A Bandwidth-Optimal Group-Injected Data Filtering and ElGamal-Based Authentication Framework for Secure Wireless Sensor Networks

Authors

  • Priyanka Soni Research Scholar, Shri Krishna University, Chhatarpur, M.P. Author
  • Dr. Rajeev Yadav Professor, Shri Krishna University, Chhatarpur, M.P. Author

Keywords:

Malinformation, BO-GIDF, NAEC, WSN

Abstract

Wireless sensor networks (WSNS) place a premium on efficient use of resources and safety. Particularly in multipath sensor network routing, studies have concentrated on reducing resource consumption while increasing security. False information is a major problem since it makes it harder to aggregate and authenticate data, which in turn increases the need for bandwidth and battery life. In response, we have built a bandwidth-optimal group-injected data filtering system to improve network performance by decreasing packet-transferred malinformation. In addition, a framework for network authentication has been put in place to strengthen protection against these types of injections. In addition to promoting improved security in multipath data transmission, this also guarantees safer data transfer between nodes and efficiently controls resource utilization. The bandwidth efficient approach employs a data aggregation algorithm to identify malicious information injections, with the goal of lowering energy consumption and network overheads in WSN. To improve the security of wireless sensor networks (WSNS) and reduce the impact of group-injected misinformation, this study presents the BO-GIDF architectural framework. In order to reduce bandwidth consumption, the framework finds all of the neighbors who are spreading false information using a collaborative neighbor selection method that is based on groups. Moreover, it uses an associative filtering approach to save processing time and enhance packet throughput through efficient sink identification. The authors also provide a system called network authenticated based on Elgamal cryptography (NAEC) to improve network privacy and security by strengthening authentication against malinformation injection using asymmetric key encryption. By identifying and isolating hostile actors, the NAEC framework speeds up processing and guarantees high interoperability security via an implicit approved certificate rule that prevents malinformation injection on dynamic pathways.

Downloads

Download data is not yet available.

References

1. Wu, H., Zhu, H., Li, X., & Amuri, M. J. V. (2023). Trust-based distributed set-membership filtering for target tracking under network attacks. IEEE Access, 11, 84468-84474.

2. Hooper, M., Tian, Y., Zhou, R., Cao, B., Lauf, A. P., Watkins, L., ... & Alexis, W. (2016, November). Securing commercial WiFi-based UAVs from common security attacks. In MILCOM 2016-2016 IEEE Military Communications Conference (pp. 1213-1218). IEEE.

3. Marsoof, A., Luco, A., Tan, H., & Joty, S. (2023). Content-filtering AI systems–limitations, challenges and regulatory approaches. Information & Communications Technology Law, 32(1), 64-101.

4. Mah, P. M., Skalna, I., & Pelech-Pilichowski, T. (2022, May). AI-Based Facial-Age Detection and IoT for Enhanced Data Security in Social Media. In Proceedings of the AAAI Symposium Series (Vol. 5, No. 1, pp. 242-249).

5. Bahja, M., & Safdar, G. A. (2020). Unlink the link between COVID-19 and 5G networks: an NLP and SNA based approach. Ieee Access, 8, 209127-209137.

6. Du, H., Niyato, D., Kang, J., Xiong, Z., Lam, K. Y., Fang, Y., & Li, Y. (2023). Spear or shield: Leveraging generative AI to tackle security threats of intelligent network services. arXiv preprint arXiv:2306.02384.

7. Xu, S., Yang, X., & Xie, Z. (2022). The future of misinformation control: integrating advanced algorithms and Blockchain for effective Deepfake detection. Peer-to-Peer Networking and Applications, 18(4), 244.

8. Kudari, R., & Koduru, S. R. (2021). The study of Mobile cloud computing: Design, Uses, and Security in Covid 19 time. Int. J. of Aquatic Science, 12(2), 2115-2124.

9. Gerts, D., Shelley, C. D., Parikh, N., Pitts, T., Watson Ross, C., Fairchild, G., ... & Daughton, A. R. (2021). “Thought I’d share first” and other conspiracy theory tweets from the COVID-19 infodemic: Exploratory study. JMIR public health and surveillance, 7(4), e26527.

10. Janavičiūtė, A., Liutkevičius, A., & Morkevičius, N. (2022). Toward the Implementation of Text-Based Web Page Classification and Filtering Solution for Low-Resource Home Routers Using a Machine Learning Approach. Electronics, 14(16), 3280.

11. Wani, M. A., ELAffendi, M., Shakil, K. A., Abuhaimed, I. M., Nayyar, A., Hussain, A., & Abd El-Latif, A. A. (2023). Toxic fake news detection and classification for combating COVID-19 misinformation. IEEE Transactions on Computational Social Systems, 11(4), 5101-5118.

12. Rojas, N., Boettcher, N., Játiva, P. P., & Sánchez, I. (2022). Technical Evaluation of Android Parental Control Tools and PDNS Filtering Services: The Chilean Context. IEEE Access.

13. Raza, S., Qureshi, R., Lotif, M., Chadha, A., Pandya, D., & Emmanouilidis, C. (2022). Just as humans need vaccines, so do models: Model immunization to combat falsehoods. arXiv preprint arXiv:2505.17870.

14. Maulana, A., & Langguth, J. (2023, November). Using gnns for misinformation spreader detection via assortativity-aware node label classification in Twitter networks. In 2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS) (pp. 1-8). IEEE.

15. Yang, H., Li, T., Yan, J., & Elvira, V. (2021). Hierarchical average fusion with GM-PHD filters against FDI and DoS attacks. IEEE Signal Processing Letters, 31, 934-938.

Downloads

Published

2023-09-01