Next Article in Journal
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators
Next Article in Special Issue
A Malicious Code Detection Method Based on FF-MICNN in the Internet of Things
Previous Article in Journal
Water Turbidity and Suspended Particulate Matter Concentration at Dredged Material Dumping Sites in the Southern Baltic
Previous Article in Special Issue
Smart System for Bicarbonate Control in Irrigation for Hydroponic Precision Farming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

by
Rajasoundaran Soundararajan
1,
Maheswar Rajagopal
2,
Akila Muthuramalingam
3,
Eklas Hossain
4 and
Jaime Lloret
5,*
1
School of Computing Science and Engineering, VIT Bhopal University, Kothri Kalan 466114, India
2
Department of ECE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, India
3
Department of CSE, Centre for IoT and AI (CITI), KPR Institute of Engineering and Technology, Coimbatore 641407, India
4
Department of Electrical and Computer Engineering, Boise State University, Boise, ID 83725, USA
5
Instituto de Investigacion para la Gestion Integrada de Zonas Costeras, Universitat Politecnica de Valencia, 46022 Valencia, Spain
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(20), 8046; https://doi.org/10.3390/s22208046
Submission received: 7 September 2022 / Revised: 15 October 2022 / Accepted: 17 October 2022 / Published: 21 October 2022
(This article belongs to the Collection Smart Communication Protocols and Algorithms for Sensor Networks)

Abstract

:
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques.

1. Introduction

Wireless Sensor Networks (WSNs) are diversely used for significant applications such as industrial automation, animal-tracking systems, ocean-monitoring systems, defense support systems, rural surveillance systems [1], and others. Usually, WSNs are created with numerous wireless sensor nodes placed around the required geographical locations. The sensor nodes are deployed on land surfaces, water surfaces, and other hostile regions to sense the ecological data from various objects.
The sensed data are processed and communicated to respective sink nodes through multi-hop-routing procedures. The data on the wireless medium are more vulnerable compared to dedicated wired channels. WSNs need optimal protection via channel security for their application-specific network architectures. As wireless sensor nodes operate under limited internal resources with respect to their memory, battery source, and processor efficiency, the security algorithms must provide efficient and lightweight solutions against unexpected channel attacks. Secure wireless data communication is essential against both active and passive attackers. The intrusions and attacks that infiltrate into data sequences on air create opportunities for data theft, identity theft, packet drops, wormholes, sinkholes, and other functional irregularities in WSNs. Attacks on wireless channels are more frequent than on wired channels. In the absence of steadfast secure servers and protected channels, the wireless sensor nodes meet open threats to live data transmissions. The technical contributions of global research are growing and thereby enabling the construction of flexible network security models for WSNs. Generally, the current wireless security models use cryptography techniques, key distribution models, blockchain technology, Intrusion Detection Systems (IDS), and channel-aware-data-hiding mechanisms.
The dedicated wired network infrastructures use firewalls, secure private network policies, centralized IDS engines, honeypots, and key distribution servers to handle attacks efficiently. Among these security models, honeypots are a collection of decoy network systems positioned among legitimate network resources. The honeypot security mechanism provides a virtual system trap with fake utilities to attract both internal and external attacks. The honeypot environment receives the incoming events and analyzes the features to decide the attacks. Here, the attackers may utilize and harm the fake resources. The results generated from honeypot engines help to enrich the network security policies gradually.
Honeypots are classified under various categories as highly interactive models, lowly interactive models, research models, and production models. Unlike wired network security models, wireless networks need more flexibility in their security layer functions. Particularly, a WSN requires completely distributed and lightweight security mechanisms that are controlled at each sensor node. The proposed WIHFM is aimed at developing a distributed honeypot environment in each sensor node to secure wireless mediums. According to the proposed idea, each sensor node holds fake internal resources to trap the attackers. The proposed model has been created for developing lightweight honeypot resources in each node with IHF contents. In this newly developed environment, the attacker trap has been created by a WIHFM that is shared among legitimate data frames on the wireless channel.
The wireless MAC (802.11) policies and legitimate data frames are vulnerable to attacks. The combination of node-centric honeypot engines and the IHF traps increases the possibility of attracting various attacks from other sensor nodes. The currently accessible secure data communication models are widely anticipated and estimated by intellectual attackers. Regarding the choice of WSN security solutions, Mezrag et al. [2] proposed a lightweight energy-efficient cryptography scheme for secure data communication. In this work, secure data communication was achieved through Elliptic Curve Cryptography (identification-based cryptography techniques in the clustered WSN environment). Additionally, this scheme was assisted with distributed key distribution models. In this manner, the existing security principles stated that the identity model assured protection against different types of attacks in a WSN.
On the other hand, this technique was not enabled over random WSNs with deeply analyzed results. Guimaraes et al. [3] compared and analyzed various security protocol solutions and channel protection models for WSNs. In their analysis, the security solutions were identified as public key cryptography techniques, private key models, message authentication codes, secure hash codes, and others. The experimental details of this work are revealed through power consumption analysis, memory complexity analysis, and time complexity analysis exercises. Similarly, Sharma et al. [4] and Bhushan et al. [5] described the details of wireless security challenges and security protocols suitable for WSNs. Based on notable technical contributions, the particular type of WSN architecture and application-specific network model should be assisted by optimal security features. In this stream, Majid et al. [6] provided the details of WSN application models and security solutions. Han et al. [7] proposed genetic algorithm frameworks for enabling trust-based secure-routing mechanisms.
Correspondingly, this technique targeted the benefit of energy-aware-routing principles. Based on security concerns, Huanan et al. [8] shared vast scopes and information on the security benefits and applications of WSNs. As many studies and technical surveys on secure data communication reveal the current solutions and limitations against various attacks, the attack types are identified as basically active and passive. In this case, the denial of service, data modification, masquerading, channel interruption, misrouting activities, and other live suspicious actions are categorized under active attacks. In contrast, eavesdropping and unauthorized traffic-analyzing procedures are classified under passive attacks. In this regard, Keerthika et al. [9] described various types of malicious events such as physical attacks, link layer attacks, routing attacks, SYN-flooding attacks, smurf attacks, session-stealing attacks, and data security attacks according to the respective layers. The comprehensive understanding and comparative descriptions of various attacks inform the protection measures towards the data protection challenges in WSNs. In addition, this work suggested appropriate countermeasure techniques for different attacks.
Generally, the application of WSNs decides the levels of security features to be configured in the real-time conditions. In this case, Majid et al. [6] deeply analyzed the growth of WSNs regarding their support for industrial revolution practices. According to the analysis of WSNs’ application domains, a technological growth is expected in Internet of Things (IoT)-based solutions and other control systems. Particularly, the application of WSNs spreads through intelligent military infrastructures, health-monitoring systems, home automation systems, smart city management systems, agriculture automation systems, intelligent transportation systems, and other industrial control systems. Based on the required WSN’s model, the security policies are differently configured against expected attacks.
At the research stage, security concerns are seriously evaluated, and various solutions are proposed. Salau et al. [10] described the data security measures taken towards the protection of radio channel communications against attacks. According to this description, data security measures are expected to be taken in accordance with integrity, confidentiality, and authentication policies. On the same ground, the network’s stabilization must be assured in terms of availability. Almesaeed et al. [11] proposed channel protection and energy regulation schemes among Sybil attackers in WSNs. Sybil attackers mainly target the identities of sensor nodes. Notably, this type of attack manipulates numerous fake identities of a sensor node to damage the network reputations.
The channel protection schemes proposed in this work are equipped with node validity schemes, secure channel profile-sharing principles, signal strength indicators, and cluster management principles. Similarly, a few research methodologies found possible solutions to provide secure data transmission solutions under IoT-based WSNs [12]. Anyhow, the strategies used for promoting such data transmission solutions to ensure secure WSNs in a challenging environment are limited.
Wang et al. [13] found a correlation between the pandemic timeline and the attacks generated among IoT networks. This work analyzed critical security problems of the IoT environment through honeypot principles. According to the network architecture, this scheme deployed more than 450 honeypot engines around various geolocations. This work evaluates a real-time botnet attack detection mechanism using distributed honeypot architecture at different locations. The idea behind this honeypot model is to expose the practical possibilities of real-time botnet classification procedures. In this regard, the methodology has been designed to model numerous botnet attacks into honeypot systems. In accordance with this observation, this work finds the fragmental impacts of botnet activities and statistical findings on the systems’ performance. The continuation of honeypot-based security models is more useful for developing real-time trap systems in order to improve security practices.
In the same manner, Lygerou et al. [14] proposed distributed honeypot models for securing android devices. As this work focused on cellular network security principles, the distributed honeypots were configured for operating mobile devices (on an android platform). Similarly, the proper identification of IoT protocols interacting with mobile devices assures the actual benefit of distributed honeypot systems. In this case, the IoT protocols and the security features were analyzed for message-queuing protocols, constrained application protocols, and low-power and lossy network protocols. Mostly, the honeypot security principles are initiated from conventional data analysis tactics for detecting the attacks. For improving the efficiency of standard honeypot models, machine leaning and deep learning algorithms are widely applied in WSNs.
On the basis of motivation, Veluchamy et al. [15] proposed deep learning-based-honeypot-modelling strategies. Particularly, this approach applied deep reinforcement-learning practices to understand and detect DoS attacks at run-time. According to this approach, deep neural network functions were created to validate the internal and remote requests belonging to the network. The strategy of this work continued to compute deep score values (Q-Matrix) for network events and stated them as rewards. The experimental platform of this work initiated internal DoS events, external DoS events, website attacks, botnet attacks, and brute force attacks against deep learning-based honeypot systems. Nevertheless, a lack of system flexibility is identified in this dedicated network scenario.
Considering the computation load and time complexities, Acosta et al. [16] developed lightweight reactive honeypot principles for improving the security features of cyber deception models. In general, cyber deception is the strategy used for tricking the attackers into fake resources (honeypot). As discussed earlier, the network architecture expects suitable security functions through static models or dynamic models. The honeypot is the main security provision to assure security traps and collect the event data within them. In this case, the static model honeypots activate and control (warn) the internal node functions based on the legitimacy of the cyber event. Considering the issue, this lightweight honeypot model developed reactive node organization and channel organization principles against attacks. This mechanism ensured more optimal management routines than static honeypot approaches.
In the sequence of security considerations, Pashaei et al. [17] stated the strategy of early state intrusion detection techniques with the help of honeypots in an industrial network environment. The idea of this work was based on using Markov chain process and action-reward policies in order to observe network events continuously. The state-based honeypot event analysis model was configured to detect and isolate distributed DoS attacks and Man-in-the-Middle attacks. As mentioned, this work operated reinforcement-learning principles and Markov chain principles to detect suspicious events as quick as possible. In addition, this scheme assured its better accuracy rate based on the best reward weights according to changing event states.
As discussed in this section, various security models and honeypot frameworks are suggested to improve network security metrics. Furthermore, the honeypot-based security limitations are identified for MAC principles. As many research techniques consider network-level security challenges, the identification of channel security and MAC security provides an important and novel suggestion for innovative honeypot strategies. In this regard, this article finds the crucial limitations of the existing systems such as the lack of novel secure MAC models, distributed honeypot engines, Interleaved Honeypot Frame (IHF) solutions, and open traps in WSN. These are considered major research problems under growing attack styles and novel threats against WSNs. In this case, the newly developed security mechanism should be estimated with complex wireless channel traps. Considering these ideas, the proposed WIHFM is motivated to develop a neighbor-based distributed honeypot environment with IHF traps to attract attackers through the open channel. Mainly, the proposed WIHFM contributes the following security features for WSNs:
  • On-Demand Acyclic Network Connectivity model (ODAC);
  • Interleaved Honeypot-Framing Traps;
  • Distributed Neighbor-based Honeypot Engines;
  • Secure Hashing with Random Interleaving procedures;
  • Confidential and Authenticated Channel Protection.
As per the proposed model and technical contributions, the environment of WSNs is created to optimize the network backbone and dynamic link management principles. As mentioned in the list of major contributions, the proposed model configures an ODAC for managing the associativity rules according to uncertain node links and node abilities with respect to time. According to the positioned ODAC-based network backbone and routing principles, the wireless communication shall be operated feasibly. In the next phase, wireless honeypot frames are modelled with appropriate fake data (trap frames) and internal security features among other legitimate data frames in each sensor node. The ordered inclusion of legitimate data frames and honeypot frames on the wireless channel is designed with the help of honeypot-interleaving procedures (interleaving and de-interleaving Algorithms) and randomly generated trap-slot positions. Similarly, data communication is secured by optimal channel security procedures (a secure hashing algorithm, the advanced encryption standard, and digital signature algorithms). Hence, the proposed model creates dynamic and distributed honeypot traps in each node to decoy attackers.
According to the contributions listed above, the proposed article has been systematized from Section 2, Section 3 and Section 4. In this article, Section 2 describes the materials and methods used for implementing the proposed techniques. Section 2.1 analyzes the related techniques. Section 2.2 illustrates the proposed WIHFM’s features and the technical details of the newly created IHF solutions. Section 3 explains and justifies the proposed WIHFM’s contributions with experimental results and performance comparisons. Finally, Section 4 concludes the overall contributions and provides the future scope of this novel article.

