击者的合法帧序列。此外,引入 WIHF 是分布式 WSN 的一种新颖方法。所提出的 WIHFM 的成功开发确保了弹性安全标准和基于邻居的入侵警报程序,以保护 MAC 帧。特别是,所提出的无线蜜罐方法创造了一个使用蜜罐框架陷阱来对抗开放无线信道攻击的新想法。新型无线蜜罐陷阱的开发涉及到各种挑战,如分布式蜜罐管理原则(以节点为中心的蜜罐、秘密交错框架原则和交错/去交错过程)、动态网络骨干管理原则(按需无环连接模型)和分布式攻击隔离策略。这一努力为动态 WSN 提供了有效的无线攻击捕获解决方案。仿真结果表明,所提出的 WIHFM 优于现有技术,如安全斑马 MAC (SZ-MAC)、区块链辅助安全路由机制 (BASR) 和基于信任的节点评估 (TBNE) 过程。实验部分证实,与现有技术相比,所提出的模型在性能上有 10%到 14%的提升。