http://iet.metastore.ingenta.com
1887

Security DV-hop localisation algorithm against wormhole attack in wireless sensor network

Security DV-hop localisation algorithm against wormhole attack in wireless sensor network

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Wireless Sensor Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Distance vector-hop (DV-hop) is a localisation algorithm based on distance vector routing, which often suffers the wormhole attack. To solve this problem, a security DV-hop localisation algorithm against wormhole attack (AWDV-hop) is proposed. First, the algorithm establishes the neighbour node relationship list (NNRL) by broadcast flooding. All the nodes get the ID numbers of their neighbour nodes through NNRL. The suspect beacon nodes can be found by comparing the theoretical and actual number of neighbour nodes. Then, the suspect beacon nodes calculate the distances to other beacon nodes in their NNRL to find the actual attacked beacon nodes. The attacked beacon nodes in the different areas of wormhole attack are marked with 1 or 2. Finally, the unknown nodes mark themselves with 1 or 2 according to the beacon nodes marked before. In the next round of localisation, the nodes marked with 1 and the nodes marked with 2 disconnected from each other. The simulation results show that the localisation error of the proposed AWDV-hop algorithm is reduced by about 80% than that of DV-hop algorithm suffering from the wormhole attack. Compared to label-based DV-HOP (LBDV-hop) and secure neighbour discovery based DV-HOP (NDDV-hop) algorithm, the localisation error is reduced by about 7 and 34%, respectively.