2. Materials and Methods

2.1. Related Works

Analyzing and understanding the current security solutions against various wireless channel attacks provides necessary future frameworks. In this regard, this article considers significant related contributions of recent research works. Additionally, this section provides the specific limitations of different research works and the need for a newly developed WIHFM. Pietro et al. [18] deliberated infrastructure security models and data security models for unattended WSN environments. Generally, the attacks are undertaken against sensor data’s start data modifications, false data generation, data removals, and data disclosures that affect legitimate wireless communication. According to data security models, this work discussed real-time security problems in the data streams on wireless channels. Nevertheless, the technical contribution of this model did not provide a versatile attacker detection system. As the model had been specially developed for unattended WSNs, the motivation of this work focused on channel attainment rather than crucial security benefits. Yang et al. [19] provided a perspective on the security benefits in WSNs such as location-sensitive security principles, distributed key management schemes, resilient network protection, and route classification procedures. This work identified these approaches as possible solutions against different types of attacks and node failures in WSNs. As per the contribution, this work developed the WSN security model based on random location-based key selection for protecting wireless MAC content. Additionally, this work determined counter-protection mechanisms against fabrication attacks, report interruption attacks, relocation attacks, and node compromise attacks. However, these security efforts require novel attacker-handling frameworks.
At the same time, the development of current WSN models and their variances receives notable industrial considerations. Khan et al. [20] proposed Internet of Things (IoT)-assisted flying ad hoc networks and energy-optimized-routing strategies. This work considered the obstacles of energy-efficient-routing protocols such as quality metrics, spatial movements of nodes, and dynamic network parameters. In this case, this approach proposed naturally inspired algorithms for improving the operational abilities of ad hoc routing protocols. Predominantly, the adaptation of energy-optimized ant colony optimization procedures were crucially applied to solve routing problems under uncertain network conditions. In the same manner, Singh et al. [21] found the need for IoT and WSN in healthcare applications, home control systems, multimedia applications, and smart transportation solutions. According to this work’s proposal, the current security mechanisms are not adaptive to the real-time nature of application-specific IoT environments. Based on this scientific problem, this work stated the need for more dynamic and flexible (self-reliant) security solutions for various types of networks.
Similarly, the recent advances and security requirements for WSNs and IoT were discussed by Gupta et al. [22] and Bharany et al. [23]. The crucial contributions of the existing techniques were found in the analysis of performance improvement, energy optimization solutions, security benefits, cyberspace investigations, machine learning frameworks, and blockchain-based distributed solutions. As IoT and WSN participants are mostly deployed under a distributed environment, the detailed analysis on the real-time technical issues of Gupta et al. [22] and Bharany et al. [23] provided notable information. Xiao et al. [24] developed MAC security and computation analysis models for IEEE 802.15.4 WSNs. The analysis models of this work accounted for the various MAC vulnerabilities, security principles, and platform-based overhead issues for personal area sensor network environments. According to the analysis, the mentioned article enquired about security-provisioning modes, layer-based vulnerabilities, attack types, security suites, and network adaptability.
Here, the attacks such as replay attacks, nonce attacks, and routing attacks were investigated under WSN conditions. On the other hand, the need for improvised solutions was unexploited in this development area.
Boyle et al. [25] and Karlof et al. [26] described various security architectures that can be provided for WSNs. Both articles show potential security possibilities for a wireless medium against Denial of Service (DoS) attacks, data injection attacks, identity misuse attacks, and packet-dropping attacks. Particularly, the latter work discussed link-layer attacks and security mechanisms for IEEE 802.11b and mobile communication platforms. Considering the security frameworks, these works identified excessive message overloads and processing overloads under tiny security prototype models. These works deliberately extracted the basic needs of well-defined wireless security frameworks against channel attacks. Yet, these analysis models are distorted with respect to providing unpredictable security solutions for WSNs. Similarly, Yadav et al. [27] discoursed the basic technical aspects of MAC models and communication tactics for WSNs.
Singh et al. [28] proposed redundant source management techniques and host-based IDS techniques for securing WSNs. In this regard, this scheme evaluates the possibilities of brute force attacks, key-breaking attacks, and authentication vulnerabilities. In addition, the article ensured that the need for identifying MAC-spoofing attacks and MAC duplication attacks was justified to create counter algorithms. The attack detection mechanisms implemented for building a secure WSN environment should utilize optimal sensor energy. According to the scope, the mentioned security schemes were inefficient in terms of reactive attack detection accuracy and flexible MAC communication principles. Sachan et al. [29] created energy-efficient connectivity models for mobile WSNs. This article established a novel probability channel model using network uncertainty, sensing area, node’s transmission range, and residual energy.
Elshrkawey et al. [30] and Kumar et al. [31] mentioned secure data aggregation and secure data communication practices for protecting wireless MAC layers in WSNs. Here, the first article produced individual message authentication codes for each data aggregation channel of WSNs. In this scenario, authentication codes were attached according to distributed scheduling principles concerning Time Division Multiple Access (TDMA) strategy. Similarly, the second work focused on low-energy clustering protocol and routing hierarchy model for transmitting the data. This article tried to optimize the sensor node’s residual energy to improve the quality of data transmission. Anyway, both works were limited in terms of complete distributed security solutions against channel vulnerabilities.
Khashan et al. [32] suggested lightweight encryption models for managing secure data transmission in WSNs. The limitations of conventional encryption models, authentication procedures, signature validation modules, and energy optimization techniques lead to the implantation of inaccurate security frameworks. Based on the analysis in practice, the work mentioned above-validated block chipper techniques, stream chipper techniques, and flex-crypto schemes for ensuring WSN security and increasing network lifetime. However, the adaptations of each lightweight encryption technique over different platforms were not deeply analyzed in the respective contributions.
Almansoori et al. [33] developed Secure Zebra MAC (SZ-MAC) models using elliptic curve cryptography techniques and hob-based intrusion analysis techniques. In this work, an elliptic curve cryptography engine was implemented with random key management functions for securing wireless channels. Particularly, this work deliberated clustered WSN architectures and hierarchical key distribution models to enable confidential data communication.
This work concluded that the secure SZ-MAC model confirmed optimal elimination of vulnerable entries and maximum network throughput attainment. The technical aspects of the work limit the uncertain channel handling and the development of random attacker traps.
Awan et al. [34] proposed Blockchain-Assisted-Secure-routing (BASR) mechanisms for WSNs. In this work, WSN participants were categorized as data-transmitting nodes and data aggregator nodes. According to blockchain characteristics, the consensus procedures initiated multi-path data distribution practices. This model ensured data integrity solutions using blockchain functions and confidentiality with public key cryptography functions. The results produced in the experimental section of the work were novel and highly secured against various attackers. At the same time, the flexibility of blockchain development is suitable for static WSNs. Consequently, the developed cryptography functions and blockchain structures were not flexible with respect to random WSNs.
With the same scope, Meena et al. [35] introduced secure random key management approaches and Trust-Based Node Evaluation (TBNE) approaches for the Internet of Things (IoT) environment with WSNs. In this analysis, the K-Medoid algorithm and eagle search algorithm for creating secure clusters were employed. Based on these approaches, the complete WSN was secured through distributed authentication principles. On this platform, the dynamic connectivity models and channel recreation models were not defined properly.
From the literature analysis, the proposed article finds the overall limitations of existing techniques such as the lack of node-centric IDS engines, attacker traps, MAC confidentiality, interleaved honeypot solutions, and dynamic sensor connectivity models. These are considered major research limitations to be developed to secure MAC principles. Based on providing the solutions to the above research expectations, the proposed WIHFM has been designed and developed with novel technical aspects. Section 2.2 describes the crucial features and mathematical aspects of WIHFM.

