| Literature DB >> 35808227 |
Rami Ahmad1,2, Raniyah Wazirali3, Tarik Abu-Ain3.
Abstract
Energy and security are major challenges in a wireless sensor network, and they work oppositely. As security complexity increases, battery drain will increase. Due to the limited power in wireless sensor networks, options to rely on the security of ordinary protocols embodied in encryption and key management are futile due to the nature of communication between sensors and the ever-changing network topology. Therefore, machine learning algorithms are one of the proposed solutions for providing security services in this type of network by including monitoring and decision intelligence. Machine learning algorithms present additional hurdles in terms of training and the amount of data required for training. This paper provides a convenient reference for wireless sensor network infrastructure and the security challenges it faces. It also discusses the possibility of benefiting from machine learning algorithms by reducing the security costs of wireless sensor networks in several domains; in addition to the challenges and proposed solutions to improving the ability of sensors to identify threats, attacks, risks, and malicious nodes through their ability to learn and self-development using machine learning algorithms. Furthermore, this paper discusses open issues related to adapting machine learning algorithms to the capabilities of sensors in this type of network.Entities:
Keywords: 6LoWPAN; WSNs security; ZigBee; machine learning; wireless sensor networks
Mesh:
Year: 2022 PMID: 35808227 PMCID: PMC9269255 DOI: 10.3390/s22134730
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1The taxonomy of this survey.
Figure 2The communication among the WSN layers.
Figure 3WSN co-management protocols.
Figure 4WSNs applications.
Figure 5Malicious attacks classifications.
Attacks in security policies.
| Security Infrastructure | Attacks |
|---|---|
| Confidentiality | Hole, Sybil, Spoofing, Session hijacking, Repudiation, Selective forwarding, Spoofing |
| Integrity | Eavesdropping, traffic analysis, Selective forwarding, Spoofing |
| Availability | DoS, Exhaustion, Jamming, Collision, Unfairness |
WSNs protection techniques.
| Security Infrastructure | Attacks |
|---|---|
| Confidentiality | Encryption |
| Integrity | Digital signature, MAC |
| Availability | Traffic control, redundancy, Rerouting |
| Non-repudiation | Digital certificate |
Figure 6Classification of ML algorithms used in the security of WSNs.
Figure 7Supervised learning processes.
Figure 8The SVM method.
Figure 9Deep learning technique.
Figure 10CNN architecture.
Figure 11WSN’s main security challenges.
ML challenges in WSN security.
| No. | Challenges |
|---|---|
| 1. | Accurate real-time predictions |
| 2. | The use of ML does not cover all the security requirements of WSNs |
| 3. | Outputs are approx. |
Summary of reviewed ML algorithms in intrusion detection.
| Refs. | ML Technique | Processing Cost | Advantage | Limitations |
|---|---|---|---|---|
| [ | Water Cycle + DT | Low |
Improved detection accuracy Reduced WSN power consumption |
The analysis covered one type of WSN packet traffic |
| [ | Various ML algorithms | - |
Determine which types of ML algorithms are best for WSN intrusion detection Determine which data set size is best for WSN intrusion detection |
The analysis covered one type of WSN packet traffic |
| [ | Various ML algorithms | - |
Determine which types of ML algorithms are best for WSN intrusion detection |
The analysis covered one type of WSN packet traffic The analysis did not discuss the impact of intrusion detection on WSN energy consumption |
| [ | BLR | low |
Improved detection accuracy Calculated the intrusion detection cost power on WSN |
There were not enough benchmarks studies |
| [ | Fuzzy logic association rules | medium |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN |
| [ | Two levels of SVM | Medium |
Improved detection accuracy Improved bandwidth |
WSN power consumption was not discussed |
| [ | DNN | High |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN |
| [ | PSO and BNN | High |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN |
| [ | PSO, GA, rotation forest, and bagging | High |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN |
| [ | SVM + MLP | High |
Improved detection accuracy |
Decreased accuracy over actual scenarios |
| [ | LTSM + Gaussian Bayes | High |
Improved detection accuracy Calculated the intrusion detection cost power on WSN |
There were not enough benchmarks studies |
| [ | MLP + GA | High |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN |
| [ | SDN + different ML algorithms | Low |
Improved detection accuracy Intrusion detection time consumption |
There was no analysis of intrusion detection power consumption in WSN There was no discussion about updating SDN protocols |
| [ | KNN + AOA |
Enhanced detection accuracy |
WSN power consumption was not discussed | |
| [ | SDN + naïve Bayes | Low |
Improved detection accuracy Intrusion detection time consumption |
There was no analysis of intrusion detection power consumption in WSN |
| [ | SDN + TIER-1 | Low |
Improved detection accuracy |
There was no analysis of intrusion detection power consumption in WSN There was no discussion about updating SDN protocols |
| [ | SDN + CNN | Low |
Improved detection accuracy Intrusion detection time consumption |
There was no analysis of intrusion detection power consumption in WSN |
| [ | SDN + CNN | Low |
Improve detection accuracy of intrusion detection Transferring the cost of detection from the devices to the SDN-switch |
SDN-Switch Congestion Presence |
Summary of reviewed ML algorithms in error detection.
| Refs. | ML Technique | Processing Cost | Error Detected | Accuracy | Limitations |
|---|---|---|---|---|---|
| [ | SVM, KNN, and RNN | Relative | Offset, gain, stuck-at, and out of bounds | 97% | Calculating the reliability of the decision is complex |
| [ | hidden Markov model + Neural networks (NNs) | high | Random, drift, and spike | 96% | Training speed is slow |
| [ | SVM | Low | Negative alerts | 99% | Does not consider the load management between nodes |
| [ | SVM | High | Fault WSN nodes | 98% | Not suitable for large networks |
| [ | SVM + principal component analysis | High | Fault WSN nodes | 99% | complexity is high |
| [ | Bayesian | High | Fault WSN nodes | 70% | Bayesian increases the complexity of the WSN devices |
| [ | Bayesian | High | Fault WSN nodes | 100% | It takes more time to detect due to the use of two different detection systems |
| [ | KNN | Moderate | Fault WSN nodes | 99% | Not cover continuous change in WSN topology |
Summary of reviewed ML algorithms in congestion control.
| Refs. | ML Technique | Processing Cost | Control Policy | Detection Criteria |
|---|---|---|---|---|
| [ | Fuzzy logic | Low | Queue management | Buffer occupancy |
| [ | Fuzzy logic | moderate | Queue management | buffer occupancy |
| [ | Fuzzy logic | High | Traffic control | Buffer occupancy |
| [ | Heuristic and Fuzzy logic | High | Traffic control | Channel load |
| [ | K-mean, Firefly, and ant colony | High | Traffic control | Packet service time |
| [ | Fuzzy logic | Low | Traffic control | Buffer occupancy |
Summary of reviewed ML algorithms in the authentication.
| Refs. | ML Technique | Processing Cost | Advantage | Accuracy | Limitations |
|---|---|---|---|---|---|
| [ | LTSM | Moderate | Improved performance accuracy for long-term fault signals | 99.5% |
Centralization of authentication Not suitable for massive WAN nodes |
| [ | Gradient algorithm + DNN | Low | Improved authentication rate through reducing training time | 91% |
Centralization of authentication |
| [ | Channel information + ML | Low | Improved authentication rate by using ε-greedy strategy | 99.8% |
Not effective for large networks |
| [ | kernel least-mean-square | High | Improved authentication rate by using reducing N-dimensional vector to a single-dimensional vector space | 97.5% |
Do not take into account the parameters of channel weakness |
| [ | Various ML algorithms | Moderate | Improved performance accuracy through tracing WSN node behavior | 96% |
It consumes more memory Increase searching time |
| [ | Various ML algorithms | Moderate | Improved performance accuracy through WSN node history | 97.5% |
It consumes more memory Increase searching time |
Summary of reviewed ML algorithms in WSN diversified security.
| Refs. | ML Technique | Processing Cost | Attack | Accuracy | Limitations |
|---|---|---|---|---|---|
| [ | ANN | High | Man in the Middle | 99% | It needs huge data sets |
| [ | Random Forest | Low | Traffic monitoring (identification) | 96% | Not expandable |
| [ | Binary classifier | Low | Traffic monitoring (identification) | 95% | Centralization of classification |
| [ | k-mean + SVM | Moderate | Malicious node | NA | Centralization of classification |
| [ | Random forest | Low | Privacy | NA | Require large memory for storage |
| [ | Random Forest + SVM | Moderate | Channel identification | NA | Not effective for large networks |
Figure 12Statistical analysis for the reviewed ML algorithms in WSN security.
Figure 13SDN architecture in implementation of ML algorithms on WSNs.