Skip to main content
Log in

A novel secure DV-Hop localization algorithm against wormhole attacks

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

IoT era and its ubiquitous sensing raise serious security challenges such as wormhole attacks. Given that these attacks may affect the location determination of the employed sensors, security can be seriously compromised. The most common and severe attack is the single wormhole one, which is the focus of this paper. One of the most employed algorithms to approach the sensor location determination is the Distance Vector Hop (DV-Hop) algorithm, which can still be seriously affected from wormhole attacks. To overcome the challenges of this algorithm, this article proposes a novel secure DV-Hop localization algorithm against wormhole attack (ANDV-Hop), where beacon nodes delegate their attacked neighboring nodes to broadcast data messages, and the intersection of communication range of these neighboring nodes does include wormhole nodes. For implicit attacks, close nodes to the wormhole node are selected in order to broadcast data messages, whilst the nodes within the attack range remove beacon nodes at the other end of the link from the neighboring list. For explicit wormhole attack, the algorithm employs a trust model that calculates the comprehensive trust value obtained via a selection reward/punish coefficient. The selected ones within the intersection zone are considered rewarded, whilst the ones to be removed are classified as punished. Experimental results show that the proposed algorithm improves detection success rate, reduces relative localization error and energy loss, showing effectiveness and reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

Data available upon request to the authors.

Code availability

The source code of the implementations used to compute the present results can be obtained by contacting corresponding authors.

References

  1. Cui, M., Han, D., Wang, J., Li, K.-C., & Chang, C.-C. (2020). ARFV: An efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815–15827. https://doi.org/10.1109/TVT.2020.3036631

    Article  Google Scholar 

  2. Chen, P., Han, D., Weng, T., et al. (2021). A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. Journal of Information Security and Applications, 59, 102821.

    Article  Google Scholar 

  3. Cui, M., Han, D., & Wang, J. (2019). An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet of Things Journal, 6(5), 9076–9084. https://doi.org/10.1109/JIOT.2019.2927497

    Article  Google Scholar 

  4. Labraoui, N., Aliouat, M., & Gueroui, M. (2012). Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 23(4), 303–316.

    Article  Google Scholar 

  5. Liang, W., Huang, W., Long, J., et al. (2020). Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal, 7(7), 6392–6401.

    Article  Google Scholar 

  6. Han, D., Wang, J., Tang, C., et al. (2021). A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization. International Journal of Communication Systems, 34(14), e4924.

    Article  Google Scholar 

  7. Fan, Y., Wu, G., Li, K., et al. (2022). Robust end hopping for secure satellite communication in moving target defense. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2022.3144971

    Article  Google Scholar 

  8. Liang, W., Li, K., Long, J., et al. (2020). An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Transactions on Industrial Informatics, 16(3), 2063–2071.

    Article  Google Scholar 

  9. Chen, J., Wang, S., Ouyang, M., et al. (2019). Iterative positioning algorithm for indoor node based on distance correction in WSNs. Sensors, 19(22), 4871.

    Article  Google Scholar 

  10. Liang, W., Li, Y., Xie, K., et al. (2022). Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2022.3156266

    Article  Google Scholar 

  11. Aliady, W. A., & Al-Ahmadi, S. A. (2019). Energy preserving secure measure against wormhole attack in wireless sensor networks. IEEE Access, 7, 84132–84141.

    Article  Google Scholar 

  12. Devi, P. P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316–322.

    Article  Google Scholar 

  13. Farjamnia, G., Gasimov, Y., & Kazimov, C. (2019). Review of the techniques against the wormhole attacks on wireless sensor networks. Wireless Personal Communications, 105, 1561–1584.

    Article  Google Scholar 

  14. Han, D., Pan, N., & Li, K. (2022). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1), 316–327.

    Article  Google Scholar 

  15. Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 99, 1–1.

    Google Scholar 

  16. Xiao, L., Han, D., Meng, X., et al. (2020). A secure framework for data sharing in private blockchain-based WBANs. IEEE Access, 8, 153956–153968.

    Article  Google Scholar 

  17. Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., & Li, K.-C. (2020). A Blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Transactions on Industrial Informatics, 18(3), 3530–3540.

    Google Scholar 

  18. Xu, J., Han, D., et al. (2020). A K-means algorithm based on characteristics of density applied to network intrusion detection. Computer Science and Information Systems, 17(2), 665–687.

    Article  Google Scholar 

  19. Tian, Q., Han, D., Li, K. C., et al. (2020). An intrusion detection approach based on improved deep belief network. Applied Intelligence, 50, 3162–3178.

    Article  Google Scholar 

  20. Zhang, W., Han, D., Li, K. C., et al. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361–12374.

    Article  Google Scholar 

  21. Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In: Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence).

  22. Verma, R., Sharma, R., & Singh, U. (2017). New approach through detection and prevention of wormhole attack in manet. pp. 526–531.

  23. Ji, C. (2015). Research on location algorithm of non-ranging nodes in wireless sensor networks. PhD thesis, Jiangxi University of Science and Technology.

  24. Liu, G., Qian, Z., & Wang, X. (2019). An improved DV-Hop localization algorithm based on hop distances correction. Communications, China.

  25. Ghafour, M., Kamel, S. H., & Abouelseoud, Y. (2021). Improved DV-Hop based on squirrel search algorithm for localization in wireless sensor networks. Wireless Networks, 27, 2743–2759.

    Article  Google Scholar 

  26. Kaushik, A., Lobiyal, D. K., & Kumar, S. (2021). Improved 3-dimensional DV-Hop localization algorithm based on information of nearby nodes. Wireless Networks, 27, 1801–1819.

    Article  Google Scholar 

  27. Huang, X., Han, D., Cui, M., Lin, G., & Yin, X. (2021). Three-Dimensional localization algorithm based on improved a and DV-Hop algorithms in wireless sensor network. Sensors, 21(2), 448.

    Article  Google Scholar 

  28. Han, D., Yu, Y., Li, K. C., & Mello, R. (2020). Enhancing the sensor node localization algorithm based on improved DV-Hop and DE algorithms in wireless sensor networks. Sensors, 20(2), 343.

    Article  Google Scholar 

  29. Kairen, C. (2018). Research on wormhole detecting scheme based on hierarchy structure in WSN. PhD thesis, Liaoning University, China.

  30. Li, J., Wang, D., & Wang, Y. (2017). Security DV-Hop localization algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68–75.

    Article  Google Scholar 

  31. Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16(Part A), 22–35.

    Article  Google Scholar 

  32. Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A realtime intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840–847.

    Article  Google Scholar 

  33. Luo, X., Chen, Y., Miao, L., Qian, L., & Kang, X. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194–18205.

    Article  Google Scholar 

  34. Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114, 329–345.

    Article  Google Scholar 

  35. Ping, D., & Hongjiang, Z. (2015). A DV-Hop localization algorithm for wormhole resistance in wireless sensor networks. Journal of Southwest Jiaotong University, 50(1), 51–57.

    Google Scholar 

  36. Li, J., & Wang, D. (2019). The security DV-Hop algorithm against multiple-wormhole node link in WSN. KSII Transactions on Internet and Information Systems, 13(4), 2223–2242.

    Google Scholar 

  37. Zhu, X., Li, K., Zhang, J., et al. (2019). Distributed reliable and efficient transmission task assignment for WSNs. Sensors, 19(22), 5028.

    Article  Google Scholar 

  38. Zhengfei, D. (2018). Research on attackresistant secure localization algorithm for wireless sensor networks. PhD thesis, Southwest Jiaotong University.

  39. Yahui, F. (2020). Research on trust model of wireless sensor network based on recommendation and risk control. PhD thesis, South China University of Technology..

  40. Tang, C., Han, D., & Wang, J. (2020). A low resource consumption clone detection method for multi base station wireless sensor networks. IEEE Access, 8, 128349–128361.

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China under Grant 61873160 and Grant 61672338, Natural Science Foundation of Shanghai under Grant 21ZR1426500.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuan-Ching Li.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, D., Liu, M., Weng, TH. et al. A novel secure DV-Hop localization algorithm against wormhole attacks. Telecommun Syst 80, 413–430 (2022). https://doi.org/10.1007/s11235-022-00914-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-022-00914-1

Keywords

Navigation