Browse > Article
http://dx.doi.org/10.3837/tiis.2019.04.027

The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN  

Li, Jianpo (School of Computer Science, Northeast Electric Power University)
Wang, Dong (School of Computer Science, Northeast Electric Power University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.4, 2019 , pp. 2223-2242 More about this Journal
Abstract
Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link (DWNL) and have limited attention to Multi-Wormhole-Node-Link (MWNL). In this paper, we propose a security DV-Hop algorithm (AMLDV-Hop) to resist MWNL. Firstly, the algorithm establishes the Neighbor List (NL) in initialization phase. It uses the NL to find the suspect beacon nodes and then find the actually attacked beacon nodes by calculating the distances to other beacon nodes. The attacked beacon nodes generate and broadcast the conflict sets to distinguish the different wormhole areas. The unknown nodes take the marked beacon nodes as references and mark themselves with different numbers in the first-round marking. If the unknown nodes fail to mark themselves, they will take the marked unknown nodes as references to mark themselves in the second-round marking. The unknown nodes that still fail to be marked are semi-isolated. The results indicate that the localization error of proposed AMLDV-Hop algorithm has 112.3%, 10.2%, 41.7%, 6.9% reduction compared to the attacked DV-Hop algorithm, the Label-based DV-Hop (LBDV-Hop), the Secure Neighbor Discovery Based DV-Hop (NDDV-Hop), and the Against Wormhole DV-Hop (AWDV-Hop) algorithm.
Keywords
wormhole attack; wireless sensor networks; security DV-Hop algorithm; multi-wormhole; neighbor list;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Jianpo Li, Xinxin Zhong and Chun Xu, "Review of dynamic node localization algorithm for wireless sensor networks," Journal of Northeast Dianli University, vol. 35, no. 1, pp. 52-58, January, 2015.
2 Kaur Ravneet and Malhotra Jyoteesh, "Comparitive analysis of DV-hop and APIT localization techniques in WSN," International Journal of Future Generation Communication and Networking, vol. 9, no. 8, pp. 327-344, March, 2016.
3 Zhijun Teng, Miaomiao Xu and Li Zhang, "Nodes deployment in wireless sensor networks based on improved reliability virtual force algorithm," Journal of Northeast Dianli University, vol. 36, no. 2, pp. 86-89, February, 2016.
4 Tsitsiroudi Niki, Sarigiannidis Panagiotis and Karapistoli Eirini, "EyeSim: A mobile application for visual-Assisted wormhole attack detection in IoT-enabled WSNs," in Proc. of 9th Int. IFIP Wireless and Mobile Networking Conference, pp. 103-109, July 11-13, 2016.
5 Singh Parminder and Kaur Damandeep, "An approach to improve the performance of WSN during wormhole attack using promiscuous mode," International Journal of Computer Applications, vol. 73, no. 20, pp. 26-29. July, 2014.   DOI
6 Khandare Pravin, Sharma Yogesh and Sakhare S.R, "Countermeasures for selective forwarding and wormhole attack in WSN," in Proc. of Int. Inventive Systems and Control, pp. 1-7, January 19-20, 2017.
7 Bendjima Mostefa and Feham Mohammed, "Wormhole attack detection in wireless sensor networks," in Proc. of SAI Computing Conference, pp.1319-1326, July 13-15, 2016.
8 Jianpo Li, Dong Wang and Yanjiao Wang, "Security DV-hop localisation algorithm against wormhole attack in wireless sensor network," IET Wireless Sensor Systems, vol. 8, no. 2, pp.68-75, 2018.   DOI
9 Xiang Yang, "DV-Hop secure positioning algorithm for wormhole attack resistance," Computer Applications and Software, vol. 30, no. 5, pp.188-192, May, 2013.   DOI
10 Jianpo Li, Xinxin Zhong and Chun Xu, "Review of statical node localization algorithm for wireless sensor networks," Journal of Northeast Dianli University, vol. 35, no. 2, pp.73-82, February, 2015.
