International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 7 , Issue 2 , PP: 25-40, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks

Anil Audumbar Pise 1 * , Saurabh Singh 2 , Hemachandran K. 3 , Shraddhesh Gadilkar 4 , Zakka Benisemeni Esther 5 , Ganesh Shivaji Pise 6 , Jude Imuede 7

  • 1 Siatik Premier Google Cloud Platform Partner Johannesburg South Africa, University of the Witwatersrand Johannesburg-South Africa Computer Science, Head of Data Science & Machine Learning, Adjunct Professor - (anil@siatik.com)
  • 2 Assistant Professor, Department of AI and Big data, woosong University, Daejeon South Korea - (singh.saurabh@wsu.ac.kr)
  • 3 Professor, School of Business, Woxsen University, Hyderabad, India - (hemachandran.k@woxsen.edu.in)
  • 4 Associate Engineer, TSYS Global Payments, Pune, India - (sgadilkar@tsys.com)
  • 5 Senior Lecturer, Federal Polytechnic Bauchi, Nigeria - (benizakka@fptb.edu.ng)
  • 6 Assistant Professor in Pune Institute of Computer Technology Pune - ( gspise@pict.edu)
  • 7 University of Prince Edward Island - (jimuede@upei.ca)
  • Doi: https://doi.org/10.54216/IJWAC.070202

    Received: May 09, 2023 Revised: September 14, 2023 Accepted: December 17, 2023
    Abstract

    The Adaptive Security Protocol Framework (ASPF) is introduced as a sophisticated algorithm designed for dynamic security protocol adaptation in large-scale IoT sensor networks. Comprising five integral algorithms, namely ASPF, MLTD, DKMS, BAP, and CTIS, the framework ensures a comprehensive and adaptive defense mechanism against evolving cyber threats. ASPF initiates with data collection, preprocessing, and feature extraction, employing supervised learning for model training. Anomaly detection triggers alerts and responses, guiding continuous learning and security protocol adaptation. MLTD enhances real-time threat detection through dynamic model training and threat intelligence integration. DKMS focuses on secure key management for data transmissions, calculating device thresholds and ensuring adaptive key exchanges. BAP leverages historical data for behavioral profiling, enabling real-time anomaly detection and adaptive profile updates. CTIS assesses and aggregates threat levels, fostering continuous collaboration and collective defense. The ablation study emphasizes the indispensable role of each algorithm, showcasing their synergistic contributions to the overall system's adaptability and robustness. Evaluation through comprehensive tables and visual representations highlights the proposed method's superiority over existing security protocols. The ablation study underscores the holistic nature of ASPF, solidifying its efficacy in addressing the dynamic challenges of cybersecurity in large-scale IoT sensor networks.

     

    Keywords :

    Adaptive Security Protocol Framework (ASPF) , Algorithm , Anomaly Detection , Behavioral Analysis and Profiling (BAP) , Collaborative Threat Intelligence Sharing (CTIS) , Continuous Learning , Cyber Threats, Dynamic Key Management System (DKMS) , Large-scale IoT Sensor Networks , Machine Learning-Based Threat Detection (MLTD).

    References

    [1]    S. B. Shen and C. Lin, "Opportunities and challenges in study of Internet of Things," Journal of Software, vol. 8, pp. 1621–1624, 2014. [Online]. Available: Google Scholar.

    [2]    H. Kaur and R. Kumar, "A survey on Internet of Things (IoT): layer-specific, domain-specific and industry-defined architectures," Advances in Computational Intelligence and Communication Technology, vol. 1086, pp. 265–275, 2021. [Online]. Available: Google Scholar.

    [3]    R. Krishnan, "Mobile application for emergency navigation during disaster using wireless sensor network," Advances in Wireless Communications and Networks, vol. 4, no. 1, p. 1, 2018. [Online]. Available: Publisher Site.

    [4]    D. Pathak and R. Kashyap, "Neural correlate-based E-learning validation and classification using convolutional and Long Short-Term Memory networks," Traitement du Signal, vol. 40, no. 4, pp. 1457-1467, 2023. [Online]. Available: https://doi.org/10.18280/ts.400414

    [5]    R. Kashyap, "Stochastic Dilated Residual Ghost Model for Breast Cancer Detection," J Digit Imaging, vol. 36, pp. 562–573, 2023. [Online]. Available: https://doi.org/10.1007/s10278-022-00739-z

    [6]    D. Bavkar, R. Kashyap, and V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [7]    D. Pandita, R. K. Malik, and Department of ECE, Geeta Engineering College, Panipat Kurukshetra University, Kurukshetra, Haryana, India, "A survey on clustered and energy efficient routing protocols for wireless sensor networks," International Journal of Trend in Scientific Research and Development, vol. Volume-2, no. Issue-6, pp. 1026–1030, 2018. [Online]. Available: Publisher Site.

    [8]    W. L. Wu, N. X. Xiong, and C. X. Wu, "Improved clustering algorithm based on energy consumption in wireless sensor networks," The Institution of Engineering and Technology, vol. 6, no. 3, pp. 47–53, 2017. [Online]. Available: Google Scholar.

    [9]    J.-Y. Yu, E. Lee, S.-R. Oh, Y.-D. Seo, and Y.-G. Kim, "A survey on security requirements for WSNs: focusing on the characteristics related to security," IEEE Access, vol. 8, pp. 45304–45324, 2020. [Online]. Available: Publisher Site.

