Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques
Abstract
:1. Introduction
1.1. Motivation and Objectives
- Fewer Energy Efficiency and Connectivity Issues—All the existing works tend to increase their energy efficiency and connectivity at the node level, leveraging the communication management among the sink nodes and wireless sensor nodes (i.e., random placement of sink nodes in the SDWSN environment), which affects the connectivity and energy efficiency of the SDWSN environment.
- Improper Scheduling—The scheduling undergone by the existing works is merely based on the control messages and faults. However, with these metrics, the scheduling was not done in an effective manner. Furthermore, the existing works are limited to single-tier routing (i.e., schedules all the nodes in the SDWSN environment on a single round), which leads to increased interference issues.
- Poor Routing Security Measures—The existing works only consider trust-based routing as a security practice. However, they lack providing security to the routing data, which leads to spoofing attacks. In addition, the routing path and detection surface are kept static, which also leads to reconnaissance attacks.
- To reduce the connectivity issues in the proposed environment by performing connectivity-based network construction, which also improves the energy efficiency.
- To resolve the issue of energy consumption by performing clustering of the underlying wireless sensor nodes-based density, which also manages the nodes’ mobility in the SDWSN environment.
- To reduce the interference in the SDWSN environment by performing scheduling of the wireless sensor nodes into three tiers that also improve the sensor node lifetime in the network.
- To mitigate the cyber vulnerabilities in the SDWSN environment by performing secure routing in two ways, which also reduces the link failure issues.
1.2. Research Contribution
- For resolving the connectivity issues in the SDWSN environment, we have performed connectivity-aware network placement, which also overcomes the issue of less energy efficiency.
- For reducing the energy consumption of the SDWSN nodes, we have performed density-based clustering using the DWTMB algorithm based on several metrics. In addition, the resilient cluster leader also was selected based on high residual energy, less mobility, less distance, and high trust score.
- For reducing the unwanted interference and complexity issues, we have performed multi-tier scheduling based on a NCFT approach in which the scheduling is performed in three tiers such as CMs to CL, CLs to LBSs, and LBSs to sink nodes.
- For reducing the cybersecurity threats and link failures during routing, we have performed two-way routing in the SDWSN environment using a MTD approach. Furthermore, security during routing is utilized by the CEA algorithm.
1.3. Paper Organization
2. Literature Survey
3. Problem Statement
- Here, the security during routing was ensured by validating the route update messages of the neighbor nodes. However, only validating the route updating message and leveraging the neighbor node legitimacy leads to route misdirection attacks.
- Even though this work adopts a routing security problem in the SDN environment, this work lacks with considering interference and link failures during routing, which easily welcomes attackers to impose several malicious attacks.
- Furthermore, the routing path in this work was of a static nature, which was easy prey for the cyber crooks to impose reconnaissance attacks, thereby manipulating the routing path.
- In addition to the static routing path, this work also kept the detection layer as static, which caused the software-defined network switches to be compromised and perform black-hole and wormhole attacks, respectively.
- Here, the wireless sensor nodes and base stations were placed in a random manner without awareness of the network dynamics. Such random placement of entities leads to connectivity issues among the nodes and the base station.
- The low-energy adaptive clustering hierarchy protocol was utilized for cluster head selection. However, the adoption of the low-energy adaptive clustering hierarchy protocol limits with sparse distribution of cluster heads, thereby affecting the energy efficiency.
- This work only provides scheduling rules for the sensor nodes. As the network is composed of multiple sensor nodes, the mentioned scheduling rules (i.e., four states) did not provide proper management, leading to a high chance of interference.
- Improper management of sensor nodes and base station also affects the scalability and connectivity issues, thereby leading to high delay and energy consumption. In addition, security threats also happened due to improper node management.
Research Solution
4. System Model
- WSN Nodes—The responsibility of WSN nodes is to sense the environment in its vicinity. More clearly, the nodes are involved in cluster member and cluster leader (CL) nodes in which the cluster member continuously senses and provides the sensing results to the CLs.
