Enhancing Wireless Sensor Network Security through Integration with the ServiceNow Cloud Platform
DOI:
https://doi.org/10.31598/sintechjournal.v8i3.2060Keywords:
Wireless Sensor Network, Cloud, Security, SAAS, ServiceNow, Impulse RadioAbstract
Wireless Sensor Networks (WSNs) are increasingly deployed in mission-critical environments but remain highly vulnerable to Denial of Service (DoS) and unauthorized access attacks due to constrained computational resources. This study proposes a security-enhanced WSN architecture integrated with the ServiceNow cloud platform to provide centralized monitoring, automated incident management, and secure data orchestration. A simulation-based experimental evaluation was conducted using 100 IEEE 802.15.4 sensor nodes under DoS attack scenarios. Results demonstrate that the proposed approach reduces average latency by 18%, improves packet delivery ratio by 12%, and enhances DoS detection rate to 94% compared to traditional standalone WSN security mechanisms. The integration leverages TLS-secured communication and lightweight AES-128 encryption to balance security and energy efficiency. The findings validate that cloud-driven orchestration significantly improves WSN resilience without imposing excessive overhead on sensor nodes
References
[1] K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, “An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN,” Wirel. Pers. Commun., vol. 122, no. 4, 2022, doi: 10.1007/s11277-021-09107-6.
[2] A. Gomez-Zavaglia, J. C. Mejuto, and J. Simal-Gandara, “Mitigation of emerging implications of climate change on food production systems,” 2020. doi: 10.1016/j.foodres.2020.109256.
[3] K. Ayub and R. Alshawa, “Threat Modelling and Security Enhancements in Wireless Body Area Networks for Smart Healthcare,” Journal of Robotics and Automation Research, vol. 5, no. 3, 2024, doi: 10.33140/jrar.05.03.09.
[4] R. Filip, R. Gheorghita Puscaselu, L. Anchidin-Norocel, M. Dimian, and W. K. Savage, “Global Challenges to Public Health Care Systems during the COVID-19 Pandemic: A Review of Pandemic Measures and Problems,” 2022. doi: 10.3390/jpm12081295.
[5] B. Bhushan and G. Sahoo, “Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective,” in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, 2019. doi: 10.1007/978-3-030-22277-2_27.
[6] K. Ayub, “Zero-Trust Architectures for SecOps in ServiceNow: Enabling Scalable Security in Enterprise Platforms Roushdy alShawa.”
[7] A. Beniiche, A. Ebrahimzadeh, and M. Maier, “From blockchain Internet of Things (B-IoT) towards decentralising the Tactile Internet,” in Blockchain-enabled Fog and Edge Computing, 2020. doi: 10.1201/9781003034087-2.
[8] A. Samadhiya, R. Agrawal, A. Kumar, and J. A. Garza-Reyes, “Regenerating the logistics industry through the Physical Internet Paradigm: A systematic literature review and future research orchestration,” Comput. Ind. Eng., vol. 178, 2023, doi: 10.1016/j.cie.2023.109150.
[9] K. Ayub and R. Alshawa, “A Novel AI Framework for WBAN Event Correlation in Healthcare: ServiceNow AIOps approach,” in Proceedings of 2024 IEEE Workshop on Microwave Theory and Technology in Wireless Communications, MTTW 2024, 2024. doi: 10.1109/MTTW64344.2024.10742181.
[10] K. S. Adu-Manu, F. Engmann, G. Sarfo-Kantanka, G. E. Baiden, and B. A. Dulemordzi, “WSN Protocols and Security Challenges for Environmental Monitoring Applications: A Survey,” 2022. doi: 10.1155/2022/1628537.
[11] Q. Liu, K. G. Mkongwa, and C. Zhang, “Performance issues in wireless body area networks for the healthcare application: a survey and future prospects,” 2021. doi: 10.1007/s42452-020-04058-2.
[12] X. Wang, Y. Sun, and D. Ding, “Adaptive Dynamic Programming for Networked Control Systems under Communication Constraints: A Survey of Trends and Techniques,” 2022. doi: 10.53941/ijndi0101008.
[13] A. Karale, “The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws,” 2021. doi: 10.1016/j.iot.2021.100420.
[14] S. K. Mousavi, A. Ghaffari, S. Besharat, and H. Afshari, “Security of internet of things based on cryptographic algorithms: a survey,” Wireless Networks, vol. 27, no. 2, 2021, doi: 10.1007/s11276-020-02535-5.
[15] K. Ayub and V. Zagurskis, “SMART Incubator: Implementation of Impulse Radio Ultra Wideband Based PA-MAC Architecture in Wireless Body Area Network,” in Proceedings - SIMS 2016: 2nd International Conference on Systems Informatics, Modelling and Simulation, 2017. doi: 10.1109/SIMS.2016.12.
[16] R. Sousa, R. Miranda, A. Moreira, C. Alves, N. Lori, and J. Machado, “Software tools for conducting real-time information processing and visualization in industry: An up-to-date review,” 2021. doi: 10.3390/app11114800.
[17] P. Durga, N. Kishore Kommisetty, and V. Dileep, “Leading the Future: Big Data Solutions, Cloud Migration, and AI-Driven Decision-Making in Modern Enterprises,” Theory and Practice, vol. 29, no. 3, 2022.
[18] Y. Huang, H. Xu, H. Gao, X. Ma, and W. Hussain, “SSUR: An Approach to Optimizing Virtual Machine Allocation Strategy Based on User Requirements for Cloud Data Center,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 2, 2021, doi: 10.1109/TGCN.2021.3067374.
[19] R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues,” 2022. doi: 10.3390/s22134730.
[20] N. Chandnani and C. N. Khairnar, “An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs,” Theor. Comput. Sci., vol. 929, 2022, doi: 10.1016/j.tcs.2022.06.032.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Salwa Din, Syed Atif Ali

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.









1.png)



