Bandwidth-Optimal Group-Based Malinformation Filtering for Secure Data Aggregation in Wireless Sensor Networks
Keywords:
Wireless Sensor Networks, Malinformation Attacks, Secure Data Aggregation, Group-Based FilteringAbstract
Wireless Sensor Networks (WSNs) are finding more and more application in sensitive areas which include environmental control, healthcare, industrial control, and military surveillance. Their unrestricted wireless broadcast, unsupervised deployment, and extreme resource limitations however render them extremely susceptible to malinformation attacks and especially to the false data that have been propagated by groups of sensor nodes that have been compromised. These attacks do not only distort sensing results, but also consume too much bandwidth and drain energy fast. The article explores the nature and the effects of group-based malinformation attacks on multipath WSN systems, and draws attention to the weaknesses of the conventional node-centric and probabilistic detection strategies. To overcome these issues, a Bandwidth-Optimal Group-Injected Data Filtering (BO-GIDF) architecture is highlighted which combines collaborative filtering with data aggregation and authentication schemes. The proposed strategy can significantly reduce the spread of false data by identifying coordinated malicious behavior in the middle of data transmission and, consequently, saving network resources, and increasing the stability of the entire network. The paper shows that group-aware filtering is a key to scalable, power-efficient, and reliable data aggregation in the current WSNs.
Downloads
References
1. Alzahrani, M., Idris, M. Y., Ghaleb, F. A., & Budiarto, R. (2022). An improved robust misbehavior detection scheme for vehicular ad hoc network. IEEE Access, 10, 111241-111253.
2. Ghaleb, F. A., Maarof, M. A., Zainal, A., Al-Rimy, B. A. S., Saeed, F., & Al-Hadhrami, T. (2019). Hybrid and multifaceted context-aware misbehavior detection model for vehicular ad hoc network. IEEE Access, 7, 159119-159140.
3. Gheyas, I., Asghar, M. R., Schneider, S., & Woodward, A. (2025). Establishing Trust in Crowdsourced Data. arXiv preprint arXiv:2511.03016.
4. Jalajakshi, V., AN, D. M., Ghasemi, E., Rafiei, V., Ranjbaran, G., Handrizal, T., ... & KHALID, A. E. (2023). Prediction Of Sensor Devices Failure in Unmanned Aerial Vehicles Using Kalman Filter & Particle Filter. Journal of Theoretical and Applied Information Technology, 101(18).
5. Balakrishnan, C., Vijayalakshmi, E., & Vinayagasundaram, B. (2016, February). An enhanced iterative filtering technique for data aggregation in WSN. In 2016 International Conference on Information Communication and Embedded Systems (ICICES) (pp. 1-6). IEEE.
6. Ghaleb, F. A., Zainal, A., Rassam, M. A., & Mohammed, F. (2017, November). An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications. In 2017 IEEE conference on application, information and network security (AINS) (pp. 13-18). IEEE.
7. Nedungadi, P., Veena, G., Tang, K. Y., Menon, R. R., & Raman, R. (2025). AI techniques and applications for online social networks and media: Insights from BERTopic modeling. IEEE Access.
8. Chettri, L., & Bera, R. (2019). A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems. IEEE Internet of Things journal, 7(1), 16-32.
9. Admass, W. S., Munaye, Y. Y., & Diro, A. A. (2024). Cyber security: State of the art, challenges and future directions. Cyber Security and Applications, 2, 100031.
10. Singhal, M., Kumarswamy, N., Kinhekar, S., & Nilizadeh, S. (2021). The prevalence of cybersecurity misinformation on social media: Case studies on phishing reports and zoom’s threats. arXiv preprint arXiv:2110.12296.
11. Zaidan, D. T. (2021). Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA-WPA2) security protocols. Periodicals of Engineering and Natural Sciences (PEN), 9(4), 1093-1101.
12. Aldwairi, M., & Tawalbeh, L. A. (2020). Security techniques for intelligent spam sensing and anomaly detection in online social platforms. International Journal of Electrical and Computer Engineering, 10(1), 275.
13. Yang, F., Abedin, M. Z., Qiao, Y., & Ye, L. (2024). Towards trustworthy governance of AI-generated content (AIGC): a blockchain-driven regulatory framework for secure digital ecosystems. IEEE Transactions on Engineering Management.
14. Pogorelov, K., Schroeder, D. T., Filkuková, P., Brenner, S., & Langguth, J. (2021, October). Wico text: a labeled dataset of conspiracy theory and 5g-corona misinformation tweets. In Proceedings of the 2021 workshop on open challenges in online social networks (pp. 21-25).
15. Olawole, E. T., Akande, D. O., Adeyemo, Z. K., Ojo, F. K., & Ojo, S. I. (2024). Effect of Modulation Domain Coupled KalmanSpectral Filter on Speech Enhancement over Wireless Voiced Communication System. Nigerian journal of technological development, 21(3), 20-28.