- Local Base Station (LBS)—The LBS is responsible for managing the one hexagonal grid with multiple WSN nodes. The sensing results from the CLs are provided to the LBS. Here, to ensure low latency and reliable transmission, a physical one-hop connection is needed.
- Sink Node (SN)—The SN is responsible for managing the complete 2D hexagonal grids. The aggregated sensing results from the LBS of every grid are provided to the SN for forwarding to the further layers.
- SDN Switches (SDN-SW)—The SDN-SW maintains the routing tables in which the sensed results follow the routing tables based on secure routing protocol. Further, the SDN-SWs can be active and idled for security purposes.
- Edge Server (ES)—The ES is responsible for handling the switches (i.e., active/idle). Further, it also triggers MTD to the SDN-SW.
- Reconnaissance Agent (RA)—The RA is responsible for monitoring the reconnaissance attacks in the proposed SDWSN environment. More clearly, the RA is placed in the infrastructure and edge-assisted switch layers for providing MTD commands.
- Controller—The controller acts as the heart of the SDWSN environment by providing the control messages to the underlying edge-assisted SDN switches. In our work, we utilize a centralized SDN controller.
4.1. Energy Ingesting Model
4.2. Threat Model
- This work highlights the security of the WSN nodes and edge-assisted switches against MITM, eavesdropping, Denial of Service (DoS), Flow Table Attacks (FTA), and Packet Mistreating Attacks (PMA). Those attacks are held in both the infrastructure and edge-assisted switch layers to mislead the routing information.
- The reconnaissance attacks are in the edge-assisted switch layer and the SN for manipulating the SDN switches and SNs. The malicious SDN switch can redirect the flow to the malicious destination. Further, the malicious SN causes the WSN nodes to quickly drain out and also causes collision during scheduling.
4.3. Network Assumptions
- It is assumed that the centralized controller in the proposed environment is considered to be secure and the malicious attackers are not able to manipulate it.
- The proposed encryption algorithm is secure and cannot be bypassed by the attackers.
- The utilized WSN nodes in the environment are of a mobile and heterogenous nature that cannot pose any severe challenges to the network. Furthermore, managing mobility was conducted by organizing the nodes into clusters that allow the leaders to optimize routing updates and isolate any changes resulting from mobility within a specific cluster.
- The channel among the controllers and other entities (i.e., control messages provided by the controller) are secure in the proposed environment.
- Finally, the proposed routing links have enough bandwidth to impose routing in a reliable manner.
5. Proposed Model
5.1. Connectivity-Aware Network Construction
5.2. Density-Based Clustering
5.2.1. Division Stage
5.2.2. Merging Stage
5.2.3. Cluster Maintenance
Algorithm 1: Cluster maintenance strategy |
If Split the cluster: Else Merge the cluster: End If |
5.2.4. Cluster Leader Selection
Algorithm 2: CL selection method |
If then If WSN then Else End If End If |
5.3. Multi-Tier Federated Scheduling
NCFT-Based Scheduling (Second and Third Tiers)
Algorithm 3: Pseudocode for the proposed NCFT-based multi-tier scheduling (for second and third tiers) |
