http://iet.metastore.ingenta.com
1887

Security DV-hop localisation algorithm against wormhole attack in wireless sensor network

Security DV-hop localisation algorithm against wormhole attack in wireless sensor network

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Distance vector-hop (DV-hop) is a localisation algorithm based on distance vector routing, which often suffers the wormhole attack. To solve this problem, a security DV-hop localisation algorithm against wormhole attack (AWDV-hop) is proposed. First, the algorithm establishes the neighbour node relationship list (NNRL) by broadcast flooding. All the nodes get the ID numbers of their neighbour nodes through NNRL. The suspect beacon nodes can be found by comparing the theoretical and actual number of neighbour nodes. Then, the suspect beacon nodes calculate the distances to other beacon nodes in their NNRL to find the actual attacked beacon nodes. The attacked beacon nodes in the different areas of wormhole attack are marked with 1 or 2. Finally, the unknown nodes mark themselves with 1 or 2 according to the beacon nodes marked before. In the next round of localisation, the nodes marked with 1 and the nodes marked with 2 disconnected from each other. The simulation results show that the localisation error of the proposed AWDV-hop algorithm is reduced by about 80% than that of DV-hop algorithm suffering from the wormhole attack. Compared to label-based DV-HOP (LBDV-hop) and secure neighbour discovery based DV-HOP (NDDV-hop) algorithm, the localisation error is reduced by about 7 and 34%, respectively.

References

    1. 1)
      • 1. Imtiaz, R., Andrew, H.K.: ‘LITEWORP: statistical analysis of wireless sensor network Gaussian range estimation errors’, IET Wirel. Sens. Syst., 2013, 3, (1), pp. 5768.
    2. 2)
      • 2. Paul, B., Matin, M.A.: ‘Optimal geometrical sink location estimation for two-tiered wireless sensor networks’, IET Wirel. Sens. Syst., 2011, 1, (2), pp. 7484.
    3. 3)
      • 3. Yang, Y., Zhang, W., Hu, Y.: ‘Research on algorithm of joint location based on ultra wideband’, J. Northeast Dianli Univ.., 2015, 35, (1), pp. 8387.
    4. 4)
      • 4. Kumar, M., Dutta, K.: ‘Detecting wormhole attack on data aggregation in hierarchical WSN’, Int. J. Inf. Secur. Priv., 2017, 11, (01), pp. 3551.
    5. 5)
      • 5. Amish, P., Vaghela, V.B.: ‘Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol’. Proc. Int. Conf. Communication, Computing and Virtualization, Mumbai, India, February 2016, pp. 700707.
    6. 6)
      • 6. Li, J., Zhong, X., Xu, C.: ‘Review of dynamic node localization algorithm for wireless sensor networks’, J. Northeast Dianli Univ., 2015, 35, (01), pp. 5258.
    7. 7)
      • 7. Poovendran, R., Lazos, L.A.: ‘Graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks’, Wirel. Netw., 2007, 13, (01), pp. 2759.
    8. 8)
      • 8. Nabila, L., Mourad, G., Makhlouf, A.: ‘Secure DV-hop localization scheme against wormhole attacks in wireless sensor networks’, Trans. Emerg. Telecommun. Technol., 2012, 23, (04), pp. 303316.
    9. 9)
      • 9. Mostefa, B., Mohammed, F.: ‘Wormhole attack detection in wireless sensor networks’. Proc. Int. Conf. 2016 SAI Computing, Royal Victoria Dock, London, UK, August 2016, pp. 13191326.
    10. 10)
      • 10. Khalil, I., Bagchi, S., Shroff, N.B.: ‘MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks’. Proc. Int. Conf. Secure Communications and Workshops, Baltimore, MD, USA, September 2006, pp. 112.
    11. 11)
      • 11. Chen, H.L., Lou, W., Wang, Z.: ‘Securing DV-hop localization against wormhole attacks in wireless sensor networks’, Pervasive Mob. Comput., 2015, 16, pp. 2235.
    12. 12)
      • 12. Wang, H.B., Feng, L.P., Li, R.: ‘The secure localization algorithm of SDV-hop in wireless sensor networks’, Telkomnika Telecommun. Comput. Electr. Control, 2016, 14, (3), pp. 6574.
    13. 13)
      • 13. Hu, R.H., Dong, X.M.: ‘Senleash: a restricted defense mechanism against wormhole attacks in wireless sensor network’, J. Commun., 2013, 34, (10), pp. 6575.
    14. 14)
      • 14. Agrawal, N., Mishra, N.: ‘RTT based wormhole detection using NS-3’. Proc. Int. Conf. Computational Intelligence and Communication Networks, Bhopal, India, November 2014, pp. 861866.
    15. 15)
      • 15. Subha, S., Sankar, U.G.: ‘Message authentication and wormhole detection mechanism in wireless sensor network’. Proc. Int. Conf. Intelligent Systems and Control, Coimbatore, India, January 2015, pp. 978982.
    16. 16)
      • 16. Liu, C.X., Huang, T.L.: ‘Research on improved DV-hop algorithm against wormhole attacks in WSN’, J. Sens. Technol., 2011, 24, (10), pp. 14731478.
    17. 17)
      • 17. Zhou, Q.M., He, Y.: ‘Simulation of wormhole attack in SDV-hop and its resistance method’, Comput. Eng. Appl., 2010, 25, (46), pp. 8894.
    18. 18)
      • 18. Zhou, H., Zhou, W.: ‘An improved DV-hop algorithm based on detection of wormhole attack’, Digit. Technol. Appl., 2014, 33, (02), pp. 133134.
    19. 19)
      • 19. Wang, Y.Q., Tian, W., Pang, Y.Q.: ‘A new improved DV-hop localization algorithm’. IET Int. Conf. Communication Technology and Application, Beijing, China, October 2011, pp. 772776.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0075
Loading

Related content

content/journals/10.1049/iet-wss.2017.0075
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address