References

    1. 1)
      • R. Imtiaz , H.K. Andrew .
        1. Imtiaz, R., Andrew, H.K.: ‘LITEWORP: statistical analysis of wireless sensor network Gaussian range estimation errors’, IET Wirel. Sens. Syst., 2013, 3, (1), pp. 5768.
        . IET Wirel. Sens. Syst. , 1 , 57 - 68
    2. 2)
      • B. Paul , M.A. Matin .
        2. Paul, B., Matin, M.A.: ‘Optimal geometrical sink location estimation for two-tiered wireless sensor networks’, IET Wirel. Sens. Syst., 2011, 1, (2), pp. 7484.
        . IET Wirel. Sens. Syst. , 2 , 74 - 84
    3. 3)
      • Y. Yang , W. Zhang , Y. Hu .
        3. Yang, Y., Zhang, W., Hu, Y.: ‘Research on algorithm of joint location based on ultra wideband’, J. Northeast Dianli Univ.., 2015, 35, (1), pp. 8387.
        . J. Northeast Dianli Univ.. , 1 , 83 - 87
    4. 4)
      • M. Kumar , K. Dutta .
        4. Kumar, M., Dutta, K.: ‘Detecting wormhole attack on data aggregation in hierarchical WSN’, Int. J. Inf. Secur. Priv., 2017, 11, (01), pp. 3551.
        . Int. J. Inf. Secur. Priv. , 1 , 35 - 51
    5. 5)
      • P. Amish , V.B. Vaghela .
        5. Amish, P., Vaghela, V.B.: ‘Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol’. Proc. Int. Conf. Communication, Computing and Virtualization, Mumbai, India, February 2016, pp. 700707.
        . Proc. Int. Conf. Communication, Computing and Virtualization , 700 - 707
    6. 6)
      • J. Li , X. Zhong , C. Xu .
        6. Li, J., Zhong, X., Xu, C.: ‘Review of dynamic node localization algorithm for wireless sensor networks’, J. Northeast Dianli Univ., 2015, 35, (01), pp. 5258.
        . J. Northeast Dianli Univ. , 1 , 52 - 58
    7. 7)
      • R. Poovendran , L.A. Lazos .
        7. Poovendran, R., Lazos, L.A.: ‘Graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks’, Wirel. Netw., 2007, 13, (01), pp. 2759.
        . Wirel. Netw. , 1 , 27 - 59
    8. 8)
      • L. Nabila , G. Mourad , A. Makhlouf .
        8. Nabila, L., Mourad, G., Makhlouf, A.: ‘Secure DV-hop localization scheme against wormhole attacks in wireless sensor networks’, Trans. Emerg. Telecommun. Technol., 2012, 23, (04), pp. 303316.
        . Trans. Emerg. Telecommun. Technol. , 4 , 303 - 316
    9. 9)
      • B. Mostefa , F. Mohammed .
        9. Mostefa, B., Mohammed, F.: ‘Wormhole attack detection in wireless sensor networks’. Proc. Int. Conf. 2016 SAI Computing, Royal Victoria Dock, London, UK, August 2016, pp. 13191326.
        . Proc. Int. Conf. 2016 SAI Computing , 1319 - 1326
    10. 10)
      • I. Khalil , S. Bagchi , N.B. Shroff .
        10. Khalil, I., Bagchi, S., Shroff, N.B.: ‘MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks’. Proc. Int. Conf. Secure Communications and Workshops, Baltimore, MD, USA, September 2006, pp. 112.
        . Proc. Int. Conf. Secure Communications and Workshops , 1 - 12
    11. 11)
      • H.L. Chen , W. Lou , Z. Wang .
        11. Chen, H.L., Lou, W., Wang, Z.: ‘Securing DV-hop localization against wormhole attacks in wireless sensor networks’, Pervasive Mob. Comput., 2015, 16, pp. 2235.
        . Pervasive Mob. Comput. , 22 - 35
    12. 12)
      • H.B. Wang , L.P. Feng , R. Li .
        12. Wang, H.B., Feng, L.P., Li, R.: ‘The secure localization algorithm of SDV-hop in wireless sensor networks’, Telkomnika Telecommun. Comput. Electr. Control, 2016, 14, (3), pp. 6574.
        . Telkomnika Telecommun. Comput. Electr. Control , 3 , 65 - 74
    13. 13)
      • R.H. Hu , X.M. Dong .
        13. Hu, R.H., Dong, X.M.: ‘Senleash: a restricted defense mechanism against wormhole attacks in wireless sensor network’, J. Commun., 2013, 34, (10), pp. 6575.
        . J. Commun. , 10 , 65 - 75
    14. 14)
      • N. Agrawal , N. Mishra .
        14. Agrawal, N., Mishra, N.: ‘RTT based wormhole detection using NS-3’. Proc. Int. Conf. Computational Intelligence and Communication Networks, Bhopal, India, November 2014, pp. 861866.
        . Proc. Int. Conf. Computational Intelligence and Communication Networks , 861 - 866
    15. 15)
      • S. Subha , U.G. Sankar .
        15. Subha, S., Sankar, U.G.: ‘Message authentication and wormhole detection mechanism in wireless sensor network’. Proc. Int. Conf. Intelligent Systems and Control, Coimbatore, India, January 2015, pp. 978982.
        . Proc. Int. Conf. Intelligent Systems and Control , 978 - 982
    16. 16)
      • C.X. Liu , T.L. Huang .
        16. Liu, C.X., Huang, T.L.: ‘Research on improved DV-hop algorithm against wormhole attacks in WSN’, J. Sens. Technol., 2011, 24, (10), pp. 14731478.
        . J. Sens. Technol. , 10 , 1473 - 1478
    17. 17)
      • Q.M. Zhou , Y. He .
        17. Zhou, Q.M., He, Y.: ‘Simulation of wormhole attack in SDV-hop and its resistance method’, Comput. Eng. Appl., 2010, 25, (46), pp. 8894.
        . Comput. Eng. Appl. , 46 , 88 - 94
    18. 18)
      • H. Zhou , W. Zhou .
        18. Zhou, H., Zhou, W.: ‘An improved DV-hop algorithm based on detection of wormhole attack’, Digit. Technol. Appl., 2014, 33, (02), pp. 133134.
        . Digit. Technol. Appl. , 2 , 133 - 134
    19. 19)
      • Y.Q. Wang , W. Tian , Y.Q. Pang .
        19. Wang, Y.Q., Tian, W., Pang, Y.Q.: ‘A new improved DV-hop localization algorithm’. IET Int. Conf. Communication Technology and Application, Beijing, China, October 2011, pp. 772776.
        . IET Int. Conf. Communication Technology and Application , 772 - 776
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0075
Loading

Related content

content/journals/10.1049/iet-wss.2017.0075
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address