Initialize: , , and Determine the response of every player (16) Compute the scheduling metrics: // econd-tier Scheduling by LBS// For every CL do Compute Solve the linear Equations (17) and (18) Obtain minimized from solving (21) Perform-tier scheduling (14) End For End // Third-tier Scheduling by SN// For every LBS do Compute Solve the linear Equations (17) and (18) Obtain minimized from solving (21) Perform third-tier scheduling (15) End For End End |
5.4. MTD-Based Secure Two-Way Routing
AFT-Based Multiple Optimal Route Selection
Algorithm 4: Pseudocode for AFT-based Optimal Route Selection |
Begin Initialize: , , , , , Initialize: Best route position of all routes Compute to all the routes Set t1 While do Set the tracking distance Set the potential of routes For do If then If then Use case 1 to perform route determination (26) Else Use case 2 to perform route determination (28) End If Else Use case 3 to perform router determination (29) End If End For For do Search for optimal routes feasibility Update , of Update based on (27) End For End While End |
6. Experimental Results
6.1. Simulation Setup
6.2. Comparative Analysis
6.2.1. Analysis of Energy Consumption
6.2.2. Analysis of Packet Delivery Ratio
6.2.3. Analysis of End-to-End Delay
6.2.4. Analysis of Attack Mitigation/Prevention Rate
6.3. Research Summary
7. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Lanzolla, A.; Spadavecchia, M. Wireless Sensor Networks for Environmental Monitoring. Sensors 2021, 21, 1172. [Google Scholar] [CrossRef]
- Khalaf, O.I.; Romero, C.A.; Hassan, S.; Iqbal, M.T. Mitigating Hotspot Issues in Heterogeneous Wireless Sensor Networks. J. Sens. 2022, 2022, 7909472. [Google Scholar] [CrossRef]
- Majid, M.; Habib, S.; Javed, A.R.; Rizwan, M.; Srivastava, G.; Gadekallu, T.R.; Lin, C. Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review. Sensors 2022, 22, 2087. [Google Scholar] [CrossRef]
- Sundarraj, S.; Konganathan, G. Energy Efficient Mobile Harvesting Scheme for Clustered SDWSN with Beamforming Technique. Intell. Autom. Soft Comput. 2022, 34, 1197–1213. [Google Scholar] [CrossRef]
- Sixu, L.; Muqing, W.; Min, Z. Particle swarm optimization and artificial bee colony algorithm for clustering and mobile based software-defined wireless sensor networks. Wirel. Netw. 2022, 28, 1671–1688. [Google Scholar] [CrossRef]
- Jurado-Lasso, F.F.; Marchegiani, L.; Jurado, J.F.; Abu-Mahfouz, A.M.; Fafoutis, X. A Survey on Machine Learning Software-Defined Wireless Sensor Networks (ML-SDWSNs): Current Status and Major Challenges. IEEE Access 2022, 10, 23560–23592. [Google Scholar] [CrossRef]
- Jurado Lasso, F.F.; Marchegiani, L.; Jurado, J.F.; Mahfouz, A.A.; Fafoutis, X. A Survey on Machine Learning Software-Defined Wireless Sensor Networks (ML-SDWSNs): Current status and major challenges. IEEE Access 2016, 10, 23560–23592. [Google Scholar] [CrossRef]
- Rahimifar, A.; Kavian, Y.S.; Kaabi, H.; Soroosh, M. A Smart Duty Cycle for Lifetime Enhancement and Control Overhead in SDWSN. Iran. J. Sci. Technol. Trans. Electr. Eng. 2023, 47, 1207–1223. [Google Scholar] [CrossRef]
- Sundarraj, S.; Konganathan, G. A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming. Int. Arab J. Inf. Technol. 2023, 20, 125–133. [Google Scholar] [CrossRef]
- Rahimifar, A.; Seifi Kavian, Y.; Kaabi, H.; Soroosh, M. An efficient Markov energy predictor for software defined wireless sensor networks. Wirel. Netw. 2022, 28, 3391–3409. [Google Scholar] [CrossRef]
- Martin, K.; Jozef, K. Distributed Mechanism for Detecting Average Consensus with Maximum-Degree Weights in Bipartite Regular Graphs. Mathematics 2021, 9, 3020. [Google Scholar] [CrossRef]
- Dionisis, K.; Eleftherios, A. Advanced Wireless Sensor Networks: Applications, Challenges and Research Trends. Electronics 2024, 13, 2268. [Google Scholar] [CrossRef]