2.2. WIHFM

Channel-aware security principles and medium protection in WSN are creating major impacts in data communication. WSN contains a vast number of sensor nodes and independent links for establishing each channel. Wireless sessions established from each sensor node are naturally vulnerable to suspicious activities and attackers. The wireless medium needs protection in terms of secure MAC policies, secure link establishments, and secure data transmissions.
The security needs of the wireless medium can be designed and developed based on various cryptography techniques and Distributed IDS (DIDS) procedures. Figure 1 shows the proposed security features such as novel interleaved honeypot fames, node-centric distributed honeypot engines, data integrity, data confidentiality, data authentication, and DIDS procedures. The proposed channel-aware secure transmissions are expected to secure each frame before it reaches routing layer protocols. Generally, MAC frames hold three major fields such as MAC header, MAC frame body, and frame check sequence. MAC header field has been encapsulated with frame control field, session identifier, source MAC address, destination MAC address, quality parameters, variable data heap, frame protection bit, and others. Anyhow, the open wireless MAC is not secure against various channel attacks such as jamming, false data insertion, identity theft, timing disturbances, and passive channel-monitoring activities.
The secure medium places appropriate counterattacking or protection schemes against unique attack patterns. Mostly, wireless channels establish a secure MAC model using different types of cryptography techniques. The cryptography mechanisms such as public key models, private key models, signature validation models, and other integrity-checking models are employed. The provision of standard cryptography techniques are circumvented based on an attacker’s efficiency for extracting the contents of MAC frames. Here, the deployment of a novel MAC-framing solution yields unanticipated protection against channel attackers [36,37].
Thus, the proposed model develops randomly generated Interleaved Honeypot Frames (IHFs) for protecting the streams of WSN frames. Based on this idea, the network model, attacker model, suspicious event model, and proposed channel-aware security principles have been designed as follows.

2.2.1. WSN Model

Let the model of WSN be assumed to have sensor node quantity denoted as l and the geographical network area as a b   m e t e r 2 . The sensor nodes will discover their neighbors and transmit the data to other nodes through wireless MAC protocol (IEEE 802.11) functions, as shown in Equation (1),
N s = l m ,   c 1 j ,   c < 1    
Equation (1) shows the basic channel model of WSN. As shown in Equation (1), from N s set of nodes, l m nodes participate in an active communication channel [38]. At the moment, the channel quantity factor c 1 . On the other hand, j nodes are idle participants in WSN. From Equation (1), c can be expressed as follows.
c = n t . d t . c i  
Equation (2) denotes n t . d t as several active nodes during changing time intervals t . In this case, c i is the channel activity indicator used to keep + 1 for live events. The WSN model has been assumed with l ( c i ) active channels among overall network channels, N c i . Equations (1) and (2) mainly determine the presence of wireless sensor nodes in the network. Notably, a WSN channel model determines both node availability and link availability according to time domain. Based on the Equations (1) and (2), the network assumption has been taken based on channel quality factor between multiple sensor nodes. According to that assumption, c is determined from the number of sensor nodes that are available for active communication in a channel at time t . In this regard, c i denotes the liveliness indication quantity for n t nodes at d t intervals. This component n t . d t . c i is assumed to be at least 1 to observe the value of c as positive quantity. The positive quantity of c shows the presence of l m sensor nodes in the set of total nodes N s . In this case, l m nodes can be activated on the basis of multi-hop on-demand requests in a channel. The other j nodes are considered as either inactive nodes or dead nodes as their c value has negative magnitude.
The proposed system creates the On Demand Acyclic Connectivity model (ODAC) for enabling the logical links between active sensor nodes. The proposed ODAC model enables energy-sensitive connection establishment rules and association policies among the sensor nodes in an active channel. According to the model, s ( n i ) denotes the source node, s ( n j ) denotes the destination node, and the forwarding node (succeeding node) is represented as x ( n i ) . Based on ODAC connectivity dynamics, logical connections are established by sharing beacon messages between sensor nodes. Equation (3) clarifies the basic dynamic acyclic connectivity model [39,40]. According to the model of acyclic graph connectivity principles, the sensor nodes in the WSN are able to configure with associativity rules. In this computation, s ( n x ) denotes the node taken for successive evaluation procedures for establishing acyclic connectivity links along the path between s ( n i ) and s ( n j ) . According to the node, s ( n x ) must be expected with minimal cost (diatance) to reach s ( n j ) . This can be rewritten as { f s ( n j + c s ( n j , s ( n x ) } , and it indicates the cost function between s ( n j ) and x ( n i ) in the forwarding path.
f ( x ( n i ) ) = 0   s ( n x ) = 0 x   ,   1 s ( n x ) l 1    
w h e r e ,   x = min s ( n j , s ( n x ) ) { f s ( n j + c s ( n j , x ( n i ) }
In this case, x denotes the minmal cost factor. Let us consider d = f s ( n j + c s ( n j , x ( n i ) ) ) ; the ODAC model can be determined based on residual energy (joules) level ( n ( e R i ) ) and transmission readiness factor ( n ( e t i ) ) of the sensor node as shown in Equation (4). The relationship between Equations (3) and (4) describes the identification of s ( n x ) as successive x ( n i ) associtivity in the path. In this case, d can be termed as the function of cost metric along the forwarding path.
f ( x ( n i ) ) = 0   s ( n x ) = 0 y   ,   1 s ( n x ) l 1    
w h e r e ,   y = min s ( n j , x ( n i ) d + n ( e R i + n ( e t i ) )
d ( x ( n i ) ) U l  
U l C h a n n e l   b i a s   f a c t o r
In the same manner, Equation (5) depicts the relationship between d and the channel bias factor U l when x ( n i ) has been continuously associated with the channel between s ( n i ) and s ( n j ) . This shows that the channel bias factor directly affects the manipulations of the succeeding node’s association process in ODAC mechanism. The connectivity between the sensor nodes is interrupted by different types of attackers. An attacker is a sensor node that can interpret medium data frames and other control messages. The attacker model is determined as given in Equation (6). The attacked channel frame, C h a d v , indicates a particular target frame, T f r , where the legitimate frame sequence f i is in the medium.
C h a d v _   f = f i . s i g ( f i . I f f i , T f r )
As given in Equation (6), denotes the attack-tuning function over MAC frames and I f indicates the frame interference or interruption function. In this equation, f i specifies the changes in the MAC frame sequence due to attacker events. The outomes of attack interruption function can vary according to different targeted transmissions and channel frames. The model of C h a d v _   f states the impact of attackers on the channel in addition to regular channal bias conditions U l .
As discussed, I f denotes the frame interference functions in wireless network environment. In this regard, I f is expressed as given in Equation (7).
I f = D A .   F A . d t     l ( c i )
Equation (7) measures the impact of adversarial data extraction functions and frame-corrupting functions ( D A a n d   F A ) concerning changing time intervals, d t , for all active wireless channels, l ( c i ) . In this case, C h a d v _   f can lead to information theft, identity theft, misrouting, false data injection, data dropping, and other channel-based attacks. Under this determination model, ( D A a n d   F A ) denote the regular practices of any attacker as frame data extraction and frame corruption, respectively. To protect the wireless medium and data on the channel, the proposed system creates a secure frame-interleaving approach by inserting effective honeypot frames. As given in Figure 2, the data are transferred in the wireless medium as a sequence of MAC frames through a multi-hop transmission strategy. Generally, attackers target the frames randomly or based on the information gathered from the particular data frame. The proposed system creates hidden honeypot frames that are interleaved into original frame sequences. Frames specified in red color indicate secure wireless honeypot frames inside the legitimate frame orders.

