ENHANCING CYBERSECURITY IN WIRELESS SENSOR NETWORKS: ROLE OF ADVANCED DATA COMMUNICATION PROTOCOLS

Authors

  • Rajesh Verma Assistant Professor, International Institute of Professional Studies (IIPS) Devi Ahilya Vishwavidyalaya, Indore, Madhya Pradesh, India

DOI:

https://doi.org/10.29121/shodhkosh.v5.i3.2024.2785

Keywords:

Wireless Sensor Networks (WSNs), Cybersecurity, Data Communication Protocols, Zigbee, Bluetooth Low Energy (BLE), Network Security

Abstract [English]

Wireless Sensor Networks (WSNs) are essential to contemporary data-centric ecosystems, facilitating vital applications in healthcare, smart cities, environmental monitoring, and defense. Nonetheless, the escalating intricacy of these networks, along with their resource-limited nodes, renders them susceptible to a wide array of cybersecurity attacks. This study examines the impact of sophisticated data transfer protocols on the security and resilience of wireless sensor networks (WSNs). Through the analysis of the efficacy of protocols such as Zigbee, Bluetooth Low Energy (BLE), and IEEE 802.15.4 in countering threats like eavesdropping, node capture, and denial of service, we ascertain optimal practices for protocol selection and execution. Furthermore, we evaluate the efficacy of adaptive routing, data encryption, and authentication methods in enhancing data integrity, secrecy, and network availability. The findings emphasize the need of protocol enhancements in protecting WSN data transmission, providing insights into scalable and secure communication frameworks vital for next-generation IoT applications.

References

Urooj, S., Lata, S., Ahmad, S., Mehfuz, S., & Kalathil, S. (2023). Cryptographic data security for reliable wireless sensor network. Alexandria Engineering Journal, 72, 37–50. DOI: https://doi.org/10.1016/j.aej.2023.03.061

Allakany, A., Saber, A., Mostafa, S. M., Alsabaan, M., Ibrahem, M. I., & Elwahsh, H. (2023). Enhancing security in Zigbee wireless sensor networks: A new approach and mutual authentication scheme for D2D communication. Sensors, 23(12), 5703. DOI: https://doi.org/10.3390/s23125703

Czeczot, G., Rojek, I., & Mikołajewski, D. (2023). Analysis of cybersecurity aspects of data transmission in large-scale networks based on the LoRaWAN protocol intended for monitoring critical infrastructure sensors. Electronics, 12(11), 2503. DOI: https://doi.org/10.3390/electronics12112503

Velmurugadass, P., Dhanasekaran, S., Anand, S. S., & Vasudevan, V. (2023). Quality of service aware secure data transmission model for Internet of Things assisted wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 34(1), e4664. DOI: https://doi.org/10.1002/ett.4664

Roberts, M. K., & Ramasamy, P. (2023). An improved high-performance clustering-based routing protocol for wireless sensor networks in IoT. Telecommunication Systems, 82(1), 45–59. DOI: https://doi.org/10.1007/s11235-022-00968-1

Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138–158.

Jha, R. K. (2023). Cybersecurity and confidentiality in smart grid for enhancing sustainability and reliability. Recent Research Reviews Journal, 2(2), 215–241. DOI: https://doi.org/10.36548/rrrj.2023.2.001

Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22(13), 4730. DOI: https://doi.org/10.3390/s22134730

Salau, A. O., Marriwala, N., & Athaee, M. (2021). Data security in wireless sensor networks: Attacks and countermeasures. In Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020 (pp. 173–186). Springer Singapore. DOI: https://doi.org/10.1007/978-981-15-7130-5_13

Almasarani, A., & Majid, M. A. (2021). 5G-wireless sensor networks for smart grid-accelerating technology’s progress and innovation in the Kingdom of Saudi Arabia. Procedia Computer Science, 182, 46–55. DOI: https://doi.org/10.1016/j.procs.2021.02.007

