Skip to main content
Erschienen in: Wireless Personal Communications 2/2022

19.08.2021

Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN

verfasst von: Surinder Singh, Hardeep Singh Saini

Erschienen in: Wireless Personal Communications | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Wireless Senor Networks, security is the most significant issue when sending such an essential message via wireless connection. This helps attackers to access the network and execute several potential attacks to intercept or modify real data/information. Because network sensors do not have routers, the same routing protocol must be split by all the nodes participating in the network to assist each other with packet transmission. In complex topology, its unguided existence often renders it open to all forms of protection attack, presenting a degree of security difficulties. Wormhole is a popular illustration of attacks, due to its difficulties in detecting and stopping, poses the greatest danger. A new routing technique is being presented in this paper which works towards ensuring the secured path for the data transmission. In the research work wormhole type of attack is being considered and the technique works towards the detection and prevention of the defined type of attack. The proposed methodology is validated based on certain performance related parameters for WSN as energy efficiency, delay from end to end, throughput, delivery ratio of packets. The generated outcomes are compared with some recent techniques over the same domain for the efficiency and the presented work has proven to be best among the described techniques for considered parameters. The methodology defined simulated using NS2 for various performance related parameters like energy efficiency, packet loss, throughput, etc.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks, 22(8), 2695–2704.CrossRef Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks, 22(8), 2695–2704.CrossRef
2.
Zurück zum Zitat Pathak, S., Dutta, N., & Jain, S. (2014). An improved cluster maintenance scheme for mobile AdHoc networks. In IEEE 2014 international conference on advances in computing, communications and informatics (pp. 2117–2121). Pathak, S., Dutta, N., & Jain, S. (2014). An improved cluster maintenance scheme for mobile AdHoc networks. In IEEE 2014 international conference on advances in computing, communications and informatics (pp. 2117–2121).
3.
Zurück zum Zitat Pathak, S., & Jain, S. (2017). An optimized stable clustering algorithm for mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2017(1), 1–11.CrossRef Pathak, S., & Jain, S. (2017). An optimized stable clustering algorithm for mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2017(1), 1–11.CrossRef
4.
Zurück zum Zitat Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks-The Journal of Mobile Communication, Computation and Information, 21(8), 1–10. Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks-The Journal of Mobile Communication, Computation and Information, 21(8), 1–10.
5.
Zurück zum Zitat Munir, A., Gordon-Ross, A., & Ranka, S. (2013). Multi-core embedded wireless sensor networks: Architecture and applications. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1553–1562.CrossRef Munir, A., Gordon-Ross, A., & Ranka, S. (2013). Multi-core embedded wireless sensor networks: Architecture and applications. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1553–1562.CrossRef
6.
Zurück zum Zitat Kuorilehto, M., Hännikäinen, M., & Hämäläinen, T. D. (2005). A survey of application distribution in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2005 (5), 859712. Kuorilehto, M., Hännikäinen, M., & Hämäläinen, T. D. (2005). A survey of application distribution in wireless sensor networks. EURASIP Journal on Wireless Communications and Networking, 2005 (5), 859712.
7.
Zurück zum Zitat Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118(1), 789–814. Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118(1), 789–814.
9.
Zurück zum Zitat Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer communications, 30, 2826–2841. Abbasi, A. A., & Younis, M. (2007). A survey on clustering algorithms for wireless sensor networks. Computer communications, 30, 2826–2841.
10.
Zurück zum Zitat Yu, Y., Krishnamachari, B., & Prasanna, V. K. Issues in designing middleware for wireless networks. Department of EE Systems, University of southern California. Yu, Y., Krishnamachari, B., & Prasanna, V. K. Issues in designing middleware for wireless networks. Department of EE Systems, University of southern California.
11.
Zurück zum Zitat Mahalik, N. P. (2007). Sensor networks and configuration: Fundamentals, standards, platforms, and applications. Springer. Mahalik, N. P. (2007). Sensor networks and configuration: Fundamentals, standards, platforms, and applications. Springer.
12.
Zurück zum Zitat Luo, J., & Hubaux J. -P. (2005). Joint mobility and routing for lifetime elongation in wireless sensor networks. IEEE INFOCOM. Luo, J., & Hubaux J. -P. (2005). Joint mobility and routing for lifetime elongation in wireless sensor networks. IEEE INFOCOM.
