EFFICIENT MALICIOUS NODE DETECTION IN WIRELESS SENSOR NETWORKS USING RABIN-KARP ALGORITHM
DOI:
https://doi.org/10.29284/ijasis.10.2.2024.24-36Keywords:
Malicious node detection, wireless sensor networks, Rabin-Karp algorithm, data integrity, energy efficiencyAbstract
The resource-constrained nature of Wireless Sensor Networks (WSNs) makes efficient identification of rogue nodes a significant problem. A scalable, lightweight algorithm that can detect and mitigate harmful behavior is the goal of this effort to improve network security. The Rabin-Karp method, well-known for its pattern-matching efficiency, is modified to verify transmitted data packets using hashes. To guarantee the integrity of data flow inside the network, the technique uses hash comparisons to identify inconsistencies suggestive of rogue nodes. Maintaining high detection accuracy while reducing computing overhead, false positives, and energy consumption is the goal of the approach to be designed. To optimize network performance, the algorithm runs at the level of the cluster heads and filters packets before they reach the base station. The objective is to provide a dependable, scalable, and energy-efficient solution for WSN security. This will ensure that data remains intact and that rogue nodes cannot disrupt the network. This method improves the reliability of WSNs and guarantees continuous monitoring, making them ideal for mission-critical applications. Incorporating the Rabin-Karp algorithm solves the urgent problem of trustworthy malicious node identification in contemporary WSNs by striking a compromise between computational efficiency and effective security.
References
O. H. Abdulganiyu, T. A. Tchakoucht and Y. K. Saheed, “Towards an efficient model for network Intrusion Detection System (IDS): systematic literature review,” Wireless Networks, vol. 30, no. 1, 2024, pp. 453–482.
S. Niktabe, A. H. Lashkari and D. P. Sharma, “Detection, characterization, and profiling DoH malicious traffic using statistical pattern recognition,” International Journal of Information Security, vol. 23, no. 2, 2024, pp. 1293–1316.
M. Fayez, A. Abbas, H. Khaled and S. Ghoniemy, “Enhanced Aho-Corasick Algorithm for Network Intrusion Detection Systems,” International Journal of Intelligent Computing and Information Sciences, vol. 24, no. 3, 2024, pp. 83–92.
R. Chowdhuri and M. K. Barma, “Node position estimation based on optimal clustering and detection of coverage hole in WSNs using hybrid deep reinforcement learning,” The Journal of Supercomputing, vol. 79, no. 18, 2023, pp. 20845–20877.
M. M. Mustafa, A. A. Khalifa, K. Cengiz and N. Ivković, “An energy-efficient protocol for Internet of Things based wireless sensor networks,” Computers, Materials & Continua, vol. 75, no. 2, 2023 pp. 2397–2412.
W. Liu, “An embedded microcontroller-based access authentication system of wireless sensor network,” Journal of Cyber Security Technology, vol. 7, no. 1, 2023, pp. 1–20.
K. R. Babu, S. Saritha and K. G. Preetha, “An intelligent pattern matching approach with deep hypersphere model for secure big data storage in cloud environment,” International Journal of Computer Information Systems and Industrial Management Applications, vol. 15, 2023, pp. 166–175.
P. Xiao, P. Lu, C. Luo, Z. Zhu and X. Liao, “Fast text comparison based on Elasticsearch and dynamic programming,” International Conference on Web Information Systems Engineering, 2023, pp. 50–64.
N. Gagan, S. Sai Kumar, M. Keerthana, S. S. Vaidya and V. Rastogi, “Android malware detection,” World Conference on Communication & Computing, 2023, pp. 1–14.
P. Leger, H. Fukuda, N. Cardozo and D. S. Martín, “Exploring a self-replication algorithm to flexibly match patterns,” IEEE Access, vol. 12, 2024, pp. 13553–13570.
T. Liu, H. Huadong and R. Liu, “An intrusion detection framework with optimized feature selection and classification combination using support vector machine,” 3rd International Conference on Electronic Technology, Communication and Information, 2023, pp. 182–186.
J. Xu, M. Ni, D. Zhu and X. Yu, “Overview of SQL injection attack detection techniques,” Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023, pp. 215–225.
M. Çelebi and U. Yavanoğlu, “Accelerating pattern matching using a novel multi-pattern-matching algorithm on GPU,” Applied Sciences, vol. 13, no. 14, 2023, pp. 1–30.
M. Çelebi, A. Özbilen and U. Yavanoğlu, “A comprehensive survey on deep packet inspection for advanced network traffic analysis: issues and challenges,” Niğde Ömer Halisdemir Üniversitesi Mühendislik Bilimleri Dergisi, vol. 12, no. 1, 2023, pp. 1–29.
A. Hussain, K. N. Qureshi, K. Javeed and M. Alhussein, “An enhanced intelligent intrusion detection system to secure e-commerce communication systems,” Computer Systems Science and Engineering, vol. 47, no. 2, 2023, pp. 2513–2528.
S. Chaudhari and R. Aparna, “Survey of image deduplication for cloud storage,” System Research and Information Technologies, vol. 26, no. 4, 2023, pp. 113–134.
L. Ouarda, B. Malika and B. Brahim, “Towards a better similarity algorithm for host-based intrusion detection system,” Journal of Intelligent Systems, vol. 32, no. 1, 2023, pp. 1–18.
I. Kim, D. Oh, M. K. Yoon, K. Yi, and W. W. Ro, “A distributed signature detection method for detecting intrusions in sensor systems,” Sensors, vol. 13, no. 4, 2023, pp. 3998-4016.
V. Dagar, V. Prakash and T. Bhatia, "Analysis of pattern matching algorithms in network intrusion detection systems," 2nd International Conference on Advances in Computing, Communication, & Automation, 2016, pp. 1-5
A. K. Sharma and S. K. Mittal, "Cryptography & Network Security Hash Function Applications, Attacks and Advances: A Review," Third International Conference on Inventive Systems and Control, 2019, pp. 177-188.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 T Devapriya, V Ganesan, S Velmurugan
This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.