access icon free Security DV-hop localisation algorithm against wormhole attack in wireless sensor network

Distance vector-hop (DV-hop) is a localisation algorithm based on distance vector routing, which often suffers the wormhole attack. To solve this problem, a security DV-hop localisation algorithm against wormhole attack (AWDV-hop) is proposed. First, the algorithm establishes the neighbour node relationship list (NNRL) by broadcast flooding. All the nodes get the ID numbers of their neighbour nodes through NNRL. The suspect beacon nodes can be found by comparing the theoretical and actual number of neighbour nodes. Then, the suspect beacon nodes calculate the distances to other beacon nodes in their NNRL to find the actual attacked beacon nodes. The attacked beacon nodes in the different areas of wormhole attack are marked with 1 or 2. Finally, the unknown nodes mark themselves with 1 or 2 according to the beacon nodes marked before. In the next round of localisation, the nodes marked with 1 and the nodes marked with 2 disconnected from each other. The simulation results show that the localisation error of the proposed AWDV-hop algorithm is reduced by about 80% than that of DV-hop algorithm suffering from the wormhole attack. Compared to label-based DV-HOP (LBDV-hop) and secure neighbour discovery based DV-HOP (NDDV-hop) algorithm, the localisation error is reduced by about 7 and 34%, respectively.

Inspec keywords: sensor placement; telecommunication network routing; wireless sensor networks; telecommunication security

Other keywords: wormhole attack; AWDV-hop; NNRL; broadcast flooding; localisation error; security DV-hop localisation algorithm; suspect beacon nodes; distance vector routing; neighbour node relationship list; wireless sensor network; attacked beacon nodes

Subjects: Wireless sensor networks; Communication network design, planning and routing

References

    1. 1)
      • 5. Amish, P., Vaghela, V.B.: ‘Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol’. Proc. Int. Conf. Communication, Computing and Virtualization, Mumbai, India, February 2016, pp. 700707.
    2. 2)
      • 15. Subha, S., Sankar, U.G.: ‘Message authentication and wormhole detection mechanism in wireless sensor network’. Proc. Int. Conf. Intelligent Systems and Control, Coimbatore, India, January 2015, pp. 978982.
    3. 3)
      • 11. Chen, H.L., Lou, W., Wang, Z.: ‘Securing DV-hop localization against wormhole attacks in wireless sensor networks’, Pervasive Mob. Comput., 2015, 16, pp. 2235.
    4. 4)
      • 6. Li, J., Zhong, X., Xu, C.: ‘Review of dynamic node localization algorithm for wireless sensor networks’, J. Northeast Dianli Univ., 2015, 35, (01), pp. 5258.
    5. 5)
      • 19. Wang, Y.Q., Tian, W., Pang, Y.Q.: ‘A new improved DV-hop localization algorithm’. IET Int. Conf. Communication Technology and Application, Beijing, China, October 2011, pp. 772776.
    6. 6)
      • 17. Zhou, Q.M., He, Y.: ‘Simulation of wormhole attack in SDV-hop and its resistance method’, Comput. Eng. Appl., 2010, 25, (46), pp. 8894.
    7. 7)
      • 16. Liu, C.X., Huang, T.L.: ‘Research on improved DV-hop algorithm against wormhole attacks in WSN’, J. Sens. Technol., 2011, 24, (10), pp. 14731478.
    8. 8)
      • 7. Poovendran, R., Lazos, L.A.: ‘Graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks’, Wirel. Netw., 2007, 13, (01), pp. 2759.
    9. 9)
      • 14. Agrawal, N., Mishra, N.: ‘RTT based wormhole detection using NS-3’. Proc. Int. Conf. Computational Intelligence and Communication Networks, Bhopal, India, November 2014, pp. 861866.
    10. 10)
      • 18. Zhou, H., Zhou, W.: ‘An improved DV-hop algorithm based on detection of wormhole attack’, Digit. Technol. Appl., 2014, 33, (02), pp. 133134.
    11. 11)
      • 12. Wang, H.B., Feng, L.P., Li, R.: ‘The secure localization algorithm of SDV-hop in wireless sensor networks’, Telkomnika Telecommun. Comput. Electr. Control, 2016, 14, (3), pp. 6574.
    12. 12)
      • 10. Khalil, I., Bagchi, S., Shroff, N.B.: ‘MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks’. Proc. Int. Conf. Secure Communications and Workshops, Baltimore, MD, USA, September 2006, pp. 112.
    13. 13)
      • 8. Nabila, L., Mourad, G., Makhlouf, A.: ‘Secure DV-hop localization scheme against wormhole attacks in wireless sensor networks’, Trans. Emerg. Telecommun. Technol., 2012, 23, (04), pp. 303316.
    14. 14)
      • 3. Yang, Y., Zhang, W., Hu, Y.: ‘Research on algorithm of joint location based on ultra wideband’, J. Northeast Dianli Univ.., 2015, 35, (1), pp. 8387.
    15. 15)
      • 1. Imtiaz, R., Andrew, H.K.: ‘LITEWORP: statistical analysis of wireless sensor network Gaussian range estimation errors’, IET Wirel. Sens. Syst., 2013, 3, (1), pp. 5768.
    16. 16)
      • 13. Hu, R.H., Dong, X.M.: ‘Senleash: a restricted defense mechanism against wormhole attacks in wireless sensor network’, J. Commun., 2013, 34, (10), pp. 6575.
    17. 17)
      • 2. Paul, B., Matin, M.A.: ‘Optimal geometrical sink location estimation for two-tiered wireless sensor networks’, IET Wirel. Sens. Syst., 2011, 1, (2), pp. 7484.
    18. 18)
      • 4. Kumar, M., Dutta, K.: ‘Detecting wormhole attack on data aggregation in hierarchical WSN’, Int. J. Inf. Secur. Priv., 2017, 11, (01), pp. 3551.
    19. 19)
      • 9. Mostefa, B., Mohammed, F.: ‘Wormhole attack detection in wireless sensor networks’. Proc. Int. Conf. 2016 SAI Computing, Royal Victoria Dock, London, UK, August 2016, pp. 13191326.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2017.0075
Loading

Related content

content/journals/10.1049/iet-wss.2017.0075
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading