Open Access
ARTICLE
Wireless Sensor Network Modeling and Analysis for Attack Detection
1 Laboratory of Internet of Things, International Science Complex “Astana”, Astana, 010000, Kazakhstan
2 Department of Information Systems, L.N. Gumilyov Eurasian National University, Astana, 010000, Kazakhstan
3 Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences, St. Petersburg, 199178, Russia
4 Department of Artificial Intelligence and Big Data, Al-Farabi Kazakh National University, Almaty, 050040, Kazakhstan
* Corresponding Author: Tamara Zhukabayeva. Email:
(This article belongs to the Special Issue: Emerging Technologies in Information Security )
Computer Modeling in Engineering & Sciences 2025, 144(2), 2591-2625. https://doi.org/10.32604/cmes.2025.067142
Received 25 April 2025; Accepted 22 July 2025; Issue published 31 August 2025
Abstract
Wireless Sensor Networks (WSN) have gained significant attention over recent years due to their extensive applications in various domains such as environmental monitoring, healthcare systems, industrial automation, and smart cities. However, such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities. The paper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks. Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user errors or malicious activities. A proposed integrated approach for data collection, preprocessing, and analysis in WSN outlines a series of steps applicable throughout both the design phase and operation stage. This ensures effective detection of attacks and anomalies within WSNs. An introduced attack model specifies potential types of unauthorized network layer attacks targeting network nodes, transmitted data, and services offered by the WSN. Furthermore, a graph-based analytical framework was designed to detect attacks by evaluating real-time events from network nodes and determining if an attack is underway. Additionally, a simulation model based on sequences of imperative rules defining behaviors of both regular and compromised nodes is presented. Overall, this technique was experimentally verified using a segment of a WSN embedded in a smart city infrastructure, simulating a wormhole attack. Results demonstrate the viability and practical significance of the technique for enhancing future information security measures. Validation tests confirmed high levels of accuracy and efficiency when applied specifically to detecting wormhole attacks targeting routing protocols in WSNs. Precision and recall rates averaged above the benchmark value of 0.95, thus validating the broad applicability of the proposed models across varied scenarios.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools