WSNs serve as fundamental components for IoT applications to develop smart homes systems alongside traffic monitoring and control of smart grids and environment surveillance capabilities. Security and reliability of data delivery represents a primary requirement in these networks. Network security becomes achievable through the introduction of Secure and Selective Geographic Opportunistic Routing (SelGOR) protocol. The SelGOR security approach utilizes authentication selection with geographic opportunistic routing to create an attack defense against Denial-of-Service (DoS) incidents. The protocol develops a trust model from Statistical State Information (SSI) systems to maximize operational data productivity. SelGOR protects data integrity with automatic intruder detection through an encryption mechanism based on entropy which enables both strong authenticity and low calculations cost. By implementing a distributed verification system one can detect attackers more rapidly and simultaneously prevent duplicate data by using smart routing decision-making.The routing system of SelGOR adds trust capabilities to Mobile Ad Hoc Networks (MANETs) through its trust-based mechanism. The protocol uses node reputation and monitoring results to make route decisions so it chooses routes from trusted sources. Through its combination of geographic opportunistic routing with entropy-driven encryption and statistical trust models and cooperative attacker verification SelGOR delivers complete protection to WSNs against attacks and simultaneous enhancement of energy efficiency along with throughput and end-to-end performance. The system functions well for secure huge-scale IoT smart infrastructure applications through its detection methods.
Introduction
Wireless Sensor Networks (WSNs) in IoT environments are vulnerable to Denial of Service (DoS) attacks due to limited resources and open access. Integrating Selective Authentication with Geographic Opportunistic Routing (GOR) enhances security by authenticating about one-third of nodes, reducing network overhead while maintaining efficient, reliable communication. This approach is effective across various IoT domains such as smart cities, healthcare, agriculture, industry, military, and disaster response, protecting against DoS attacks and conserving energy.
Several intrusion detection systems combining rule-based filtering with machine learning (Decision Tree, SVM, LSTM with fuzzy logic) improve DoS detection accuracy and speed. Additionally, studies on Mobile WSNs (M-WSNs) highlight coverage optimization and node failure recovery through adaptive algorithms balancing mobility, coverage, and connectivity.
The Secure and Selective Authentication Geographic Opportunistic Routing (SSAGOR) protocol authenticates nodes before network access, enabling stable, energy-efficient multipath routing that prolongs network lifetime and ensures reliable data transmission. The routing method dynamically selects nodes based on energy levels and node density, employing cooperative verification to block unauthorized access and maintain network integrity.
Simulation results using NS-2 confirm the Dominant Optimization System (DOS) algorithm's effectiveness in minimizing energy consumption, reducing packet loss, and sustaining high packet delivery ratios under various mobility and traffic conditions. The system extends network operational time by optimizing energy use and routing decisions, showing promising applicability for secure, scalable IoT-based WSNs.
Conclusion
WSNs in IoT operations face DoS attack vulnerability because they have restricted capabilities and open accessibility. Approximately one-third of node authentication in Geographic Opportunistic Routing (GOR) helps maintain secure communication without adding excess overhead to the network. The approach enhances marketplace safety and maintains optimal data transfer operations in IoT-based WSNs.[1], [2], [3]. IOT enhances Wireless Sensor Network (WSN) data collection ability while making both networks more susceptible to Denial of Service attacks.
References
[1] M. Soula, B. Mbarek, A. Meddeb, and T. Pitner, “A Survey of Intrusion Detection-Based Trust Management Approaches in IoT Networks,” in Advanced Information Networking and Applications, vol. 655, L. Barolli, Ed., in Lecture Notes in Networks and Systems, vol. 655. , Cham: Springer International Publishing, 2023, pp. 504–517. doi: 10.1007/978-3-031-28694-0_48.
[2] C. Liu, J. Yang, R. Chen, Y. Zhang, and J. Zeng, “Research on immunity-based intrusion detection technology for the Internet of Things,” in 2011 Seventh International Conference on Natural Computation, Shanghai, China: IEEE, Jul. 2011, pp. 212–216. doi: 10.1109/ICNC.2011.6022060.
[3] L. Wallgren, S. Raza, and T. Voigt, “Routing Attacks and Countermeasures in the RPL-Based Internet of Things,” Int. J. Distrib. Sens. Netw., vol. 9, no. 8, p. 794326, Aug. 2013, doi: 10.1155/2013/794326.
[4] H. Sharma, B. Shajahan, R. Elangovan, and M. Thirumalaisamy, “DoS Attack Detection Mechanism in Wireless Sensor Networks,” Salud Cienc. Tecnol., vol. 2, p. 244, Dec. 2022, doi: 10.56294/saludcyt2022244.
[5] P. Sathishkumar, A. Gnanabaskaran, M. Saradha, and R. Gopinath, “Dos attack detection using fuzzy temporal deep long Short-Term memory algorithm in wireless sensor network,” Ain Shams Eng. J., vol. 15, no. 12, p. 103052, Dec. 2024, doi: 10.1016/j.asej.2024.103052.
[6] P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, “Denial-of-Service detection in 6LoWPAN based Internet of Things,” in 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France: IEEE, Oct. 2013, pp. 600–607. doi: 10.1109/WiMOB.2013.6673419.
[7] R. Wang, S. Gao, W. Yang, and Z. Jiang, “Energy aware routing with link disjoint backup paths,” Comput. Netw., vol. 115, pp. 42–53, Mar. 2017, doi: 10.1016/j.comnet.2017.01.015.
[8] K. Aravind and P. K. R. Maddikunta, “Multiobjectives for Optimal Geographic Routing in IoT Health Care System,” Complexity, vol. 2022, no. 1, p. 7568804, Jan. 2022, doi: 10.1155/2022/7568804.
[9] D. Oh, D. Kim, and W. Ro, “A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things,” Sensors, vol. 14, no. 12, pp. 24188–24211, Dec. 2014, doi: 10.3390/s141224188.
[10] M. Saideh, J.-P. Jamont, and L. Vercouter, “Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things,” 2024, doi: 10.48550/ARXIV.2404.07675.
[11] S. Swami, P. Singh, and S. S. Chauhan, “An Integrated Rule-Based and Machine Learning Technique for Efficient DoS Attack Detection in WSN,” in 2024 2nd International Conference on Disruptive Technologies (ICDT), Greater Noida, India: IEEE, Mar. 2024, pp. 847–851. doi: 10.1109/ICDT61202.2024.10489560.
[12] B. J. Santhosh Kumar and S. Sinha, “An Intrusion Detection and Prevention System against DOS Attacks for Internet-Integrated WSN,” in 2022 7th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India: IEEE, Jun. 2022, pp. 793–797. doi: 10.1109/ICCES54183.2022.9835838.
[13] S. M. Mohamed, H. S. Hamza, and I. A. Saroit, “Coverage in mobile wireless sensor networks (M-WSN): A survey,” Comput. Commun., vol. 110, pp. 133–150, Sep. 2017, doi: 10.1016/j.comcom.2017.06.010.