- Merabtine, N.; Djenouri, D.; Zegour, D.E. Towards Energy Efficient Clustering in Wireless Sensor Networks: A Comprehensive Review. IEEE Access 2021, 9, 92688–92705. [Google Scholar] [CrossRef]
- Orozco-Santos, F.; Sempere-Payá, V.; Silvestre-Blanes, J.; Albero-Albero, T. Multicast Scheduling in SDN WISE to Support Mobile Nodes in Industrial Wireless Sensor Networks. IEEE Access 2021, 9, 141651–141666. [Google Scholar] [CrossRef]
- Bukar, U.A.; Othman, M. Architectural Design, Improvement, and Challenges of Distributed Software-Defined Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 122, 2395–2439. [Google Scholar] [CrossRef]
- Amin, R.; Rojas, E.; Aqdus, A.; Ramzan, S.; Casillas-Pérez, D.; Arco, J.M. A Survey on Machine Learning Techniques for Routing Optimization in SDN. IEEE Access 2021, 9, 104582–104611. [Google Scholar] [CrossRef]
- AbdelKhalek, M.; Hyder, B.; Manimaran, G.; Rieger, C.G. Moving Target Defense Routing for SDN-enabled Smart Grid. In Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022. [Google Scholar] [CrossRef]
- Wang, X. Low-Energy Secure Routing Protocol for WSNs Based on Multiobjective Ant Colony Optimization Algorithm. J. Sens. 2021, 2021, 7633054. [Google Scholar] [CrossRef]
- Hajian, E.; Khayyambashi, M.R.; Movahhedinia, N. A Mechanism for Load Balancing Routing and Virtualization Based on SDWSN for IoT Applications. IEEE Access 2022, 10, 37457–37476. [Google Scholar] [CrossRef]
- Huang, R.; Guan, W.; Zhai, G.; He, J.; Chu, X. Deep Graph Reinforcement Learning Based Intelligent Traffic Routing Control for Software-Defined Wireless Sensor Networks. Appl. Sci. 2022, 12, 1951. [Google Scholar] [CrossRef]
- Han, Y.; Hu, H.; Guo, Y. Energy-aware and Trust-based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 2022, 10, 11538–11550. [Google Scholar] [CrossRef]
- AlOtaibi, M. Improved Blowfish Algorithm based Secure Routing Technique in IoT based WSN. IEEE Access 2021, 9, 159187–159197. [Google Scholar] [CrossRef]
- Sharadqh, A.A.M.; Hatamleh, H.A.M.; Alnaser, A.M.A.; Saloum, S.S.; Alawneh, T.A. Hybrid Chain: Blockchain Enabled Framework for Bi-Level Intrusion Detection and Graph-Based Mitigation for Security Provisioning in Edge Assisted IoT Environment. IEEE Access 2023, 11, 27433–27449. [Google Scholar] [CrossRef]
- Farooq, M.U.; Wang, X.; Hawbani, A.; Zhao, L.; Al-Dubai, A.Y.; Busaileh, O. SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2022, 22, 4912–4929. [Google Scholar] [CrossRef]
- Singh, K.; Khan, T.A. TASRP: A trust aware secure routing protocol for wireless sensor networks. Int. J. Innov. Comput. Appl. 2021, 12, 108–122. [Google Scholar] [CrossRef]
- Bin-Yahya, M.; Shen, X. HTM: Hierarchical Trust Management for Software-Defined WSNs. In Proceedings of the IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019. [Google Scholar] [CrossRef]
- Banerjee, A. Design of A Fuzzy-controlled Energy–Efficient Multicast Scheduler (FEMS) For SDWSN. J. Inf. Technol. Manag. 2021, 13, 111–132. [Google Scholar]
- Suja Golden Shiny, S.; Murugan, K. TSDN-WISE: Automatic Threshold-Based Low Control-Flow Communication Protocol for SDWSN. IEEE Sens. J. 2021, 21, 19560–19569. [Google Scholar] [CrossRef]
- Liu, Y.; Sun, D.; Zhang, R.; Li, W. A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks. Sensors 2023, 23, 4745. [Google Scholar] [CrossRef]
- Yang, L.; Lu, Y.; Yang, S.X.; Zhong, Y.; Guo, T.; Liang, Z. An Evolutionary Game-Based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks. IEEE Sens. J. 2021, 21, 13935–13947. [Google Scholar] [CrossRef]