    [10] D. Y. Zhang, C. Xu, and S. Lin, "Detecting selective forwarding attacks in WSNs using watermark," International Conference on Wireless Communications and Signal Processing (WCSP), vol. 2011, pp. 1–4, 2011. [Online]. Available: Google Scholar.

    [11] C. J. Xu, "Research on detection scheme of malicious nodes and abnormal data in wireless sensor network," Ph.D. dissertation, Nanjing University of Posts and Telecommunications, 2020.

    [12] J. G. Kotwal, R. Kashyap, and P. M. Shafi, "Artificial Driving based EfficientNet for Automatic Plant Leaf Disease Classification," Multimed Tools Appl, 2023. [Online]. Available: https://doi.org/10.1007/s11042-023-16882-w

    [13] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [14] R. Kashyap, "Machine Learning, Data Mining for IoT-Based Systems," in Research Anthology on Machine Learning Techniques, Methods, and Applications, Information Resources Management Association, Ed. IGI Global, 2022, pp. 447-471. [Online]. Available: https://doi.org/10.4018/978-1-6684-6291-1.ch025

    [15] Ibrahim, M.A., Shaban, M.A.A., Hasan, Y.R., Hussein, H.A., Abed, K.M., et al. (2022). Simultaneous Adsorption of Ternary Antibiotics (Levofloxacin, Meropenem, and Tetracycline) by SunFlower Husk Coated with Copper Oxide Nanoparticles. Journal of Ecological Engineering, 23(6).

    [16] Alhares, H.S., Shaban, M.A.A., Salman, M.S., M-Ridha, M.J., Mohammed, S.J., et al. (2023). Sunflower Husks Coated with Copper Oxide Nanoparticles for Reactive Blue 49 and Reactive Red 195 Removals: Adsorption Mechanisms, Thermodynamic, Kinetic, and Isotherm Studies. Water, Air, & Soil Pollution, 234(1), 35.

    [17] Aziz, G.M., Hussein, S.I., M-Ridha, M.J., Mohammed, S.J., Abed, K.M., et al. (2023). Activity of laccase enzyme extracted from Malva parviflora and its potential for degradation of reactive dyes in aqueous solution. Biocatalysis and Agricultural Biotechnology, 50, 102671.

    [18] K. C. Chung and S. W.-J. Liang, "An empirical study of social network activities via social Internet of Things (SIoT)," IEEE Access, vol. 8, pp. 48652–48659, 2020. [Online]. Available: Publisher Site.

    [19] B. Jafarian, N. Yazdani, and M. S. Haghighi, "Discrimination-aware trust management for Social Internet of Things," Computer Networks, vol. 178, p. 107254, 2020. [Online]. Available: Publisher Site.

    [20] Z. T. Lin and L. Dong, "Clarifying trust in Social Internet of Things," IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 2, pp. 234–248, 2018. [Online]. Available: Publisher Site.

    [21] H. P. Sahu and R. Kashyap, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [22] M-Ridha, M.J., Zeki, S.L., Mohammed, S.J., Abed, K.M., & Hasan, H.A. (2021). Heavy metals removal from simulated wastewater using horizontal subsurface constructed wetland. Journal of Ecological Engineering, 22(8), 243-250.

    [23] Alhares, H.S., Ali, Q.A., Shaban, M.A.A., M-Ridha, M.J., Bohan, H.R., et al. (2023). Rice husk coated with copper oxide nanoparticles for 17α-ethinylestradiol removal from an aqueous solution: adsorption mechanisms and kinetics. Environmental Monitoring and Assessment, 195(9), 1078.

    [24] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [25] I. R. Chen, F. Bao, and J. Guo, "Trust-based service management for Social Internet of Things systems," IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 6, pp. 684–696, 2016. [Online]. Available: Publisher Site.

     

    Cite This Article As :
    , Anil. , Singh, Saurabh. , K., Hemachandran. , Gadilkar, Shraddhesh. , Benisemeni, Zakka. , Shivaji, Ganesh. , Imuede, Jude. Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2023, pp. 25-40. DOI: https://doi.org/10.54216/IJWAC.070202
    , A. Singh, S. K., H. Gadilkar, S. Benisemeni, Z. Shivaji, G. Imuede, J. (2023). Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks. International Journal of Wireless and Ad Hoc Communication, (), 25-40. DOI: https://doi.org/10.54216/IJWAC.070202
    , Anil. Singh, Saurabh. K., Hemachandran. Gadilkar, Shraddhesh. Benisemeni, Zakka. Shivaji, Ganesh. Imuede, Jude. Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks. International Journal of Wireless and Ad Hoc Communication , no. (2023): 25-40. DOI: https://doi.org/10.54216/IJWAC.070202
    , A. , Singh, S. , K., H. , Gadilkar, S. , Benisemeni, Z. , Shivaji, G. , Imuede, J. (2023) . Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks. International Journal of Wireless and Ad Hoc Communication , () , 25-40 . DOI: https://doi.org/10.54216/IJWAC.070202
    A. , Singh S. , K. H. , Gadilkar S. , Benisemeni Z. , Shivaji G. , Imuede J. [2023]. Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks. International Journal of Wireless and Ad Hoc Communication. (): 25-40. DOI: https://doi.org/10.54216/IJWAC.070202
    , A. Singh, S. K., H. Gadilkar, S. Benisemeni, Z. Shivaji, G. Imuede, J. "Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 25-40, 2023. DOI: https://doi.org/10.54216/IJWAC.070202