Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS

The Wireless Sensor Network (WSN) has evolved into a new IoT scheme, and its adoption has no restrictions at present. Sadly, security has an impact on the network of wireless sensors, and Denial-of-Service (DOS) categories of attacks are security concerns. This study therefore focuses on the distributed denial of service (DDOS), especially on DDoS-PSH-ACK (ACK & PUSH ACK Flood) in WSN. An experimental analysis was developed to predict that many spoofed ACK packets were reoccurring in order to deflate the target node. In the proposed approach, several experimental scenarios for the DDOS detection function were established and implemented. The experimental analysis draws traffic flow within the several transmission sessions involving “the normal transmission within sensor nodes and cluster head”, as well as the “transmission and retransmission scenarios within the sensor nodes and cluster head” at same time with different signal sizes. The main contribution of the paper is predicting DDoS attack by variability of transmission behavior with high degree accuracy. It was established that the most ideal delay between transmissions is 23 milliseconds in order to ensure that the receiving end is not overwhelmed. The result of the current study highlighted that when transmission session gets overwhelmed, that influence DDOS success.

View this article on IEEE Xplore

 

Reinforcement Learning Based MAC Protocol (UW-ALOHA-Q) for Underwater Acoustic Sensor Networks

 

The demand for regular monitoring of the marine environment and ocean exploration is rapidly increasing, yet the limited bandwidth and slow propagation speed of acoustic signals leads to low data throughput for underwater networks used for such purposes. This study describes a novel approach to medium access control that engenders efficient use of an acoustic channel. ALOHA-Q is a medium access protocol designed for terrestrial radio sensor networks and reinforcement learning is incorporated into the protocol to provide efficient channel access. In principle, it potentially offers opportunities for underwater network design, due to its adaptive capability and its responsiveness to environmental changes. However, preliminary work has shown that the achievable channel utilisation is much lower in underwater environments compared with the terrestrial environment. Three improvements are proposed in this paper to address key limitations and establish a new protocol (UW-ALOHA-Q). The new protocol includes asynchronous operation to eliminate the challenges associated with time synchronisation under water, offer an increase in channel utilisation through a reduction in the number of slots per frame, and achieve collision free scheduling by incorporating a new random back-off scheme. Simulations demonstrate that UW-ALOHA-Q provides considerable benefits in terms of achievable channel utilisation, particularly when used in large scale distributed networks.

View this article on IEEE Xplore

A Novel Design Approach for 5G Massive MIMO and NB-IoT Green Networks Using a Hybrid Jaya-Differential Evolution Algorithm

 

Our main objective is to reduce power consumption by responding to the instantaneous bit rate demand by the user for 4th Generation (4G) and 5th Generation (5G) Massive MIMO network configurations. Moreover, we present and address the problem of designing green LTE networks with the Internet of Things (IoT) nodes. We consider the new NarrowBand-IoT (NB-IoT) wireless technology that will emerge in current and future access networks. In this context, we apply emerging evolutionary algorithms in the context of green network design. We investigate three different cases to show the performance of the new proposed algorithm, namely the 4G, 5G Massive MIMO, and the NB-IoT technologies. More specifically, we investigate the Teaching-Learning-Optimization (TLBO), the Jaya algorithm, the self-adaptive differential evolution jDE algorithm, and other hybrid algorithms. We introduce a new hybrid algorithm named Jaya-jDE that uses concepts from both Jaya and jDE algorithms in an effective way. The results show that 5G Massive MIMO networks require about 50% less power consumption than the 4G ones, and the NB-IoT in-band deployment requires about 10% less power than guard-band deployment. Moreover, Jaya-jDE emerges as the best algorithm based on the results.

View this article on IEEE Xplore

Wireless Communications and Applications Above 100 GHz: Opportunities and Challenges for 6G and Beyond

 

Frequencies from 100 GHz to 3 THz are promising bands for the next generation of wireless communication systems because of the wide swaths of unused and unexplored spectrum. These frequencies also offer the potential for revolutionary applications that will be made possible by new thinking, and advances in devices, circuits, software, signal processing, and systems. This paper describes many of the technical challenges and opportunities for wireless communication and sensing applications above 100 GHz, and presents a number of promising discoveries, novel approaches, and recent results that will aid in the development and implementation of the sixth generation (6G) of wireless networks, and beyond. This paper shows recent regulatory and standard body rulings that are anticipating wireless products and services above 100 GHz and illustrates the viability of wireless cognition, hyper-accurate position location, sensing, and imaging. This paper also presents approaches and results that show how long distance mobile communications will be supported to above 800 GHz since the antenna gains are able to overcome air-induced attenuation, and present methods that reduce the computational complexity and simplify the signal processing used in adaptive antenna arrays, by exploiting the Special Theory of Relativity to create a cone of silence in over-sampled antenna arrays that improve performance for digital phased array antennas. Also, new results that give insights into power efficient beam steering algorithms, and new propagation and partition loss models above 100 GHz are given, and promising imaging, array processing, and position location results are presented. The implementation of spatial consistency at THz frequencies, an important component of channel modeling that considers minute changes and correlations over space, is also discussed. This paper offers the first in-depth look at the vast applications of THz wireless products and applications and provides approaches.

View this article on IEEE Xplore

Most Cited Article of 2017: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the Internet. Despite the great potential of this integration, it also brings new threats, such as the exposure of sensor nodes to attacks originating from the Internet. In this context, lightweight authentication and key agreement protocols must be in place to enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual authentication protocol for WSNs. However, we identified several flaws in their protocol. We found that their protocol suffers from smart card loss attack where the user identity and password can be guessed using offline brute force techniques. Moreover, the protocol suffers from known session-specific temporary information attack, which leads to the disclosure of session keys in other sessions. Furthermore, the protocol is vulnerable to tracking attack and fails to fulfill user untraceability. To address these deficiencies, we present a lightweight and secure user authentication protocol based on the Rabin cryptosystem, which has the characteristic of computational asymmetry. We conduct a formal verification of our proposed protocol using ProVerif in order to demonstrate that our scheme fulfills the required security properties. We also present a comprehensive heuristic security analysis to show that our protocol is secure against all the possible attacks and provides the desired security features. The results we obtained show that our new protocol is a secure and lightweight solution for authentication and key agreement for Internet-integrated WSNs.

View this article on IEEE Xplore