2.2.2. Wireless Interleaved Honeypots

The novel wireless honeypot-framing practices generate the chances of attackers accessing the honeypot frame instead of an original data frame. Each MAC frame sequence contains randomly inserted honeypot frames to deceive the attackers so as to make them feel as if they are accessing the original frame contents. The interleaved honeypot frame consists of an internal Message Validity Block (MVB), Honeypot Boot Block (HBC), and Intrusion Analysis and Validation Block (IVB). As shown in Figure 3, MVB provides fake frame attributes to attract the attackers and the incoming frame validity analyzer. The incoming frame is considered as an attacker’s request that is injected into the transmission sequence. The frame validity analyzer unit of MVB checks the time validity and response expectations of attacker injections. At the same time, each MVB maintains the local node’s timestamp value, T s , which indicates the time of attacker’s injection.
As mentioned in Figure 2, HBC is the snippet of boot code for initiating the internal honeypot engine functions to detect attacker events. As a preview of honeypot attack detection functions, IVB activates intrusion and attack classification procedures to create malicious logs and alert messages. Generally, the random IHF sequences (traps) are unknown to attackers.
The proposed honeypot frames are inserted based on the frame-interleaving algorithm at the sender’s end. A sender node activates a honeypot frame-interleaving algorithm before it transmits the data on a wireless medium. As given in Figure 4, each sender-based-frame-interleaving algorithm works with an internal honeypot frame queue that holds a collection of fake frames (honeypot frames). Based on proposed honeypot insertions, wireless MAC protocol carries honeypot-inserted frame data on the channel. This novel practice creates a random trap for malicious injections. Similarly, the receiver node receives interleaved frame sequences and executes a honeypot frame-de-interleaving algorithm to obtain the original data. The secure data transmission helps to ensure resilient and flexible wireless honeypot security assurance [41,42,43,44].
The technical problem and solution to implementing random honeypot slot generation are illustrated in procedure A and procedure B. Procedure A shows random bit string generation using the sender’s internal node attributes, SHA-3 (512 Bit) computations, and random bit elector function. This approach ensures absolute slot randomness in honeypot frame insertions.
At the end of Procedure A (shown in Algorithm 1), the sender node produces these random slot identifiers as a sequence of keyed bit strings R i in a tiny tuple K e y   s . Consequently, procedure B (shown in Algorithm 2) describes the technical details of IHF productions and insertions into the sender transmission lines, n ( T X i ) . As discussed, each sender maintains an IHF queue, I R Q i , to ensure secure multi-path data transmission in WSN [45,46]. In this case, R i are evaluated by node-centric parity bit engine to identify true cases and false cases for inserting IHF into n ( T X i ) . Equation (8) depicts K e y   s in matrix format and Equation (9) shows parity bit generation for inserting IHF between original wireless frames.
Algorithm 1. Procedure A.
Procedure (A): g e n : r a n d n L A , s : s e e d
Input: n L , s e e d ,   s : s e e d
Output: r a n d o m   n u m b e r ,   R
1. Get node MAC address (48 bits), n L A
2. Set random seed matrix s e e d   i k
3. Computer, s : s e e d     n i c i , τ ; n i s e n d e r ,   c i c h a n n e l   i d ,   τ S e s s i o n   i d
            s : s e e d = n L A | | s e e d   i x k x
      n _ r i = r a n d s : s e e d T N ; T T i m e s t a m p   ,   N N o n c e
4. Call the SHA-3 (512 Bits) function and do
                R = S h a _ 3 512 n r i
5. Start binary bit string computation,
         R b = t r _ b i n R ; t r _ b i n B i t   t r u n c a t i o n
6. Redo for all n i .
7. Construct binary R b matrix, R b i k
8. Generate random slot bits, R = r a n d _ e l e c t R b i k
9. Store R i in K e y   s iteratively
10. Recall the steps from 1 to 10.
End of Procedure (A)
Algorithm 2. Procedure B.
Procedure (B): f I n t e r R i ,   I H F
Input: R i
Output: Interleaved Honeypot Frames On Channel

1. Set n i to data transmission mode
2. Get the stream of R i from Procedure B
3. Set Interleaved Honeypot Frame (IHF) queue I R Q i at sender
4. Do for each transmission, n ( T X i ) at sender
                  I f R i = = p 1 :
             p o p I R Q i   &   I R Q i c o u n t
             I n s e r t   f i , f i + 1 ,   I H F i n ( T X i )
           I f R i = = p 0 :
             I n s e r t   f i n ( T X i )
           E l s e :
             n ( T X i ) E r r o r
5. Set Deinterleaver Honeypot Frame (DHF) queue D R Q i at receiver
6. Do for each reception, n ( R X i ) at receiver
               I f R i = = 1 :
             p o p f i , f i + 1 ,   I H F i   &   p u s h   ( D R Q i )
             D R Q i c o u n t + +
                I f R i = = 0 :
             n ( R X i ) R e c e i v e   F r a m e
           E l s e :
             n ( R X i ) E r r o r
7. Do for all active channels, C ( A X i )
8. Call Procedure (A) for each n ( T X i ) at C ( A X i )
9. Set the number of I H F i as k c I ; c I C h a n n e l   I n d e p e n d e n c e   F a c t o r
End of Procedure (B)
Based on the sequence of contiguous bit strings, the parity bits are computed for managing bit-level similarity at the sender and receiver sides. The node-centric parity-checker function finds odd parity combinations of bit strings to insert the frames.
K e y   s = 1 0   0   0   1 1 0 0   0   0   1 1 1 0   1   0   1 1 1 0 1
p 0 | 1 = p K e y   s   i k  
In WSN, there are various open channels available for sensor data transmissions. However, the active channels are being attacked by malicious activities. Here, the proposed system initiates the IHF solutions for all active wireless channels, C ( A X i ) . Figure 5 illustrates the flow diagram of secure hashing, random bit generations (procedure A), IHF procedures, DHF procedures, Binary Phase Shift-Keying (BPSK) modulation, and data-channeling functions.
The ICFs have a major role in acting against malicious attacks and all suspicious injections on the wireless channel. As WSN distributes the data from various sender nodes via multi-path-routing procedures, the need for sender-originated IHFs is generated for the original frame sequence. In this process, each IHF holds a random number of fake data and other lookalike network credentials to thwart the attackers [47,48].
At the same time, the interleaving and de-interleaving functions are called at the sender point and receiver point, respectively. The data-forwarding nodes and neighbors of sender and receiver are associated with exchanging the data and not extracting the contents. In the same manner, the activation of the node-centric honeypot-based DIDS engine depends on the successful malicious access to random IHF on the channel. The proposed system develops locally reactive honeypot DIDS engines in each sensor node against the attacker’s events. The proposed honeypot DIDS procedures are called due to HBC activation based on attackers’ interruptions of IHF. Procedure C (Algorithm 3) illustrates the secure wireless MAC practices based on IHF and node-centric honeypot DIDS calls.
The proposed wireless honeypot frames, W H , are configured to expect runtime attacks and malicious intrusions and react against detected attacks based on traffic rule engines. As mentioned in procedure C, a ( m a c i ) indicates a successful attacker event to the IHF on the channel. According to active a ( m a c i ) on the wireless channel, the HBC and IVB of IHF are called to alert the immediate sink nodes of the frame on the channel. For example, n ( X i ) forwards the frame sequence to n ( X i + 1 ) through wireless MAC among attackers. Based on a ( m a c i ) on the channel, both n ( X i ) and n ( X i + 1 ) are alerted to call their internal honeypot DIDS engines to monitor the runtime attacks. Figure 6 illustrates HBC and IVB activations to call node-centric honeypot engines. According to Figure 6, procedure C illustrates the initialization of wireless honeypot frames, W H : F r a m e e v e n t s .
Procedure C shown in Algorithm 3 shows the active-monitoring steps to track the attacker’s access over wireless MAC frames.
Algorithm 3. Procedure C.
Procedure (C): W H : F r a m e e v e n t s
Input: Attacker access a ( m a c i )
Output: Attacker logs and report
1. Do for all attacker access over MAC frame sequence, a ( m a c i )
          I f   a ( m a c i , I H F i ) = = T R U E ) :
            Go to step 2.
          I f   a ( m a c i , I H F i ) = = F A L S E ) :
            Go to step 3.
2. Call HBC and IVB functions (Procedure (D))
          Create an alert to all neighbours, n n
          Make an entry in the attacker’s record, A ( r n )
3. Continue n ( T X i ) and n ( R X i )
4. Do for all active channels, C ( A X i )
5. Call procedure (A) and procedure (B) for activating each n ( T X i ) at C ( A X i )
End of Procedure (C)
Compared to other existing mechanisms, the proposed wireless honeypot principles ensure real-time data security only on active channels rather than entire channel connections. The reactive security support system provides a novel solution against various attacks with minimal energy consumption. The attack alert system for each channel works based on the attacker database and rule-based intrusion detection policies [49,50]. These DIDS policies are executed concerning the sensor node’s local decision-making functions and MAC alert functions. Based on successful HBC and IVB functions, the security internals of the sensor node call procedure D (shown in Algorithm 4). Procedure D initiates event analysis functions for each channel transmission during various active intervals. In this traffic analysis procedure, each request of various internal nodes is validated concerning Rule   set a to detect the intrusions over the channel.
Algorithm 4. Procedure D.
Procedure (D): I D S _ E n g i n e H B C   a n d   I V B
Input: D a t a [ a ( m a c i ) ]
Output: Suspicious events detection
1. From Procedure C (step 2)
2. Set node’s internal intrusion dataset I f
3. Get e v e n t s   ( a ( m a c i ) ) at node n i ; sender or forwarding node
4. Call I D S _ E n g i n e H B C   a n d   I V B at n i
            I f   a ( m a c i , I H F i ) = = T R U E ) :
             Call IDS rule engine functions
             Start u l e   s e t a ; a t r a f f i c   a t t r i b u t e s , Table 1.
             Validate I f   M A C _ i n i = = T R U E
             Validate I f   M A C _ i p n i = = M A C _ i p r n i
             Validate I f   B p n i = = B p r n i
       p r n i P r e c e d i n g   N o d e ; B p n i B l o c k e d   i d e n t i f i e r s ,
         M A C i W i r e l e s s   P h y s i c a l   A d d r e s s   o f   s e n s o r   n o d e
5. Start rule-based classification function,
          C R F = i = 1 N f ( c 1 , c 2 , c 3 c N )   C ( A X i )
6. Set event classifier logs for each node
7. Update the logs for each session
8. Redo for all channels
End of Procedure (D)
The rule-based attack classifiers analyze the sensor node’s request at the receiver node depending on successful IHF access by any attacker node. Usually, the legitimate sensor nodes are restricted from accessing IHF as they have been known to interleave functions. From the technical discussion of the proposed model, the novel wireless IHF techniques are identified as more reliable security solutions [51,52,53]. Anyhow, the absence of confidentiality, authentication, and channel-sealing policies creates channel vulnerabilities against crucial wireless attacks. In this circumstance, the lightweight encryption algorithms and authentication algorithms hide the multi-channel data transmissions [54,55]. The proposed system develops channel-aware Advanced Encryption Standard (AES) and Elliptic Curve Cryptography with Digital Signature (ECCDS) algorithms to protect the data on the channel.
Cipher Frames,
C f i = s . E D a t a f , A _ K e y 128 C ( A X i )  
Decrypted Frames,
D a t a f i = s . D C f i , A _ K e y 128 C ( A X i )
A _ K e y 128 A E S   K e y  
s R a n d o m   b l o c k s   t a k e n   b y   A E S   α   e A X ,   e n e r g y
Equations (10) and (11) provide the details of channel frame encryption and decryption models support for secure data transmission. The data confidentiality on wireless channels is achieved by blocking specific AES functions. In the same manner, the participant authentications are ensured with the help of ECCDS principles. As sensor nodes are limited to energy resources and other memory constraints, device-specific authentication principles are required. Based on this issue, ECCDS has been loaded inside the sensor node to authenticate insiders and outsiders. Equation (12) provides the technical aspects of ECCDS with message authentication codes.
A n = E C C D S s e s s i o n i d m n t s n c
m n m e s s a g e   a u t h e n t i c a t i o n   c o d e  
t s s e s s i o n   t i m e s t a m p
n c R a n d o m   n o n c e
Thus, the proposed security principles and wireless IHF models protect vulnerable WSN channels from attackers. Figure 7 illustrates the overall proposed design of WIHFM and its internal phases. Section 3 provides an experimental circumstance and the performance benefits of existing and proposed techniques.

