Performance Analysis of Cyber Attack Detection and Mitigation in IIoT Wireless Sensor Networks
Implementation plan:
Scenario 1: IEEE 802.15.4 Static (Grid-Based) Topology
Step 1: Initially, we constructed a environment with 40 static IIOT grid-based nodes configured using IEEE 802.15.4 with RPL routing and CSMA/CA MAC protocol.
Step 2: Then, we simulate the network under the following conditions: Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack.
Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.
Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)
4.1: Number of static nodes vs. Packet Delivery Ratio (%)
4.2: Number of static nodes vs. End-to-End Delay (ms)
4.3: Number of static nodes vs. Throughput (bps)
4.4: Number of static nodes vs. Energy Consumption (J)
Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.
Scenario 2: IEEE 802.15.4 Mobile (MANET) Topology
Step 1: Initially, we constructed a WSN environment with 40 mobile nodes configured using IEEE 802.15.4 with AODV routing and CSMA/CA MAC protocol.
Step 2: Then, we simulate the network under the following conditions: Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack.
Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.
Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)
4.1: Number of mobile nodes vs. Packet Delivery Ratio (%)
4.2: Number of mobile nodes vs. End-to-End Delay (ms)
4.3: Number of mobile nodes vs. Throughput (bps)
4.4: Number of mobile nodes vs. Energy Consumption (J)
Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.
Scenario 3: LoRaWAN Static Topology
Step 1: Initially, we constructed a WSN environment with 40 static LoRaWAN nodes connected to 2 gateways and a central server
Step 2: Then, we simulate the network for 12000 ms under the following conditions: Normal, Sybil Attack, and Flooding Attack.
Step 3: Next, we collect and store the Packet Delivery Ratio (%), End-to-End Delay (ms), Energy Consumption (J), and Throughput (bps) data of all conditions.
Step 4: Next, we plot the performance for the following metrics for all conditions:( Normal, Blackhole Attack, Wormhole Attack, Sybil Attack, Backoff Attack, and Flooding Attack)
4.1: Number of static nodes vs. Packet Delivery Ratio (%)
4.2: Number of static nodes vs. End-to-End Delay (ms)
4.3: Number of static nodes vs. Throughput (bps)
4.4: Number of static nodes vs. Energy Consumption (J)
Step 5: Finally, we apply a lightweight ML Decision Tree algorithm to detect and mitigate the attacks based on the collected data.
Software Requirement:
1. Development Tool: OMNET++ 6.0 or above
2. Operating System: Windows- 10 (64-bit) or above
Note:
1. We make a simulation based process only, not a real time process.
2. If the above plan does not satisfy your requirement, please provide the processing details, like the above step-by-step.
3. Please note that this implementation plan does not include any further steps after it is put into implementation.
4. If the above plan satisfies your requirement, please confirm us soon.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |