Analysis of Cyber Attack Detection Mitigation in IIoT WSN

Analysis of Cyber Attack Detection Mitigation in IIoT WSN

Performance Analysis of Cyber Attack Detection and Mitigation in IIoT Wireless Sensor Networks

Implementation plan:

Scenario 1: IEEE 802.15.4 Static (Grid-Based) Topology

Step 1: Initially, we constructed a environment with 40 static IIOT grid-based nodes configured using IEEE 802.15.4 with RPL routing and CSMA/CA MAC protocol.

Step 2: Then, we simulate the network under the following conditions: Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack.

Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.

Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)

4.1: Number of static nodes vs. Packet Delivery Ratio (%)

4.2: Number of static nodes vs. End-to-End Delay (ms)

4.3: Number of static nodes vs. Throughput (bps)

4.4: Number of static nodes vs. Energy Consumption (J)

Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.

Scenario 2: IEEE 802.15.4 Mobile (MANET) Topology

Step 1: Initially, we constructed a WSN environment with 40 mobile nodes configured using IEEE 802.15.4 with AODV routing and CSMA/CA MAC protocol.

Step 2: Then, we simulate the network under the following conditions: Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack.

Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.

Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)

4.1: Number of mobile nodes vs. Packet Delivery Ratio (%)

4.2: Number of mobile nodes vs. End-to-End Delay (ms)

4.3: Number of mobile nodes vs. Throughput (bps)

4.4: Number of mobile nodes vs. Energy Consumption (J)

Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.

 

Scenario 3: LoRaWAN Static Topology

Step 1: Initially, we constructed a WSN environment with 40 static LoRaWAN nodes connected to 2 gateways and a central server

Step 2: Then, we simulate the network for 12000 ms under the following conditions: Normal, Sybil Attack, and Flooding Attack.

Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.

Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)

4.1: Number of static nodes vs. Packet Delivery Ratio (%)

4.2: Number of static nodes vs. End-to-End Delay (ms)

4.3: Number of static nodes vs. Throughput (bps)

4.4: Number of static nodes vs. Energy Consumption (J)

Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.

 

Software Requirement:

1. Development Tool: OMNET++ 6.0 or above
2. Operating System: Windows- 10 (64-bit) or above

Note:

1. We make a simulation based process only, not a real time process.

2. If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.

3. Please note that this implementation plan does not include any further steps after it is put into implementation.

4. If the above plan satisfies your requirement, please confirm us soon.

Live Tasks
Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Workflow

YouTube Channel

Unlimited Network Simulation Results available here.

Related Topics