3. Results and Discussion

The experimental test has been created based on the technical specifications listed in Table 1. As per the configured network environment, data communication is initiated through multi-hop channels. In this neighbor-based mode of data communication, each sensor node shall act as either the source, destination, or forwarding node. The WSN has been developed with 300 sensor nodes at the maximum population case [56,57]. As mentioned in the simulation specifications, the proposed WIHFM and ODAC provide major contributions to virtual wireless channel management policies and IHF policies, respectively. At the same time, the experiment has been implemented with a routing fusion of an Ad hoc On-Demand Distance Vector (AODV)-routing protocol and Optimal Link State Protocol (OLSR) to handle multi-channel routing procedures. In this experiment, the WSN nodes are configured with a random mobility model that attains a velocity rate between 10 m/s (m/s) and 50 (m/s). The experiment allows both legitimate network nodes and attacker nodes to build vulnerable channel conditions [58,59].
As the simulation environment has been created for a worst case WSN scenario, in the configured geographical area (1000 m × 1000 m), the deployment of 300 sensor nodes with a random mobility model create appropriate complexity levels in terms of population, channel establishment time, and link management. Generally, the maximum transmission range of a sensor node is configured up to 100 m. In this scenario, the transmission range has been increased up to 150 m to acquire the actual performance of a real-time sensor environment. In this case, a constant position mobility model can also be used for deploying WSNs. However, the mobility model leads to network uncertainties and random options for constructing the links and channels for each iteration in the simulation model. This practice helps to observe the performance of the proposed system under complicated geographical conditions rather than constantly deployed sensor nodes.
Here, the proposed experimental setup expects a wormhole attacker, a packet-dropping attacker, an identity theft attacker, a MAC frame-eavesdropping attacker, and a misrouting attacker. Apart from legitimate sensor nodes, attacker nodes are created in order to initiate the attacks on various channels. These attacker functions are called from selected attacker nodes to initiate malicious events randomly, as per the simulation setup. The wormhole nodes (calling functions to record the neighbor node’s data and tunnel them into another node) are created around legitimate sensor nodes in the network. The packet-dropping attacker node calls the functions to collect the data from a legitimate node and drop the same data at the receiving point itself. In this simulation, the identity theft attacker is considered to initiate the functions to obtain the neighbors’ identifiers and manipulate these identifiers due to the attacker’s lack of network reputations. The eavesdropping attacks in the sensor networks are configured with the simulated functions for recording the nearest data transmissions of any node. Finally, the misrouting attack calls the simulated functions that change the legitimate routing table entities into fraudulent entities. The legitimate sensor nodes shall expect any attack from other nodes to be intercepted by the wireless channel. The network simulation arrangement has been deployed using Network Simulator (NS-3.35) tool. In this work, we have implemented network setup and data transmission scenarios using the C++ options of NS-3. Similarly, the internal functions of the existing techniques and proposed models were created with the help of python library files. The proposed model has been developed and compared with the notable existing techniques such as SZ-MAC, BASR, and TBNE. The proposed work and the works acquired for the experimental comparison are implemented in the NS-3 tool under the specified network environment (Table 1) and network features. This evaluation identifies the contributions of each work against uniform network natures and provides a reasonable outcome. Figure 8 exemplifies the production latency (milliseconds (msec)) of WIHF in the wireless channel. The transformation of IHFs into legitimate frames in the wireless channel employs reasonable latency values at different sessions : T 1 ,   T 2 ,   T 3 ,   and   T 4 .
Each session consumes a unique communication duration based on the currently available communicating parties in the network [60]. As given in Figure 8, the IHF production latency varies from 110 milliseconds (msec) to 155 msec. The observation of the IHF production latency denotes the average time taken to produce and insert the IHFs into a legitimate MAC frame sequence on the channel. According to the experiment, Figure 8 shows the average IHF production latency for each channel (five channels are observed). Similarly, Figure 9 depicts the unknown access into the IHF traps on the channel. As per the evaluation, the number of malicious injections over the IHFs gradually increases due to various channel attacks, as mentioned earlier. These malicious nodes are being caught in IHF traps continuously and being misled into distributed wireless honeypot engines running in each sensor node [61,62].
Figure 9 illustrates the increasing number of sensor nodes from 50 to 300 at the different iterations of the simulation. On the other side, the changing communication sessions T 1 ,   T 2 ,   T 3 ,   and   T 4 receive frequent attacker requests to intercept the channel activities that are identified and isolated in order to distribute the honeypot environment. In this manner, Figure 8 and Figure 9 provide the IHF production latency and the benefit of using IHF traps, respectively. Consequently, the activation of the honeypot engines and their response time play a crucial role in ensuring reactive intrusion detection activities in the WSN. As per the necessity, Figure 10 signifies the average honeypot response time taken by the sensor nodes under the proposed WIHFM. Here, the response time varies between 80 msec and 120 msec. The variation in the response time depends on the idleness rate or multiprocessing rate of each sensor node at time T .
As shown in Figure 10, the response time is slowly increasing as the number of sensor nodes increases at the iterative slots. The increasing number of nodes increases the overall channel liveliness and multiprocessing heaps.
Based on these discussions, the practical abilities of the proposed WIHFM are recognized during different iterations. The functional aspects of the proposed WIHFM are compared with SZ-MAC, BASR, and TBNE. Each existing technique uses unique channel security principles such as secure MAC protocol, blockchain commutations, and key-based trust evaluation models, respectively. In this regard, Figure 11 depicts the average true positive rate of different techniques throughout the alteration of several malicious injections into the channel.
Compared to other channel security models, the proposed WIHFM creates complex random honeypot trap possibilities uniquely [63]. Consequently, malicious events are widely trapped under IHFs. The malicious events are categorized under false data injections, wormhole starts, packet drops, identity hacks, and other channel intrusions through MAC frames. Figure 11 shows the proposed model’s true positive rate between 89.8% and 99.6%. At the same time, the existing techniques achieve a rate of true positives between 91.6% and 97.6%. Figure 12 clarifies the average routing delay for each data transmission during vulnerable channel activities. As discussed, the proposed model has a better honeypot management system with limited latency rates. Additionally, the fusion of AODV and OLSR enables fast route updates during attacker interactions.
In this routing strategy, the AODV optimizes the reactive route updates and OLSR optimizes overall network updates latencies. Based on distributed WIHFM functions, the need for optimal routing fusion confirms a minimal routing delay compared to other existing techniques. In this scope, a secure and trusted routing protocol is another choice for notable research works [64,65].
In this experiment, the proposed WIHFM and BASR produce almost bordering routing delay (msec). However, the proposed WIHFM has a smaller routing delay than BASR between 102 msec and 127 msec. Other techniques attain a maximum routing delay between 153 msec and 160 msec. This result shows the optimal handling of data routing through multiple channels. Figure 13 delivers the additional computation burden incurred by each node during the overall WIHFM functions and other existing security functions.
The proposed functional internals of each security technique consume significant computation overhead from 12.6% to 16.8%. In these cases, the proposed model achieves a slightly improved overhead compared to other techniques between 12.6% and 14.9%. Similarly, BASR attains its maximum overhead of 15.6%. Compared to other security techniques, the proposed model has lightweight IHF procedures, distributed honeypot management principles, and attack detection rules in each node. Hence, the proposed WIHFM manages the finest computation overhead from among the other systems, as the velocity of the sensor node varies from 10 m/s to 50 m/s. In the same manner, the important feature of the proposed security framework is examined using a secure throughout probability rate as given in Figure 14. Secure throughput is defined as the rate between the protected frame data and overall data transmitted through the wireless channel. Here, TBNE and SZ-MAC attain a lower secrecy rate as these techniques are built with insufficient resilient node evaluation procedures. Subsequently, these techniques secure the channel frames at the minimal rates of 0.82 and 0.88, respectively. As the node’s velocity changes from 10 m/s to 50 m/s gradually, the secrecy management hurdles increase for all techniques on the vulnerable channels. Moreover, the proposed model maintains the lowest secure throughout probability rate as 0.96 against the maximal movement of the sensor node. This experiment justifies the ability of the overall network security level provided by the proposed WIHFM during uncertain node movements.
Complexity evaluation experiments and encryption quality analysis tasks are essential for optimizing the performance of tiny wireless sensor nodes. Table 2 shows the complexity levels of various encryption mechanisms and the device adaptability solutions.
As the proposed method uses AES and ECCDS for establishing channel confidentiality and neighbor authentication, respectively, Table 2 provides an understanding of cryptography complexities. According to the experiments, AES/ECCDS fusion takes 127 KB in the node’s memory and 515 msec of latency. In contrast, other approaches such as the Data Encryption Standard/Rivest Shamir Adleman (DES/RSA), AES/ Digital Signature Algorithm (AES/DSA), Twofish/DSA, and Diffie–Hellman (DH)/ECCDS have considerable complexities under time and space domains. According to the complexity analysis, the AES/ECCDS suite is identified as a compatible technique for tiny sensor nodes.
Likewise, Table 3 provides the working strategies and response times for the various cryptography suites. As per the identifications, the response time of AES/ECCDS is a minimum of 485 msec compared to other suites. In this regard, the lightweight encapsulation adaptability of the AES/ECCDS suites is better for the sensor node platform with respect to improving the channel security. This experiment reveals that other suites achieve response times between 638 msec and 780 msec as maximum quantities compared to the AES/ECCDS suite. The importance of virtual link management functions has been evaluated, as shown in Table 4. The observations of Table 2, Table 3 and Table 4 are extracted from the simulator to evaluate the complexity levels of the channel security mechanisms. The details do not replicate any other sources. The purpose of this complexity evaluation is to justify the choice of the appropriate security frameworks for resource-limited wireless sensor networks.
In this evaluation, the proposed WIHFM-ODAC system achieves an optimal channel recreation time (msec) during attacker interruptions (Figure A1) and other channel interruptions. At the same time, BASR, SZ-MAC, and TBNE consume more channel recreation time, which disturbs the overall network liveliness. Consequently, the rate of channel availability reduces frequently for all sessions in the network. As the ODAC has on-demand connectivity establishment functions based on dynamic graph computations, the sustainability of each wireless channel is recreated more optimally than in other models. In this experiment, the specificity metric plays an important role in determining the capability of the system in order to show the correctly measured legitimate frames. In particular, the system specificity is defined as t n / t n + f p . In this metric, t n t r u e   n e g a t i v e ;   f p f a l s e   p o s i t i v e .
Table 5 illustrates the observed specificity rates (%) of the proposed models and existing techniques. The better performance of the proposed model against the existing techniques is attained through a secretly interleaved frame analysis and distributed honeypot model activation procedures.
In this manner, the resiliency of ODAC has been justified. Thus, the proposed WIHFM ensures secure wireless communication through significantly developed IHF functions (Figure A2 and Figure A3). In addition, the proposed WIHFM can be applied for the benefits of moderate security platforms and applications. Specifically, the application of WSNs in home automation systems and agriculture systems requires moderate or minimal security considerations [66,67]. Under these environments, the proposed WIHFM and distributed security policies defend against outsiders’ or attackers’ intrusion into any network device (sensor node). Notably, the performance of WIHFM for minimal security applications inevitably reaches the maximum specificity rate and sensitivity rate. At the same time, the sensor nodes adopted for agricultural networks and home automation networks require suitable computation capabilities to achieve the maximum secure throughput rate through the channels. In addition, the rate of computation efficiency and power efficiency decides the successful execution of WIHFM’s procedures in each sensor node. Consequently, the application of the proposed WIHFM needs environmental validation processes and configuration validation processes to ensure optimal energy consumption, latency, throughput, sensitivity, and specificity in real-time.

