4.5 Article

Machine learning based volatile block chain construction for secure routing in decentralized military sensor networks

Journal

WIRELESS NETWORKS
Volume 27, Issue 7, Pages 4513-4534

Publisher

SPRINGER
DOI: 10.1007/s11276-021-02748-2

Keywords

Machine learning; Block chain; Authentication; WSN; Routing; Intrusion detection; Military and security

Ask authors/readers for more resources

The paper addresses the security challenges in deploying WSN in military applications, proposing the GBCRP to enhance secure data transmission between sensor nodes in DMSNs, ensuring trustworthiness of data through block chain enabled routing procedures. Additionally, a new intrusion detection system using GAN is proposed for enhancing communication security in DMSNs.
Wireless Sensor Networks (WSNs) contain multiple wireless sensor nodes deployed around the geographical locations. The WSN used in military applications need more security and hence the deployment of trustworthy nodes and links in WSN provides more secure data transmission in Decentralized Military Sensor Networks (DMSNs). Moreover, the DMSNs work with different set of significance constraints including higher security requirements. The design of DMSNs targets surveillance tasks, intruder tracking tasks, army resource maintenance tasks and communication security requirements. Therefore, building a secure and dynamic DMSN against multiple threats is a challenging task. In addition, security principles developed for DMSN cause excessive energy consumption. Moreover, DMSN has completely open distributed architecture without having any base stations. Under this situation, the need for effective and secured data communication can be achieved with the help of a secure routing protocol. Block chains are generally used for making secure financial transactions. However, the routing protocols used in DMSN can support autonomous routing transactions from one node to other node. In this situation, block chain enabled routing procedures can ensure the trustworthiness of any data that is forwarded through different sensor nodes. Hence, a new Generative Adversarial Networks (GAN) based Block Chain enabled secured Routing Protocol (GBCRP) is proposed in this paper which authenticates and validates the ongoing routing procedures of DMSN. Moreover, a new intrusion detection system is also proposed in this work using GAN which is deployed in the nodes of the DMSN for enhancing the security of communication. Since block chain based routing protocols do not provide security, the GBCRP works for creating volatile block chains using decentralized authentication principles and effective intrusion detection. The proposed system uses a Fully Decentralized Generative Adversarial Network (FDGAN) for monitoring the secure routing transactions by the development of an intrusion detection system. The results obtained from this work show that the proposed GBCRP providing better secured routing compared to the existing systems with respect to security, energy consumption and routing metrics.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Editorial Material Multidisciplinary Sciences

Sentiment Analysis Techniques for Social Media-Based Recommendation Systems

Selvi Munuswamy, M. S. Saranya, S. Ganapathy, S. Muthurajkumar, A. Kannan

Summary: The study introduces a sentiment-based rating prediction method that accurately predicts items liked by users. By calculating individual user sentiments on items and computing item reputations based on these three sentiments, accurate recommendations can be provided.

NATIONAL ACADEMY SCIENCE LETTERS-INDIA (2021)

Article Telecommunications

被撤回的出版物: Skyline Query Optimization for Preferable Product Selection and Recommendation System (Retracted article. See vol. 128, pg. 735, 2023)

Rajasoundaran Soundararajan, S. Rakesh Kumar, N. Gayathri, Fadi Al-Turjman

Summary: The proposed system aims to classify highly preferable products in online marketplaces efficiently, by using decision-making strategies. It evaluates popular products and product groups, analyses online market growth, predicts market prices, and adds new packages at optimal prices to the database. The system focuses on user-based ratings and provides a controlled performance in selecting preferable products.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Review Telecommunications

Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review

S. Rajasoundaran, A. V. Prabu, G. Sateesh Kumar, Prince Priya Malla, Sidheswar Routray

Summary: This research focuses on analyzing problems and solutions related to secure routing and watchdog production in Wireless Sensor Networks (WSN). The study helps in understanding IDS techniques, WSN characteristics, secure routing, key management techniques, and watchdog construction strategies in detail. The findings extend to efficient cryptography techniques, attack detection algorithms, and protocols with real-time watchdogs.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks

S. V. N. Santhosh Kumar, Yogesh Palanichamy, M. Selvi, Sannasi Ganapathy, Arputharaj Kannan, Sankar Pariserum Perumal

Summary: A novel protocol named Cluster based Secured Data dissemination Protocol (CSDP) is proposed to enhance the energy efficiency and security in Wireless Sensor Networks. By addressing security vulnerabilities and reducing energy consumption, the proposed protocol improves the reliability of communication systems and enhances network security.

WIRELESS NETWORKS (2021)

Article Telecommunications

Smart Prediction and Monitoring of Waste Disposal System Using IoT and Cloud for IoT Based Smart Cities

Jacob John, Mariam Sunil Varkey, Riya Sanjay Podder, Nilavrah Sensarma, M. Selvi, S. V. N. Santhosh Kumar, Arputharaj Kannan

Summary: IoT technology in smart cities can improve city infrastructure and public services, effectively addressing waste management issues.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S. Rajasoundaran, A. Prabu, Sidheswar Routray, S. V. N. Santhosh Kumar, Prince Priya Malla, Suman Maloji, Amrit Mukherjee, Uttam Ghosh

Summary: Virtual Private Cloud (VPC) is an emerging cloud environment used for secure data communication. Evaluation of cloud jobs and runtime cloud events is necessary for flawless VPC service. Secure job service schemes ensure elimination of attacks, unauthorized jobs, improper accesses and intrusions in VPC.

