Skip to main content
Top
Published in: Wireless Networks 2/2023

15-11-2022 | Original Paper

Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

Authors: Tayebeh Sahraneshin, Razieh Malekhosseini, Farhad Rad, S. Hadi Yaghoubyan

Published in: Wireless Networks | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things, also called IoT for short, consists of billions of devices distributed around the world, all of which are connected through the Internet. Data is collected by things and shared with each other. Due to the nature and infrastructure of wireless IoT, they have several vulnerabilities. IoT security refers to the protection methods used to secure Internet-connected or network-based devices. In fact, the security of communication between things has become one of the open issues and challenges due to the existence of various types of attacks in IoT. One of these attacks that can disrupt the normal communication between things and destroy the network's efficiency is the wormhole attack. Thus, in this type of attack, two intruders are located in two different areas of the network and try to exchange confidential information quickly, as a result, they inform things about the fake route and things send the information to the destination from the same fake route. In fact, it is sent to the intruder's things, which leads to the deletion of data by these intruders. This attack alters the data stream and misleads the well. Therefore, to solve this problem, the proposed method of this paper (Sec-IoT) addresses two basic issues to secure communication between things against wormhole attacks in the Internet of Things. Thus, in the first phase of Sec-IoT, it examines the trust of all things in the route discovery process. The purpose of the first phase was to identify intruding nodes and remove them from the process of participating in network operations. And in the second phase, Cluster Head selection is done using TOPSIS algorithm and data transfer between things is done encrypted using Hash-based Cryptography. The goal of the second phase was to guarantee the integrity of the information sent. The simulation results showed that the proposed method is superior to HRCA and HBC methods in terms of throughput (25%, 18%), PDR (24%, 19%) and lost packet (19%, 15%).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pishva, D. (2017). Internet of Things: Security and privacy issues and possible solution. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 797–808). IEEE. Pishva, D. (2017). Internet of Things: Security and privacy issues and possible solution. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 797–808). IEEE.
2.
go back to reference Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144–152.CrossRef Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144–152.CrossRef
3.
go back to reference Gonzalez, F., Guo, D., Nowicki, A., & Zalewski, J. (2017). Senior lab projects for teaching the Internet of Things in a Software Engineering program. Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej. Gonzalez, F., Guo, D., Nowicki, A., & Zalewski, J. (2017). Senior lab projects for teaching the Internet of Things in a Software Engineering program. Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej.
4.
go back to reference Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.CrossRef
5.
go back to reference Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.CrossRef Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.CrossRef
6.
go back to reference Thomas, A., Kumar, T. G., & Mohan, A. K. (2018). Neighbor attack detection in internet of things. In Advanced Computational and Communication Paradigms (pp. 187–196). Springer, Singapore. Thomas, A., Kumar, T. G., & Mohan, A. K. (2018). Neighbor attack detection in internet of things. In Advanced Computational and Communication Paradigms (pp. 187–196). Springer, Singapore.
7.
go back to reference Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32–37). IEEE. Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32–37). IEEE.
8.
go back to reference Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.CrossRef
9.
go back to reference Nguyen, T. D., Khan, J. Y., & Ngo, D. T. (2017). An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In 2017 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE. Nguyen, T. D., Khan, J. Y., & Ngo, D. T. (2017). An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In 2017 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE.
10.
go back to reference Neerugatti, V., & Reddy, R. M. (2019). Acknowledgement based technique for detection of the wormhole attack in RPL based internet of things networks. Asian Journal of Computer Science and Technology, 8(S3), 100–104.CrossRef Neerugatti, V., & Reddy, R. M. (2019). Acknowledgement based technique for detection of the wormhole attack in RPL based internet of things networks. Asian Journal of Computer Science and Technology, 8(S3), 100–104.CrossRef
11.
go back to reference Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Computers & Security, 94, 101849.CrossRef Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Computers & Security, 94, 101849.CrossRef
12.
go back to reference Ambili, K. N., & Jose, J. (2020). Trust based intrusion detection system to detect insider attacks in IoT systems. In Information Science and Applications (pp. 631–638). Springer, Singapore. Ambili, K. N., & Jose, J. (2020). Trust based intrusion detection system to detect insider attacks in IoT systems. In Information Science and Applications (pp. 631–638). Springer, Singapore.
13.
go back to reference Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840–847.CrossRef Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840–847.CrossRef