4. Conclusions

The security principles and cryptography mechanisms used for protecting data communications are widely practiced among various types of wireless networks. However, the identification of a novel MAC security management system supports resilient WSN protection against various attackers. In this article, the proposed system was implemented with distributed WIHFM and ODAC virtual link management features. As per the newly developed model, the IHF features were identified as novel distributed solutions implemented in each sensor node of the WSN. Similarly, the WIHFM enabled IHF computations and distributed wireless honeypot engines to create random attacker traps to coax the attackers into forged honeypot resources of the sensor node. Based on the proposed model, the attackers and the malicious activities were effectively trapped in IHFs. Consequently, the trapped accesses were recognized as either intrusions or attacks. Finally, the proposed model was compared with the existing frameworks such as BASR, SZ-MAC, and TBNE, as shown in the experimental section. Moreover, the proposed WIHFM outclassed other techniques, as discussed through various performance metrics. However, the proposed WIHFM has limitations regarding its uncertain IHF latency and honeypot response time as the network dynamics change continuously. Future technical aspects, such as the intelligent network dynamic analysis model, dynamic programming model, and uncertainty computation model, are expected to compensate the limitations of WIHFM.
As the current network MAC models are not optimally enriched with low-powered dynamic programming solutions against channel uncertainties, the need to improve the static limitations of WIHFM is required in the future. In addition, the next-generation honeypot solutions in the wireless environment are expected to be improved with these distributed trap management policies for application-specific sensor platforms. Notably, the next-generation WSN models are widely sensitive to the energy utilization rate with respect to their application platform. Considering the internals of notable WSNs’ applications, the proposed novel WIHFM can be implemented for military sensor networks, healthcare sensor networks, and other deployment strategies exclusively in the future.

Author Contributions

Conceptualization, R.S.; Article Writing and System Design, M.R.; Design Analysis and Implementation, A.M.; Literature Survey, E.H.; Technical Observations, J.L.; Problem Definition and Technical Comparisons. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

Not Applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Snapshots Provided Based on the Reviewer Responses

Figure A1. Python snippet for attack packet spoofing function.
Figure A1. Python snippet for attack packet spoofing function.
Sensors 22 08046 g0a1
Figure A2. NS-3.35: Network Scenario (100 Sensor Nodes).
Figure A2. NS-3.35: Network Scenario (100 Sensor Nodes).
Sensors 22 08046 g0a2
Figure A3. NS-3.35: Data Transmission.
Figure A3. NS-3.35: Data Transmission.
Sensors 22 08046 g0a3