Al Hayajneh, A., Bhuiyan, M. Z. A., & McAndrew, I. (2020). A novel security protocol for wireless sensor networks with cooperative communication. Computers, 9(1), 4. DOI: https://doi.org/10.3390/computers9010004

Sengan, S., Subramaniyaswamy, V., Nair, S. K., Indragandhi, V., Manikandan, J., & Ravi, L. (2020). Enhancing cyber–physical systems with hybrid smart city cybersecurity architecture for secure public data-smart network. Future Generation Computer Systems, 112, 724–737. DOI: https://doi.org/10.1016/j.future.2020.06.028

Prodanović, R., Rančić, D., Vulić, I., Zorić, N., Bogićević, D., Ostojić, G., ... & Stankovski, S. (2020). Wireless sensor network in agriculture: Model of cybersecurity. Sensors, 20(23), 6747. DOI: https://doi.org/10.3390/s20236747

Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J., & Park, Y. (2019). Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges. IEEE Access, 8, 3343–3363. DOI: https://doi.org/10.1109/ACCESS.2019.2962829

He, D., Chan, S., & Guizani, M. (2017). Cybersecurity analysis and protection of wireless sensor networks for smart grid monitoring. IEEE Wireless Communications, 24(6), 98–103. DOI: https://doi.org/10.1109/MWC.2017.1600283WC

Chhaya, L., Sharma, P., Bhagwatikar, G., & Kumar, A. (2017). Wireless sensor network-based smart grid communications: Cyber attacks, intrusion detection system, and topology control. Electronics, 6(1), 5. DOI: https://doi.org/10.3390/electronics6010005

Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910–1923. DOI: https://doi.org/10.1109/JIOT.2017.2749883

Oreku, G. S., & Pazynyuk, T. (2016). Security in wireless sensor networks. Springer International Publishing. DOI: https://doi.org/10.1007/978-3-319-21269-2

Wang, Q., & Balasingham, I. (2010). Wireless sensor networks: An introduction. In Wireless sensor networks: Application-centric design (pp. 1–14). DOI: https://doi.org/10.5772/13225

Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. DOI: https://doi.org/10.1109/COMST.2006.315852

https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.researchgate.net%2Fprofile%2FBikram-Ballav%2Fpublication%2F287935513%2Ffigure%2Ffig1%2FAS%3A391401503248393%401470328798607%2FThe-structure-of-Wireless-sensor-Network.png&tbnid=eWoFp01ti2C7wM&vet=1&imgrefurl=https%3A%2F%2Fletstechiteasy.com%2Fblog%2Fhow-does-a-wireless-sensor-network-work%2F&docid=HpShtg5-hIA03M&w=621&h=480&source=sh%2Fx%2Fim%2Fm4%2F2&kgs=768573a1c0498e0d&shem=abme%2Ctrie#vhid=eWoFp01ti2C7wM&vssid=mosaic

https://www.google.com/imgres?imgurl=https%3A%2F%2Fitlinfrastructure.info%2Fwp-content%2Fuploads%2F2024%2F07%2F22-1.jpg&tbnid=U107MXcVGTcHTM&vet=1&imgrefurl=https%3A%2F%2Fitlinfrastructure.info%2Ftech-giants-and-their-approach-to-cybersecurity%2F&docid=liGN2V_Bwr-HhM&w=700&h=555&itg=1&hl=en-IN&source=sh%2Fx%2Fim%2Fm4%2F2&kgs=8e3498672929bcb2&shem=abme%2Ctrie

Downloads

Published

2024-03-31

How to Cite

Verma, R. (2024). ENHANCING CYBERSECURITY IN WIRELESS SENSOR NETWORKS: ROLE OF ADVANCED DATA COMMUNICATION PROTOCOLS. ShodhKosh: Journal of Visual and Performing Arts, 5(3), 668–678. https://doi.org/10.29121/shodhkosh.v5.i3.2024.2785