14.
go back to reference Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313–1328.CrossRef Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313–1328.CrossRef
15.
go back to reference Ai, Z. Y., Zhou, Y. T., & Song, F. (2018). A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors, 18(6), 1926.CrossRef Ai, Z. Y., Zhou, Y. T., & Song, F. (2018). A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors, 18(6), 1926.CrossRef
16.
go back to reference Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS) (pp. 95–102). IEEE. Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS) (pp. 95–102). IEEE.
17.
go back to reference Wani, A., & Revathi, S. (2017). Analyzing threats of iot networks using sdn based intrusion detection system (sdiot-ids). In International Conference on Next Generation Computing Technologies (pp. 536–542). Springer, Singapore. Wani, A., & Revathi, S. (2017). Analyzing threats of iot networks using sdn based intrusion detection system (sdiot-ids). In International Conference on Next Generation Computing Technologies (pp. 536–542). Springer, Singapore.
18.
go back to reference Acharjya, D. P., & Ahmed, N. S. S. (2017). Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. In Internet of Things: Novel Advances and Envisioned Applications (pp. 149–172). Springer, Cham. Acharjya, D. P., & Ahmed, N. S. S. (2017). Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. In Internet of Things: Novel Advances and Envisioned Applications (pp. 149–172). Springer, Cham.
19.
go back to reference Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., & Piran, M. J. (2020). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience, 51, 2558–2571. Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., & Piran, M. J. (2020). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience, 51, 2558–2571.
20.
go back to reference Zhu, M., Chang, L., Wang, N., & You, I. (2020). A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access, 8, 20413–20427.CrossRef Zhu, M., Chang, L., Wang, N., & You, I. (2020). A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access, 8, 20413–20427.CrossRef
21.
go back to reference Zhang, X. J., Qu, Z. Y., & Zhang, M. L. (2017). A high efficient self-organizing network protocol for large scale aware nodes in internet of things. DEStech Transactions on Engineering and Technology Research, (amma). Zhang, X. J., Qu, Z. Y., & Zhang, M. L. (2017). A high efficient self-organizing network protocol for large scale aware nodes in internet of things. DEStech Transactions on Engineering and Technology Research, (amma).
22.
go back to reference Vellanki, M., Kandukuri, S. P. R., & Razaque, A. (2016). Node level energy efficiency protocol for Internet of Things. Journal of Theoretical and Computational Science, 3, 140. Vellanki, M., Kandukuri, S. P. R., & Razaque, A. (2016). Node level energy efficiency protocol for Internet of Things. Journal of Theoretical and Computational Science, 3, 140.
23.
go back to reference Alzubi, J. A., Alzubi, O. A., Suseendran, G., & Akila, D. (2019). A novel Chaotic map encryption methodology for image cryptography and secret Communication with steganography. Int J Recent Technol Eng, 8(1C2), 1122–1128. Alzubi, J. A., Alzubi, O. A., Suseendran, G., & Akila, D. (2019). A novel Chaotic map encryption methodology for image cryptography and secret Communication with steganography. Int J Recent Technol Eng, 8(1C2), 1122–1128.
24.
go back to reference Alzubi, O. A., Alzubi, J. A., Dorgham, O., & Alsayyed, M. (2020). Cryptosystem design based on Hermitian curves for IoT security. The Journal of Supercomputing, 76(11), 8566–8589.CrossRef Alzubi, O. A., Alzubi, J. A., Dorgham, O., & Alsayyed, M. (2020). Cryptosystem design based on Hermitian curves for IoT security. The Journal of Supercomputing, 76(11), 8566–8589.CrossRef
25.
go back to reference Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.CrossRef Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.CrossRef
26.
go back to reference Aldabbas, H., & Amin, R. (2021). A novel mechanism to handle address spoofing attacks in SDN based IoT. Cluster Computing, 24(4), 3011–3026.CrossRef Aldabbas, H., & Amin, R. (2021). A novel mechanism to handle address spoofing attacks in SDN based IoT. Cluster Computing, 24(4), 3011–3026.CrossRef
27.
go back to reference Senouci, M. A., Mushtaq, M. S., Hoceini, S., & Mellouk, A. (2016). TOPSIS-based dynamic approach for mobile network interface selection. Computer Networks, 107, 304–314.CrossRef Senouci, M. A., Mushtaq, M. S., Hoceini, S., & Mellouk, A. (2016). TOPSIS-based dynamic approach for mobile network interface selection. Computer Networks, 107, 304–314.CrossRef
28.
go back to reference Fotohi, R., Nazemi, E., & Aliee, F. S. (2020). An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Vehicular Communications, 26, 100267.CrossRef Fotohi, R., Nazemi, E., & Aliee, F. S. (2020). An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Vehicular Communications, 26, 100267.CrossRef
29.
go back to reference Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 219–222). IEEE. Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 219–222). IEEE.
30.
go back to reference Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081–7106.CrossRef Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081–7106.CrossRef
Metadata
Title
Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem
Authors
Tayebeh Sahraneshin
Razieh Malekhosseini
Farhad Rad
S. Hadi Yaghoubyan
Publication date
15-11-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 2/2023
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-022-03169-5

Other articles of this Issue 2/2023

Wireless Networks 2/2023 Go to the issue