13.
Zurück zum Zitat Ughade, S., Kapoor, R. K., & Pandey, A. (2014). An overview on wormhole attack in wireless sensor network: Challenges, impacts, and detection approach. International Journal of Recent Development in Engineering and Technology. Ughade, S., Kapoor, R. K., & Pandey, A. (2014). An overview on wormhole attack in wireless sensor network: Challenges, impacts, and detection approach. International Journal of Recent Development in Engineering and Technology.
14.
Zurück zum Zitat Gowthul Alam, M. M., & Baulkani, S. (2017). Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. International Journal of Business Intelligence and Data Mining, 12(3), 299.CrossRef Gowthul Alam, M. M., & Baulkani, S. (2017). Reformulated query-based document retrieval using optimised kernel fuzzy clustering algorithm. International Journal of Business Intelligence and Data Mining, 12(3), 299.CrossRef
15.
Zurück zum Zitat Sundararaj, V. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. The International Journal of Intelligent Systems, 9(3), 117–126.CrossRef Sundararaj, V. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. The International Journal of Intelligent Systems, 9(3), 117–126.CrossRef
16.
Zurück zum Zitat Gowthul Alam, M. M., & Baulkani, S. (2019). Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Computing, 23(4), 1079–1098.CrossRef Gowthul Alam, M. M., & Baulkani, S. (2019). Geometric structure information based multi-objective function to increase fuzzy clustering performance with artificial and real-life data. Soft Computing, 23(4), 1079–1098.CrossRef
17.
Zurück zum Zitat Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325.CrossRef Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325.CrossRef
18.
Zurück zum Zitat Gowthul Alam, M. M., & Baulkani, S. (2019). Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowledge and Information Systems, 60(2), 971–1000.CrossRef Gowthul Alam, M. M., & Baulkani, S. (2019). Local and global characteristics-based kernel hybridization to increase optimal support vector machine performance for stock market prediction. Knowledge and Information Systems, 60(2), 971–1000.CrossRef
19.
Zurück zum Zitat Sundararaj, V., Muthukumar, S., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers & Security, 77, 277–288.CrossRef Sundararaj, V., Muthukumar, S., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers & Security, 77, 277–288.CrossRef
20.
Zurück zum Zitat Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.CrossRef Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.CrossRef
21.
Zurück zum Zitat Sharma, N., & Singh, U. (2014). Various approaches to detect Wormhole attack in wireless sensor networks. A Monthly Journal of Computer Science and technology, IJCSMC, 3(2), 29–33. Sharma, N., & Singh, U. (2014). Various approaches to detect Wormhole attack in wireless sensor networks. A Monthly Journal of Computer Science and technology, IJCSMC, 3(2), 29–33.
22.
Zurück zum Zitat Prakash, R. A., Jeyaseelan, W. S., & Jayasankar, T. (2018). Detection, prevention and mitigation of Wormhole attack in wireless adhoc network by coordinator. Applied Mathematics, 12(1), 233–237.MathSciNet Prakash, R. A., Jeyaseelan, W. S., & Jayasankar, T. (2018). Detection, prevention and mitigation of Wormhole attack in wireless adhoc network by coordinator. Applied Mathematics, 12(1), 233–237.MathSciNet
23.
Zurück zum Zitat Xia, D., & Vlajic, N. (2007). Near-optimal node clustering in wireless sensor networks for environment monitoring. In 21st international conference on advanced information networking and applications (AINA'07). IEEE. Xia, D., & Vlajic, N. (2007). Near-optimal node clustering in wireless sensor networks for environment monitoring. In 21st international conference on advanced information networking and applications (AINA'07). IEEE.
24.
Zurück zum Zitat Murgod, T. R., & Sundaram, S. M. Cluster based detection and reduction techniques to identify wormhole attacks in underwater wireless sensor networks. Murgod, T. R., & Sundaram, S. M. Cluster based detection and reduction techniques to identify wormhole attacks in underwater wireless sensor networks.
25.
