Abstract
IoT era and its ubiquitous sensing raise serious security challenges such as wormhole attacks. Given that these attacks may affect the location determination of the employed sensors, security can be seriously compromised. The most common and severe attack is the single wormhole one, which is the focus of this paper. One of the most employed algorithms to approach the sensor location determination is the Distance Vector Hop (DV-Hop) algorithm, which can still be seriously affected from wormhole attacks. To overcome the challenges of this algorithm, this article proposes a novel secure DV-Hop localization algorithm against wormhole attack (ANDV-Hop), where beacon nodes delegate their attacked neighboring nodes to broadcast data messages, and the intersection of communication range of these neighboring nodes does include wormhole nodes. For implicit attacks, close nodes to the wormhole node are selected in order to broadcast data messages, whilst the nodes within the attack range remove beacon nodes at the other end of the link from the neighboring list. For explicit wormhole attack, the algorithm employs a trust model that calculates the comprehensive trust value obtained via a selection reward/punish coefficient. The selected ones within the intersection zone are considered rewarded, whilst the ones to be removed are classified as punished. Experimental results show that the proposed algorithm improves detection success rate, reduces relative localization error and energy loss, showing effectiveness and reliability.
Similar content being viewed by others
Data availability
Data available upon request to the authors.
Code availability
The source code of the implementations used to compute the present results can be obtained by contacting corresponding authors.
References
Cui, M., Han, D., Wang, J., Li, K.-C., & Chang, C.-C. (2020). ARFV: An efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815–15827. https://doi.org/10.1109/TVT.2020.3036631
Chen, P., Han, D., Weng, T., et al. (2021). A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. Journal of Information Security and Applications, 59, 102821.
Cui, M., Han, D., & Wang, J. (2019). An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet of Things Journal, 6(5), 9076–9084. https://doi.org/10.1109/JIOT.2019.2927497
Labraoui, N., Aliouat, M., & Gueroui, M. (2012). Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 23(4), 303–316.
Liang, W., Huang, W., Long, J., et al. (2020). Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal, 7(7), 6392–6401.
Han, D., Wang, J., Tang, C., et al. (2021). A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization. International Journal of Communication Systems, 34(14), e4924.
Fan, Y., Wu, G., Li, K., et al. (2022). Robust end hopping for secure satellite communication in moving target defense. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2022.3144971
Liang, W., Li, K., Long, J., et al. (2020). An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Transactions on Industrial Informatics, 16(3), 2063–2071.
Chen, J., Wang, S., Ouyang, M., et al. (2019). Iterative positioning algorithm for indoor node based on distance correction in WSNs. Sensors, 19(22), 4871.
Liang, W., Li, Y., Xie, K., et al. (2022). Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2022.3156266
Aliady, W. A., & Al-Ahmadi, S. A. (2019). Energy preserving secure measure against wormhole attack in wireless sensor networks. IEEE Access, 7, 84132–84141.
Devi, P. P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316–322.
Farjamnia, G., Gasimov, Y., & Kazimov, C. (2019). Review of the techniques against the wormhole attacks on wireless sensor networks. Wireless Personal Communications, 105, 1561–1584.
Han, D., Pan, N., & Li, K. (2022). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1), 316–327.
Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 99, 1–1.
Xiao, L., Han, D., Meng, X., et al. (2020). A secure framework for data sharing in private blockchain-based WBANs. IEEE Access, 8, 153956–153968.
Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., & Li, K.-C. (2020). A Blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Transactions on Industrial Informatics, 18(3), 3530–3540.
Xu, J., Han, D., et al. (2020). A K-means algorithm based on characteristics of density applied to network intrusion detection. Computer Science and Information Systems, 17(2), 665–687.
Tian, Q., Han, D., Li, K. C., et al. (2020). An intrusion detection approach based on improved deep belief network. Applied Intelligence, 50, 3162–3178.
Zhang, W., Han, D., Li, K. C., et al. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374.
Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In: Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence).
Verma, R., Sharma, R., & Singh, U. (2017). New approach through detection and prevention of wormhole attack in manet. pp. 526–531.
Ji, C. (2015). Research on location algorithm of non-ranging nodes in wireless sensor networks. PhD thesis, Jiangxi University of Science and Technology.
Liu, G., Qian, Z., & Wang, X. (2019). An improved DV-Hop localization algorithm based on hop distances correction. Communications, China.
Ghafour, M., Kamel, S. H., & Abouelseoud, Y. (2021). Improved DV-Hop based on squirrel search algorithm for localization in wireless sensor networks. Wireless Networks, 27, 2743–2759.
Kaushik, A., Lobiyal, D. K., & Kumar, S. (2021). Improved 3-dimensional DV-Hop localization algorithm based on information of nearby nodes. Wireless Networks, 27, 1801–1819.
Huang, X., Han, D., Cui, M., Lin, G., & Yin, X. (2021). Three-Dimensional localization algorithm based on improved a and DV-Hop algorithms in wireless sensor network. Sensors, 21(2), 448.
Han, D., Yu, Y., Li, K. C., & Mello, R. (2020). Enhancing the sensor node localization algorithm based on improved DV-Hop and DE algorithms in wireless sensor networks. Sensors, 20(2), 343.
Kairen, C. (2018). Research on wormhole detecting scheme based on hierarchy structure in WSN. PhD thesis, Liaoning University, China.
Li, J., Wang, D., & Wang, Y. (2017). Security DV-Hop localization algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68–75.
Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16(Part A), 22–35.
Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A realtime intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840–847.
Luo, X., Chen, Y., Miao, L., Qian, L., & Kang, X. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194–18205.
Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114, 329–345.
Ping, D., & Hongjiang, Z. (2015). A DV-Hop localization algorithm for wormhole resistance in wireless sensor networks. Journal of Southwest Jiaotong University, 50(1), 51–57.
Li, J., & Wang, D. (2019). The security DV-Hop algorithm against multiple-wormhole node link in WSN. KSII Transactions on Internet and Information Systems, 13(4), 2223–2242.
Zhu, X., Li, K., Zhang, J., et al. (2019). Distributed reliable and efficient transmission task assignment for WSNs. Sensors, 19(22), 5028.
Zhengfei, D. (2018). Research on attackresistant secure localization algorithm for wireless sensor networks. PhD thesis, Southwest Jiaotong University.
Yahui, F. (2020). Research on trust model of wireless sensor network based on recommendation and risk control. PhD thesis, South China University of Technology..
Tang, C., Han, D., & Wang, J. (2020). A low resource consumption clone detection method for multi base station wireless sensor networks. IEEE Access, 8, 128349–128361.
Acknowledgements
This research is supported by the National Natural Science Foundation of China under Grant 61873160 and Grant 61672338, Natural Science Foundation of Shanghai under Grant 21ZR1426500.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Han, D., Liu, M., Weng, TH. et al. A novel secure DV-Hop localization algorithm against wormhole attacks. Telecommun Syst 80, 413–430 (2022). https://doi.org/10.1007/s11235-022-00914-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-022-00914-1