Enhancing Wireless Sensor Network Security through Integration with the ServiceNow Cloud Platform

Authors

  • Salwa Din York University
  • Syed Atif Ali Cisco CCIE

DOI:

https://doi.org/10.31598/sintechjournal.v8i3.2060

Keywords:

Wireless Sensor Network, Cloud, Security, SAAS, ServiceNow, Impulse Radio

Abstract

Wireless Sensor Networks (WSNs) are increasingly deployed in mission-critical environments but remain highly vulnerable to Denial of Service (DoS) and unauthorized access attacks due to constrained computational resources. This study proposes a security-enhanced WSN architecture integrated with the ServiceNow cloud platform to provide centralized monitoring, automated incident management, and secure data orchestration. A simulation-based experimental evaluation was conducted using 100 IEEE 802.15.4 sensor nodes under DoS attack scenarios. Results demonstrate that the proposed approach reduces average latency by 18%, improves packet delivery ratio by 12%, and enhances DoS detection rate to 94% compared to traditional standalone WSN security mechanisms. The integration leverages TLS-secured communication and lightweight AES-128 encryption to balance security and energy efficiency. The findings validate that cloud-driven orchestration significantly improves WSN resilience without imposing excessive overhead on sensor nodes

References

[1] K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, “An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN,” Wirel. Pers. Commun., vol. 122, no. 4, 2022, doi: 10.1007/s11277-021-09107-6.

[2] A. Gomez-Zavaglia, J. C. Mejuto, and J. Simal-Gandara, “Mitigation of emerging implications of climate change on food production systems,” 2020. doi: 10.1016/j.foodres.2020.109256.

[3] K. Ayub and R. Alshawa, “Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare,” Journal of Robotics and Automation Research, vol. 5, no. 3, 2024, doi: 10.33140/jrar.05.03.09.

[4] R. Filip, R. Gheorghita Puscaselu, L. Anchidin-Norocel, M. Dimian, and W. K. Savage, “Global Challenges to Public Health Care Systems during the COVID-19 Pandemic: A Review of Pandemic Measures and Problems,” 2022. doi: 10.3390/jpm12081295.

[5] B. Bhushan and G. Sahoo, “Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective,” in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 2019. doi: 10.1007/978-3-030-22277-2_27.

[6] K. Ayub, “Zero-Trust Architectures for SecOps in ServiceNow: Enabling Scalable Security in Enterprise Platforms Roushdy alShawa.”

[7] A. Beniiche, A. Ebrahimzadeh, and M. Maier, “From blockchain Internet of Things (B-IoT) towards decentralising the Tactile Internet,” in Blockchain-enabled Fog and Edge Computing, 2020. doi: 10.1201/9781003034087-2.

[8] A. Samadhiya, R. Agrawal, A. Kumar, and J. A. Garza-Reyes, “Regenerating the logistics industry through the Physical Internet Paradigm: A systematic literature review and future research orchestration,” Comput. Ind. Eng., vol. 178, 2023, doi: 10.1016/j.cie.2023.109150.

[9] K. Ayub and R. Alshawa, “A Novel AI Framework for WBAN Event Correlation in Healthcare: ServiceNow AIOps approach,” in Proceedings of 2024 IEEE Workshop on Microwave Theory and Technology in Wireless Communications, MTTW 2024, 2024. doi: 10.1109/MTTW64344.2024.10742181.

[10] K. S. Adu-Manu, F. Engmann, G. Sarfo-Kantanka, G. E. Baiden, and B. A. Dulemordzi, “WSN Protocols and Security Challenges for Environmental Monitoring Applications: A Survey,” 2022. doi: 10.1155/2022/1628537.

[11] Q. Liu, K. G. Mkongwa, and C. Zhang, “Performance issues in wireless body area networks for the healthcare application: a survey and future prospects,” 2021. doi: 10.1007/s42452-020-04058-2.

[12] X. Wang, Y. Sun, and D. Ding, “Adaptive Dynamic Programming for Networked Control Systems under Communication Constraints: A Survey of Trends and Techniques,” 2022. doi: 10.53941/ijndi0101008.

[13] A. Karale, “The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws,” 2021. doi: 10.1016/j.iot.2021.100420.

[14] S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wireless Networks, vol. 27, no. 2, 2021, doi: 10.1007/s11276-020-02535-5.

[15] K. Ayub and V. Zagurskis, “SMART Incubator: Implementation of Impulse Radio Ultra Wideband Based PA-MAC Architecture in Wireless Body Area Network,” in Proceedings - SIMS 2016: 2nd International Conference on Systems Informatics, Modelling and Simulation, 2017. doi: 10.1109/SIMS.2016.12.

[16] R. Sousa, R. Miranda, A. Moreira, C. Alves, N. Lori, and J. Machado, “Software tools for conducting real-time information processing and visualization in industry: An up-to-date review,” 2021. doi: 10.3390/app11114800.

[17] P. Durga, N. Kishore Kommisetty, and V. Dileep, “Leading the Future: Big Data Solutions, Cloud Migration, and AI-Driven Decision-Making in Modern Enterprises,” Theory and Practice, vol. 29, no. 3, 2022.

[18] Y. Huang, H. Xu, H. Gao, X. Ma, and W. Hussain, “SSUR: An Approach to Optimizing Virtual Machine Allocation Strategy Based on User Requirements for Cloud Data Center,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 2, 2021, doi: 10.1109/TGCN.2021.3067374.

[19] R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues,” 2022. doi: 10.3390/s22134730.

[20] N. Chandnani and C. N. Khairnar, “An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs,” Theor. Comput. Sci., vol. 929, 2022, doi: 10.1016/j.tcs.2022.06.032.

Downloads

Published

2026-03-11

How to Cite

Din, S., & Ali, S. A. (2026). Enhancing Wireless Sensor Network Security through Integration with the ServiceNow Cloud Platform. SINTECH (Science and Information Technology) Journal, 8(3), 243–252. https://doi.org/10.31598/sintechjournal.v8i3.2060

Similar Articles

<< < 1 2 3 > >> 

You may also start an advanced similarity search for this article.