COMPUTERS & SECURITY (2021)

Article Computer Science, Software Engineering

Cooperative and feedback based authentic routing protocol for energy efficient IoT systems

A. Gayathri, A. V. Prabu, S. Rajasoundaran, Sidheswar Routray, P. Narayanasamy, Naween Kumar, Yinan Qi

Summary: This study proposes a cooperative and feedback-based trustable energy-efficient routing protocol (CFTEERP) to address security issues in IoT communication. The protocol calculates local and global trust values of nodes, utilizes a multipath routing strategy, and eliminates malicious nodes using the K-means clustering algorithm to improve network lifetime and data transmission efficiency.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2022)

Article Computer Science, Artificial Intelligence

Internet of things-based deeply proficient monitoring and protection system for crop field

A. Prabu, G. Sateesh Kumar, Soundararajan Rajasoundaran, Prince Priya Malla, Sidheswar Routray, Amrit Mukherjee

Summary: The proposed IoT based crop field protection system aims to monitor and protect crop fields using deep learning techniques, providing automatic alerts to prevent animal intrusions and crop diseases, and ultimately increase crop production. The system utilizes sensor nodes, cameras, and agriculture drones to collect field data regularly and trains RCNN and RGAN units for faster and more accurate decision-making. Experiment results show that the proposed ICFPS achieves 8%-10% higher classification accuracy compared to existing systems.

EXPERT SYSTEMS (2022)

Article Computer Science, Information Systems

Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

S. Rajasoundaran, A. Prabu, Sidheswar Routray, Prince Priya Malla, G. Sateesh Kumar, Amrit Mukherjee, Yinan Qi

Summary: This paper proposes a dynamic multi-watchdog system based on deep learning, which uses DCNN and DPFES to construct a secure and cooperative multi-watchdog system, protecting each sensor node and expanding the secure medium of 5G-based IoT-WSN networks.

COMPUTER COMMUNICATIONS (2022)

Article Energy & Fuels

High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption

Vishnu Kumar Kaliappan, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, Enumi Choi

Summary: This article presents a distributed system framework called SeDIS-HEB, which utilizes homomorphic encryption and blockchain for secure Docker image sharing. The framework prioritizes secure upload, sharing, and download functions, and is evaluated using IPFS.

ENERGIES (2022)

Article Computer Science, Information Systems

Multi-tier block truncation coding model using genetic auto encoders for gray scale images

S. Rajasoundaran, Santhosh S. V. N. Kumar, M. Selvi, Sannasi Ganapathy, A. Kannan

Summary: This paper proposes three image compression algorithms based on ensemble machine learning and deep learning techniques. The algorithms accurately identify the dependencies and unimportant regions of image blocks, improving compression ratio and reducing noise in comparison to existing methods.

MULTIMEDIA TOOLS AND APPLICATIONS (2022)

Article Chemistry, Analytical

Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

Rajasoundaran Soundararajan, Maheswar Rajagopal, Akila Muthuramalingam, Eklas Hossain, Jaime Lloret

Summary: This study proposes a new wireless honeypot detection model that combats various attacks by introducing a distributed honeypot mechanism and secure hash-based random frame-interleaving principles against channel attackers. Simulation and experimental results demonstrate that the proposed model outperforms existing techniques.

SENSORS (2022)

Article Energy & Fuels

Energy-Efficient Network Protocols and Resilient Data Transmission Schemes for Wireless Sensor Networks-An Experimental Survey

Dharmesh Dhabliya, Rajasoundaran Soundararajan, Parthiban Selvarasu, Maruthi Shankar Balasubramaniam, Anand Singh Rajawat, S. B. Goyal, Maria Simona Raboaca, Traian Candin Mihaltan, Chaman Verma, George Suciu

Summary: Wireless sensor networks (WSNs) are widely used for various environmental sensing applications. To improve the performance of WSNs, energy optimization and load balancing are needed. This paper conducts a literature review and experimental comparisons on energy-efficient MAC protocols, channel scheduling policies, and energy-efficient routing protocols. The results show that cross-layer or multi-layer energy optimization policies perform better than homogeneous energy optimization models.

ENERGIES (2022)

Article Computer Science, Information Systems

DPRL: Task Offloading Strategy Based on Differential Privacy and Reinforcement Learning in Edge Computing

Peiying Zhang, Peng Gan, Lunjie Chang, Wu Wen, M. Selvi, Godfrey Kibalya

Summary: Mobile edge computing is widely used in IoT devices. This study proposes a task offloading strategy based on differential privacy and reinforcement learning, which optimizes the overhead and protects user privacy, improving the performance of mobile edge computing in terms of security and resource consumption.

IEEE ACCESS (2022)

No Data Available