11 Subha.s and Sankar U.Gowri, "Message authentication and wormhole detection mechanism in wireless sensor network," in Proc. of 9th Int. Intelligent System and Control, pp. 25-28, January 9-10, 2015.
12 Ranu Shukla, Rekha Jain and P.D Vyavahare, "Combating against Wormhole Attack in Trust and Energy Aware Secure Routing Protocol (TESRP) in Wireless Sensor Network," in Proc. of Int. Recent Innovations in Signal Processing and Embedded Systems, pp. 555-561, October 27-29, 2017.
13 Zhijun Teng and Xiaoxu, Zhang, "The layout optimization of WSN based on inertia weight shuffled frog leaping algorithm," Journal of Northeast Dianli University, vol. 35, no. 6, pp. 66-69, June, 2015.
14 Naidu Swarna Mahesh and Himaja Vemuri Bhavani, "Handling wormhole attacks in WSNs using location based approach," in Proc. of 1st Int. Advances in Intelligent Systems and Computing, pp. 43-51, December 01, 2016.
15 Sharma Mayank Kumar and Joshi Brijendra Kumar, "A mitigation technique for high transmission power based wormhole in wireless sensor networks," in Proc. of Int. ICT in Business, Industry, Government, pp. 722-723, November 18-19, 2016.
16 Jayashree Padmanabhan and Venkatesh Manickavasagam, "Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems," IEEE Access, vol. 6, pp. 1753-1763, December, 2017.   DOI
17 Arai Massayuki,"Reliability improvement of multi-path routing for wireless sensor networks and its application to wormhole attack avoidance," in Proc. of 12th Int. Ubiquitous Intelligence and Computing, pp.711-722, August 10-14, 2015.
18 Honglong Chen, Wei Lou and Zhi Wang, "Securing DV-Hop localization against wormhole attacks in wireless sensor networks," Pervasive and Mobile Computing, vol. 16, no. PA, pp. 22-35, January, 2015.   DOI
19 Ping Deng and Hongjiang Zhang, "A DV-Hop localization algorithm against wormhole attacks in WSN," Journal of Southwest Jiaotong University, vol. 50, no. 1, pp. 51-57, February, 2015.   DOI
20 Honglong Chen and Zhibo Wang, "Secure localization scheme against wormhole attack for wireless sensor networks," Journal on Communication, vol. 36, no. 3, pp.723-732, March, 2015.
21 Hongbin Wang, "The secure localization algorithm of SDV-Hop in wireless sensor networks," Telecomunication, Computing, Electronics and Control, vol. 14, no. 3, pp. 65-74, 2016.
22 Neha Agrawal and Nitin Mishra, "RTT based Wormhole Detection using NS-3," in Proc. of 6th Int. Computational Intelligence and Communication Networks, pp.861-866, 14-16 Nov., 2014.
23 Ronghua Hu and Xiaomei Dong, "Senleash: A restricted defense mechanism against wormhole attacks in wireless sensor network," Journal on Communications, vol. 34, no. 10, pp. 65-75, November 12, 2013.
24 Amish Parmar and Vaghela V.B, "Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol," in Proc. of 7th Int. Communication,Computing and Virtualization, pp. 700-707, 2016.
25 Kumar Gulsham, Rai Mritunjay Kumar and Saha Rahul, "Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks," Journal of Network and Computer Applications, vol. 99, pp. 10-16, December, 2017.   DOI
26 Bharat Bhushan and Dr. G. Sahoo, "Detection and defense mechanisms against wormhole attacks in wireless sensor networks" in Proc. of Int. Advance in Computing and Automation (Fall), pp. 1-5, September 15-16, 2017.
27 Omar Cheikhrouhou, Ghulam M. Bhatti and Roobaea Alroobaea, "A hybrid DV-Hop algorithm using RSSI for localization in large-scale wireless sensor networks," Journal of Sensors, vol. 18, no. 1469, pp. 1-14, May, 2018.   DOI
28 Bhagat Swati and Panse Trishna, "A detection and prevention of wormhole attack in homogeneous wireless sensor network," in Proc. of Int. ICT in Business, Industry, and Government, pp.1-6, 18-19 Nov., 2016.