References

  1. Lloret, J.; Garcia, M.; Bri, D.; Sendra, S. A wireless sensor network deployment for rural and forest fire detection and verification. Sensors 2009, 9, 8722–8747. [Google Scholar] [CrossRef] [PubMed]
  2. Mezrag, F.; Bitam, S.; Mellouk, A. An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks. J. Netw. Comput. Appl. 2022, 200, 103282. [Google Scholar] [CrossRef]
  3. Guimaraes, G.; Souto, E.; Sadok, D.; Kelner, J. Evaluation of security mechanisms in wireless sensor networks. In Proceedings of the 2005 Systems Communications (ICW’05, ICHSN’05, ICMCS’05, SENET’05), Montreal, QC, Canada, 14–17 August 2005; pp. 428–433. [Google Scholar]
  4. Sharma, K.; Ghose, M.K.; Kumar, D.; Singh, R.K.; Pandey, V.K. A comparative study of various security approaches used in wireless sensor networks. Int. J. Adv. Sci. Technol. 2010, 17, 31–44. [Google Scholar]
  5. Bhushan, B.; Sahoo, G. Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective. In Handbook of Computer Networks and Cyber Security; Springer: Cham, Switzerland, 2020; pp. 683–713. [Google Scholar]
  6. Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, J.C. Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef]
  7. Han, Y.; Hu, H.; Guo, Y. Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 2022, 10, 11538–11550. [Google Scholar] [CrossRef]
  8. Zhang, H.; Xing, S.; Wang, J. Security and application of wireless sensor network. Procedia Comput. Sci. 2021, 183, 486–492. [Google Scholar]
  9. Keerthika, M.; Shanmugapriya, D. Wireless Sensor Networks: Active and Passive Attacks-Vulnerabilities and Countermeasures. Glob. Transit. Proc. 2021, 2, 362–367. [Google Scholar] [CrossRef]
  10. Salau, A.O.; Marriwala, N.; Athaee, M. Data security in wireless sensor networks: Attacks and countermeasures. In Mobile Radio Communications and 5G Networks; Springer: Singapore, 2021; pp. 173–186. [Google Scholar]
  11. Almesaeed, R.; Al-Salem, E. Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wirel. Netw. 2022, 28, 1361–1374. [Google Scholar] [CrossRef]
  12. Panahi, U.; Bayılmış, C. Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Eng. J. 2022, 13, 101866. [Google Scholar] [CrossRef]
  13. Wang, H.; He, H.; Zhang, W.; Liu, W.; Liu, P.; Javadpour, A. Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 2022, 102, 108212. [Google Scholar] [CrossRef]
  14. Lygerou, I.; Srinivasa, S.; Vasilomanolakis, E.; Stergiopoulos, G.; Gritzalis, D. A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Secur. 2022, 21, 1211–1222. [Google Scholar] [CrossRef]
  15. Veluchamy, S.; Kathavarayan, R.S. Deep reinforcement learning for building honeypots against runtime DoS attack. Int. J. Intell. Syst. 2022, 37, 3981–4007. [Google Scholar] [CrossRef]
  16. Acosta, J.C.; Basak, A.; Kiekintveld, C.; Kamhoua, C. Lightweight On-demand Honeypot Deployment for Cyber Deception. In Proceedings of the International Conference on Digital Forensics and Cyber Crime, Boston, MA, USA, 16–18 November 2022; Springer: Cham, Switzerland, 2022; pp. 294–312. [Google Scholar]
  17. Pashaei, A.; Akbari, M.E.; Lighvan, M.Z.; Charmin, A. Early Intrusion Detection System using honeypot for industrial control networks. Results Eng. 2022, 6, 100576. [Google Scholar] [CrossRef]
  18. Di Pietro, R.; Mancini, L.V.; Soriente, C.; Spognardi, A.; Tsudik, G. Data security in unattended wireless sensor networks. IEEE Trans. Comput. 2009, 58, 1500–1511. [Google Scholar] [CrossRef]
  19. Yang, H.; Ye, F.; Yuan, Y.; Lu, S.; Arbaugh, W. Toward resilient security in wireless sensor networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, Urbana-Champaign, IL, USA, 25–27 May 2005; pp. 34–45. [Google Scholar]
  20. Khan, I.U.; Qureshi, I.M.; Aziz, M.A.; Cheema, T.A.; Shah, S.B. Smart IoT control-based nature inspired energy efficient routing protocol for flying ad hoc network (FANET). IEEE Access 2020, 8, 56371–56378. [Google Scholar] [CrossRef]
  21. Singh, I.; Lee, S.W. Self-adaptive and secure mechanism for IoT based multimedia services: A survey. Multimed. Tools Appl. 2022, 81, 26685–26720. [Google Scholar] [CrossRef]
  22. Gupta, S.; Gupta, S.; Goyal, D. Wireless Sensor Network in IoT and Performance Optimization. Recent Adv. Comput. Sci. Commun. 2022, 15, 14–22. [Google Scholar] [CrossRef]
  23. Bharany, S.; Sharma, S. Intelligent Green Internet of Things: An Investigation. In Machine Learning, Blockchain, and Cyber Security in Smart Environments; Chapman and Hall: London, UK; CRC: Boca Raton, FL, USA, 2022; pp. 1–15. [Google Scholar]
  24. Xiao, Y.; Chen, H.H.; Sun, B.; Wang, R.; Sethi, S. MAC security and security overhead analysis in the IEEE 802.15. 4 wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2006, 2006, 093830. [Google Scholar] [CrossRef] [Green Version]
  25. Boyle, D.; Newe, T. Securing Wireless Sensor Networks: Security Architectures. J. Net. 2008, 3, 65–77. [Google Scholar] [CrossRef] [Green Version]
  26. Karlof, C.; Sastry, N.; Wagner, D. TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 162–175. [Google Scholar]
  27. Yadav, R.; Varma, S.; Malaviya, N. A survey of MAC protocols for wireless sensor networks. UbiCC J. 2009, 4, 827–833. [Google Scholar]
  28. Singh, V.; Sharma, G.; Poonia, R.C.; Trivedi, N.K.; Raja, L. Source redundancy management and host intrusion detection in wireless sensor networks. Recent Adv. Comput. Sci. Commun. 2021, 14, 43–47. [Google Scholar] [CrossRef]
  29. Sachan, S.; Sharma, R.; Sehgal, A. Energy efficient scheme for better connectivity in sustainable mobile wireless sensor networks. Sustain. Comput. Inform. Syst. 2021, 30, 100504. [Google Scholar] [CrossRef]
  30. Elshrkawey, M.; Al-Mahdi, H. Sda-sm: An efficient secure data aggregation scheme using separate mac across wireless sensor networks. Int. J. Comput. Commun. Control 2021, 16, 1–18. [Google Scholar] [CrossRef]
  31. Kumar, M.J.; Kumar, G.R.; Krishna, P.S.; Sai, N.R. Secure and efficient data transmission for wireless sensor networks by using optimized leach protocol. In Proceedings of the 2020 6th International Conference on Inventive Computation Technologies (ICICT), R.V.S. Technical Campus, Coimbatore, India, 20–22 January 2021; pp. 50–55. [Google Scholar]
  32. Khashan, O.A.; Ahmad, R.; Khafajah, N.M. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Netw. 2021, 115, 102448. [Google Scholar] [CrossRef]
  33. Almansoori, M.N.; Elshamy, A.A.; Mustafa, A.A. Secure Z-MAC Protocol as a Proposed Solution for Improving Security in WSNs. Information 2022, 13, 105. [Google Scholar] [CrossRef]
  34. Awan, S.; Javaid, N.; Ullah, S.; Khan, A.U.; Qamar, A.M.; Choi, J.G. Blockchain-Based Secure Routing and Trust Management in Wireless Sensor Networks. Sensors 2022, 22, 411. [Google Scholar] [CrossRef]
  35. Meena, U.; Sharma, P. Secret Dynamic Key Authentication and Decision Trust Secure Routing Framework for Internet of Things Based WSN. Wirel. Pers. Commun. 2022, 125, 1753–1781. [Google Scholar] [CrossRef]
  36. Islam, M.N.; Fahmin, A.; Hossain, M.; Atiquzzaman, M. Denial-of-service attacks on wireless sensor network and defense techniques. Wirel. Pers. Commun. 2021, 116, 1993–2021. [Google Scholar] [CrossRef]
  37. Ojha, R.P.; Srivastava, P.K.; Sanyal, G.; Gupta, N. Improved model for the stability analysis of wireless sensor network against malware attacks. Wirel. Pers. Commun. 2021, 116, 2525–2548. [Google Scholar] [CrossRef]
  38. Bartwal, U.; Mukhopadhyay, S.; Negi, R.; Shukla, S. Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots. arXiv 2022, arXiv:2201.05326. [Google Scholar]
  39. Alobaidy, H.A.; Singh, M.J.; Behjati, M.; Nordin, R.; Abdullah, N.F. Wireless Transmissions, Propagation and Channel Modelling for IoT Technologies: Applications and Challenges. IEEE Access 2022, 10, 24095–24131. [Google Scholar] [CrossRef]
  40. Onwuegbuzie, I.U.; Razak, S.A.; Isnin, I.F. Control messages overhead impact on destination-oriented directed acyclic graph—A wireless sensor networks objective functions performance comparison. J. Comput. Theor. Nanosci. 2020, 17, 1227–1235. [Google Scholar] [CrossRef]
  41. Fang, W.; Zhang, W.; Chen, W.; Liu, J.; Ni, Y.; Yang, Y. MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 14. [Google Scholar] [CrossRef]
  42. Roja, P.E.; Misbha, D.S. Lightweight Secure Key Distribution Protocol (LSKDP) for Wireless Sensor Networks. ECS Trans. 2022, 107, 8239. [Google Scholar] [CrossRef]
  43. Shah, K.; Jinwala, D. Privacy-preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks. Front. Comput. Sci. 2021, 15, 156813. [Google Scholar] [CrossRef]
  44. Castelletti, F.; Peluso, S. Network structure learning under uncertain interventions. J. Am. Stat. Assoc. 2022, 1–12. [Google Scholar] [CrossRef]