- Zhu, H.; Qiu, H.; Zhu, J.; Chen, D. SMSEI-SDN: A Suppression Method of Security Incident Impact for the Inter-Domain Routing System Based on Software-Defined Networking. Wirel. Commun. Mob. Comput. 2021, 2021, 5539790. [Google Scholar] [CrossRef]
- Ren, Q.; Hu, T.; Wu, J.; Hu, Y.; He, L.; Lan, J. Multipath resilient routing for endogenous secure software defined networks. Comput. Netw. 2021, 194, 108134. [Google Scholar] [CrossRef]
- Vinitha, A.; Rukmini, M.S.; Dhirajsunehra. Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm. J. King Saud Univ. Comput. Inf. Sci. 2019, 34, 1857–1868. [Google Scholar] [CrossRef]
- Khan, M.N.; Rahman, H.U.; Khan, M.Z.; Mehmood, G.; Sulaiman, A.; Shaikh, A.; Alqhatani, A. Energy-Efficient Dynamic and Adaptive State-Based Scheduling (EDASS) Scheme for Wireless Sensor Networks. IEEE Sens. J. 2022, 22, 12386–12403. [Google Scholar] [CrossRef]
- Wei Ci, C.; Zarina Md Naziri, S.; Che Ismail, R.; Hussin, R.; Nazrin Md Isa, M.; Sufyan Safwan Mohamad Basir, M. Crypto-Core Design using Camellia Cipher. J. Phys. Conf. Ser. 2021, 1755, 012019. [Google Scholar] [CrossRef]
Routes | Alternatives | Rank | |||||
---|---|---|---|---|---|---|---|
ro (1) | 30% | Outwards | 0.1 | 10 J | 0.215 | 6 | |
ro (2) | 80% | Outwards | 0.75 | 20 J | 0.842 | 3 | |
ro (3) | 97% | Towards | 0.9 | 50 J | 0.971 | 1 | |
ro (4) | 60% | Outwards | 0.5 | 15 J | 0.787 | 4 | |
ro (5) | 88% | Towards | 0.8 | 30 J | 0.912 | 2 | |
ro (6) | 50% | Towards | 0.3 | 12 J | 0.456 | 5 |
Hardware Settings | Software Settings | |||
---|---|---|---|---|
Random Access Memory (RAM) | Processor Used | Hard Disk Capacity | Simulation Tool Utilized | OS |
8 GB | Intel(R) Core (TM) i5-4590S CPU @ 3.00 GHz 3.00 GHz (Santa Clara, CA, USA) | 500 GB | NS-3.26 | Ubuntu LTS 14.04 |
Simulation Parameter | Description |
---|---|
No. of sensor nodes | 100 |
No. of gateway | 2 |
No. of sink node | 1 |
No. of edge assisted switches | 4 |
No. of cloud server | 1 |
Packet size | bytes |
Transmission rate of packets | 2 packets/sec |
MAC protocol | IEEE 802.11p |
Data transmission rate | 3 Mbps |
Area for simulation | |
Simulation time | 300 s |
Routing protocol for SDN | Open flow |
Transmission range of nodes | 25 m to 50 m |
Size of payload | bytes |
Metrics | MTS-SDWSN | SEMRP-WSN | EDASS | Difference | |
---|---|---|---|---|---|
No. of SDWSN Nodes | Energy Consumption (J) | ||||
E2 E Delay (s) | |||||
Attack Mitigation/Prevention Rate (%) | |||||
Speed of the Nodes | PDR (%) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alnaser, A.M.A.; Saloum, S.S.; Sharadqh, A.A.M.; Hatamleh, H. Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques. Future Internet 2024, 16, 386. https://doi.org/10.3390/fi16110386
Alnaser AMA, Saloum SS, Sharadqh AAM, Hatamleh H. Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques. Future Internet. 2024; 16(11):386. https://doi.org/10.3390/fi16110386
Chicago/Turabian StyleAlnaser, As’ad Mahmoud As’ad, Said S. Saloum, Ahmed A. M. Sharadqh, and Hazem (Moh’d Said) Hatamleh. 2024. "Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques" Future Internet 16, no. 11: 386. https://doi.org/10.3390/fi16110386
APA StyleAlnaser, A. M. A., Saloum, S. S., Sharadqh, A. A. M., & Hatamleh, H. (2024). Optimizing Multi-Tier Scheduling and Secure Routing in Edge-Assisted Software-Defined Wireless Sensor Network Environment Using Moving Target Defense and AI Techniques. Future Internet, 16(11), 386. https://doi.org/10.3390/fi16110386