Zurück zum Zitat Tamilarasi, N., & Santhi, S. G. (2020). Detection of Wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114(1), 329–345.CrossRef Tamilarasi, N., & Santhi, S. G. (2020). Detection of Wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114(1), 329–345.CrossRef
26.
Zurück zum Zitat Ahmed, A., Bakar, K., Channa, M., & Khan, A. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285.CrossRef Ahmed, A., Bakar, K., Channa, M., & Khan, A. (2016). A secure routing protocol with trust and energy awareness for wireless sensor network. Mobile Networks and Applications, 21(2), 272–285.CrossRef
27.
Zurück zum Zitat Mehetre, D., Roslin, S., & Wagh, S. (2018). Detection and prevention of black hole and selective for- warding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313.CrossRef Mehetre, D., Roslin, S., & Wagh, S. (2018). Detection and prevention of black hole and selective for- warding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313.CrossRef
28.
Zurück zum Zitat AlFarraj, O., AlZubi, A., & Tolba, A. (2018). Trust-based neighbor selection using activation func-tion for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. AlFarraj, O., AlZubi, A., & Tolba, A. (2018). Trust-based neighbor selection using activation func-tion for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing.
29.
Zurück zum Zitat Deepa, C., & Latha, B. (2017). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing. Deepa, C., & Latha, B. (2017). HHSRP: A cluster based hybrid hierarchical secure routing protocol for wireless sensor networks. Cluster Computing.
30.
Zurück zum Zitat Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12, 167.CrossRef Zahedi, A., & Parma, F. (2018). An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks. Peer-to-Peer Networking and Applications, 12, 167.CrossRef
31.
Zurück zum Zitat Mohajerani, A., & Gharavian, D. (2015). An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks. Wireless Networks, 22(8), 2637–2647.CrossRef Mohajerani, A., & Gharavian, D. (2015). An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks. Wireless Networks, 22(8), 2637–2647.CrossRef
32.
Zurück zum Zitat Prabha, V. R., & Latha, P. (2017). Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sadhana, 42(2), 143–151.CrossRef Prabha, V. R., & Latha, P. (2017). Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sadhana, 42(2), 143–151.CrossRef
33.
Zurück zum Zitat Xu, Y., Chen, G., Ford, J., & Makedon, F. (2008). Detecting wormhole attacks in wireless sensor networks. International Federation for Information Processing, 253, 267–279. Xu, Y., Chen, G., Ford, J., & Makedon, F. (2008). Detecting wormhole attacks in wireless sensor networks. International Federation for Information Processing, 253, 267–279.
34.
Zurück zum Zitat Singh, R., Singh, J., & Singh, R. (2016). WRHT: A hybrid technique for detection of wormhole attack in wireless sensor networks. Hindawi Publishing Corporation Mobile Information Systems, 8354930, 1–13. Singh, R., Singh, J., & Singh, R. (2016). WRHT: A hybrid technique for detection of wormhole attack in wireless sensor networks. Hindawi Publishing Corporation Mobile Information Systems, 8354930, 1–13.
35.
Zurück zum Zitat Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. In 7th international conference on communication, computing and virtualization (Vol. 2016, pp. 700–707). Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. In 7th international conference on communication, computing and virtualization (Vol. 2016, pp. 700–707).
36.
Zurück zum Zitat Patel, M. A., & Patel, M. M. (2018). Wormhole attack detection in wireless sensor network. In International conference on inventive research in computing applications (Vol. 2018, pp. 269–274). Patel, M. A., & Patel, M. M. (2018). Wormhole attack detection in wireless sensor network. In International conference on inventive research in computing applications (Vol. 2018, pp. 269–274).
37.
Zurück zum Zitat Kaur, P., Kaur, D., & Mahajan, R. (2017). Wormhole attack detection technique in mobile ad hoc networks. Wireless Personal Communications, 97(2), 2939–2950.CrossRef Kaur, P., Kaur, D., & Mahajan, R. (2017). Wormhole attack detection technique in mobile ad hoc networks. Wireless Personal Communications, 97(2), 2939–2950.CrossRef
38.
Zurück zum Zitat Khokhar, R. H., Ngadi, M. A., & Mandala, S. (2008). A review of current roiuting attacks in mobile ad hoc networks. International journal of computer science and security, 2(3), 18–29. Khokhar, R. H., Ngadi, M. A., & Mandala, S. (2008). A review of current roiuting attacks in mobile ad hoc networks. International journal of computer science and security, 2(3), 18–29.
39.
Zurück zum Zitat Jalil, K. A., Ahmad, Z., & Manan, J. A. (2011). Mitigation of black hole attacks for aodv routing protocol. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(2), 336–343. Jalil, K. A., Ahmad, Z., & Manan, J. A. (2011). Mitigation of black hole attacks for aodv routing protocol. International Journal of New Computer Architectures and their Applications (IJNCAA), 1(2), 336–343.
40.
Zurück zum Zitat Kumar, V., & Miglani, S. G. (2009). Simulation and comparison of AODV and DSR routing protocols in MANETs. Kumar, V., & Miglani, S. G. (2009). Simulation and comparison of AODV and DSR routing protocols in MANETs.
41.
Zurück zum Zitat Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: a MANET routing protocol that can withstand black hole attack. In 2009 international conference on computational intelligence and security (Vol. 2, pp. 421–425). IEEE. Lu, S., Li, L., Lam, K. Y., & Jia, L. (2009). SAODV: a MANET routing protocol that can withstand black hole attack. In 2009 international conference on computational intelligence and security (Vol. 2, pp. 421–425). IEEE.
42.
Zurück zum Zitat Zhu, C., Lee, M. J., & Saadawi, T. (2003). Rtt-based optimal waiting time for best route selection in ad hoc routing protocols. In IEEE military communications conference, 2003. MILCOM 2003 (Vol. 2, pp. 1054–1059). IEEE. Zhu, C., Lee, M. J., & Saadawi, T. (2003). Rtt-based optimal waiting time for best route selection in ad hoc routing protocols. In IEEE military communications conference, 2003. MILCOM 2003 (Vol. 2, pp. 1054–1059). IEEE.
43.
Zurück zum Zitat Khan, K. U. R., Zaman, R. U., Reddy, A. V., Reddy, K. A., & Harsha, T. S. (2008). An efficient DSDV routing protocol for wireless mobile ad hoc networks and its performance comparison. In 2008 Second UKSIM european symposium on computer modeling and simulation (pp. 506–511). IEEE. Khan, K. U. R., Zaman, R. U., Reddy, A. V., Reddy, K. A., & Harsha, T. S. (2008). An efficient DSDV routing protocol for wireless mobile ad hoc networks and its performance comparison. In 2008 Second UKSIM european symposium on computer modeling and simulation (pp. 506–511). IEEE.
44.
Zurück zum Zitat Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.CrossRef Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., & Jamalipour, A. (2007). A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications, 14(5), 85–91.CrossRef
45.
Zurück zum Zitat Kaffashi, E., Mousavi, A., Rahvard, H., Bojnordi, S. H., Khademsadegh, F., & Amirian, S. (2015). A new attack on link-state database in open shortest path first routing protocol. Journal of Electrical and Electronic Engineering, 3(2–1), 39–45.CrossRef Kaffashi, E., Mousavi, A., Rahvard, H., Bojnordi, S. H., Khademsadegh, F., & Amirian, S. (2015). A new attack on link-state database in open shortest path first routing protocol. Journal of Electrical and Electronic Engineering, 3(2–1), 39–45.CrossRef
46.
Zurück zum Zitat Hu, L., & Evans, D. (2004). Using directional antennas to prevent wormhole attacks. In NDSS (Vol. 4, pp. 241–245). Hu, L., & Evans, D. (2004). Using directional antennas to prevent wormhole attacks. In NDSS (Vol. 4, pp. 241–245).
47.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies (IEEE Cat. No. 03CH37428) (Vol. 3, pp. 1976–1986). IEEE. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies (IEEE Cat. No. 03CH37428) (Vol. 3, pp. 1976–1986). IEEE.
Metadaten
Titel
Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN
verfasst von
Surinder Singh
Hardeep Singh Saini
Publikationsdatum
19.08.2021
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2022
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08950-x

Weitere Artikel der Ausgabe 2/2022

Wireless Personal Communications 2/2022 Zur Ausgabe