  45. Alrahhal, H.; Jamous, R.; Ramadan, R.; Alayba, A.M.; Yadav, K. Utilising Acknowledge for the Trust in Wireless Sensor Networks. Appl. Sci. 2022, 12, 2045. [Google Scholar] [CrossRef]
  46. Mahmood, T.; Li, J.; Pei, Y.; Akhtar, F.; Butt, S.A.; Ditta, A.; Qureshi, S. An intelligent fault detection approach based on reinforcement learning system in wireless sensor network. J. Supercomput. 2022, 78, 3646–3675. [Google Scholar] [CrossRef]
  47. Rajasoundaran, S.; Prabu, A.V.; Routray, S.; Malla, P.P.; Kumar, G.S.; Mukherjee, A.; Qi, Y. Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks. Comput. Commun. 2022, 187, 71–82. [Google Scholar] [CrossRef]
  48. Parreño, I.F.; Avila, D.F. Analysis of the Cybersecurity in Wireless Sensor Networks (WSN): A Review Literature. Dev. Adv. Def. Secur. 2022, 83–102. [Google Scholar]
  49. Ametepe, A.F.; Ahouandjinou, A.S.; Ezin, E.C. Robust encryption method based on AES-CBC using elliptic curves Diffie–Hellman to secure data in wireless sensor networks. Wirel. Netw. 2022, 28, 991–1001. [Google Scholar] [CrossRef]
  50. Cortés-Leal, A.; Del-Valle-Soto, C.; Cardenas, C.; Valdivia, L.J.; Del Puerto-Flores, J.A. Performance Metric Analysis for a Jamming Detection Mechanism under Collaborative and Cooperative Schemes in Industrial Wireless Sensor Networks. Sensors 2021, 22, 178. [Google Scholar] [CrossRef] [PubMed]
  51. Pajila, P.J.; Julie, E.G.; Robinson, Y.H. FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks. Wirel. Pers. Commun. 2022, 122, 3053–3083. [Google Scholar] [CrossRef]
  52. Ramisetty, S.; Anand, D.; Verma, S.; Alaboudi, A.A. SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network. In Information Security Handbook; CRC Press: Boca Raton, FL, USA, 2022; pp. 1–18. [Google Scholar]
  53. Saravana Kumar, N.M.; Suryaprabha, E.; Hariprasath, K. Machine learning based hybrid model for energy-efficient secured transmission in wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 2022, 13, 887–902. [Google Scholar] [CrossRef]
  54. Gayathri, A.; Prabu, A.V.; Rajasoundaran, S.; Routray, S.; Narayanasamy, P.; Kumar, N.; Qi, Y. Cooperative and feedback based authentic routing protocol for energy-efficient IoT systems. Concurr. Comput. Pract. Exp. 2022, 34, e6886. [Google Scholar] [CrossRef]
  55. Naresh, V.S.; Allavarpu, V.V.; Reddi, S. Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN. J. Supercomput. 2022, 78, 8708–8732. [Google Scholar] [CrossRef]
  56. Singh, S.; Saini, H.S. Intelligent ad-hocon-demand multipath distance vector for wormhole attack in clustered WSN. Wirel. Pers. Commun. 2022, 122, 1305–1327. [Google Scholar] [CrossRef]
  57. Salim, A.; Osamy, W.; Aziz, A.; Khedr, A.M. SEEDGT: Secure and energy-efficient data gathering technique for IoT applications based WSNs. J. Netw. Comput. Appl. 2022, 202, 103353. [Google Scholar] [CrossRef]
  58. Barani Sundaram, B.; Kedir, T.; Mishra, M.K.; Yesuf, S.H.; Tiwari, S.M.; Karthika, P. Security analysis for Sybil attack in sensor network using compare and match-position verification method. In Mobile Computing and Sustainable Informatics; Springer: Singapore, 2022; pp. 55–64. [Google Scholar]
  59. Rajasoundaran, S.; Kumar, S.V.; Selvi, M.; Ganapathy, S.; Rakesh, R.; Kannan, A. Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks. Wirel. Netw. 2021, 27, 4513–4534. [Google Scholar] [CrossRef]
  60. Wazirali, R.; Ahmad, R. Machine learning approaches to detect DoS and their effect on WSNs lifetime. CMC Comput. Mat. Contin. 2021, 70, 4921–4946. [Google Scholar] [CrossRef]
  61. Yang, T.; Zhai, F.; Xu, H.; Li, W. Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs. Energy Rep. 2022, 8, 1200–1211. [Google Scholar] [CrossRef]
  62. Anwar, A.H.; Kamhoua, C.A. Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; pp. 543–549. [Google Scholar]
  63. Wan, Y.; Chen, K.; Huang, F.; Wang, P.; Leng, X.; Li, D.; Kang, J.; Qiu, Z.; Yao, Y. A flexible and stretchable bionic true random number generator. Nano Res. 2022, 15, 4448–4456. [Google Scholar] [CrossRef]
  64. Lacuesta, R.; Lloret, J.; Garcia, M.; Penalver, L. A secure protocol for spontaneous wireless ad hoc networks creation. IEEE Trans. Parallel Distrib. Syst. 2012, 24, 629–641. [Google Scholar] [CrossRef]
  65. Sorribes, J.V.; Peñalver, L.; Lloret, J. A Spontaneous Wireless Ad Hoc Trusted Neighbor Network Creation Protocol. Wirel. Commun. Mob. Comput. 2021, 2021, 5531923. [Google Scholar] [CrossRef]
  66. Onasanya, A.; Elshakankiri, M. Smart integrated IoT healthcare system for cancer care. Wirel. Netw. 2021, 27, 4297–4312. [Google Scholar] [CrossRef]
  67. Mahajan, H.B.; Badarla, A. Cross-layer protocol for WSN-assisted IoT smart farming applications using nature inspired algorithm. Wirel. Pers. Commun. 2021, 121, 3125–3149. [Google Scholar] [CrossRef]
Figure 1. WIHFM-Security Features.
Figure 1. WIHFM-Security Features.
Sensors 22 08046 g001
Figure 2. Interleaved Honeypot Frame.
Figure 2. Interleaved Honeypot Frame.
Sensors 22 08046 g002
Figure 3. Internals of MVB.
Figure 3. Internals of MVB.
Sensors 22 08046 g003
Figure 4. Honeypot frame-interleaving and de-interleaving process.
Figure 4. Honeypot frame-interleaving and de-interleaving process.
Sensors 22 08046 g004
Figure 5. SHA-Based IHF and DHF Functions.
Figure 5. SHA-Based IHF and DHF Functions.
Sensors 22 08046 g005
Figure 6. HBC and IVB.
Figure 6. HBC and IVB.
Sensors 22 08046 g006
Figure 7. Design of WHIFM Phases.
Figure 7. Design of WHIFM Phases.
Sensors 22 08046 g007
Figure 8. IHF Production Latency.
Figure 8. IHF Production Latency.
Sensors 22 08046 g008
Figure 9. Number of IHF Accesses.
Figure 9. Number of IHF Accesses.
Sensors 22 08046 g009
Figure 10. Honeypot Response Time.
Figure 10. Honeypot Response Time.
Sensors 22 08046 g010
Figure 11. True Positive Rate.
Figure 11. True Positive Rate.
Sensors 22 08046 g011
Figure 12. Average Routing Delay.
Figure 12. Average Routing Delay.
Sensors 22 08046 g012
Figure 13. Computational overhead.
Figure 13. Computational overhead.
Sensors 22 08046 g013
Figure 14. Secure Throughput Probability.
Figure 14. Secure Throughput Probability.
Sensors 22 08046 g014
Table 1. Simulation Specifications.
Table 1. Simulation Specifications.
Simulation ParametersDetails
Simulator NameNS-3.35
Number of Sensor NodesMaximum 300
Network Area1000 m × 1000 m
MACIEEE 802.11
Channel TypeWireless
Virtual Backbone ODAC
MAC Security WIHFM
Data Traffic Variable Bit Rate (VBR)
Signal Propagation Two Ray Ground
Initial Energy (Joules) 50
Transmission Range (meters)150
Channel Frequency (GHz)2.4
Mobility Rate (m/s)10, 20, 30, 40, 50
Antenna Model Omnidirectional
Routing Protocol AODV/OLSR
Simulation Time (Seconds) 300
Table 2. Complexity Levels and Device Adaptability.
Table 2. Complexity Levels and Device Adaptability.
Encryption
Techniques
Space
Complexity
(Kilobytes, KB)
Time
Complexity
(Milliseconds)
Device Adaptability
DES/RSA178890Not suitable for tiny sensors
AES/DSA166655Moderately good for tiny sensors
Twofish/DSA172660Moderately good for tiny sensors
DH/ECCDS170726Not suitable for tiny sensors
AES/ECCDS127515Suitable for tiny sensors and patch-type devices
Table 3. Response Time and Security Strategy.
Table 3. Response Time and Security Strategy.
Security
Techniques
Working StrategyResponse Time
(Milliseconds)
Lightweight Encapsulation Adaptability
DES/RSASymmetric/Authentication780No
AES/DSASymmetric/Authentication638No
Twofish/DSASymmetric/Authentication645No
DH/ECCDSAsymmetric/Authentication704No
AES/ECCDSSymmetric/Authentication485Yes
Table 4. Dynamic Channel Recreation Strategy.
Table 4. Dynamic Channel Recreation Strategy.
Backbone Management StrategiesChannel Recreation Latency (msec)
WIHFM-ODAC87
BASR126
SZ-MAC137
TBNE155
Table 5. System Specificity.
Table 5. System Specificity.
Backbone Management StrategiesSpecificity (%)
WIHFM98.95
BASR95.08
SZ-MAC95.34
TBNE94.56
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Soundararajan, R.; Rajagopal, M.; Muthuramalingam, A.; Hossain, E.; Lloret, J. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks. Sensors 2022, 22, 8046. https://doi.org/10.3390/s22208046

AMA Style

Soundararajan R, Rajagopal M, Muthuramalingam A, Hossain E, Lloret J. Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks. Sensors. 2022; 22(20):8046. https://doi.org/10.3390/s22208046

Chicago/Turabian Style

Soundararajan, Rajasoundaran, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, and Jaime Lloret. 2022. "Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks" Sensors 22, no. 20: 8046. https://doi.org/10.3390/s22208046

APA Style

Soundararajan, R., Rajagopal, M., Muthuramalingam, A., Hossain, E., & Lloret, J. (2022). Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks. Sensors, 22(20), 8046. https://doi.org/10.3390/s22208046

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop