Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network

被引:0
作者
Singh, Harmeet [1 ]
Bala, Manju [2 ]
Bamber, Sukhvinder Singh [3 ]
Angurala, Mohit [4 ]
机构
[1] St Baba Bhag Singh Univ, Dept Comp Sci & Engn, Jalandhar, Punjab, India
[2] Khalsa Coll Engn & Technol, Dept Comp Sci & Engn, Amritsar, Punjab, India
[3] Panjab Univ, Dept Comp Sci & Engn, SSG Reg Ctr, Hoshiarpur, Punjab, India
[4] Guru Nanak Dev Univ Coll, Dept Comp Sci, Pathankot, Punjab, India
关键词
Wireless sensor networks; Internet of things; Wormhole attack; Direct trust; Ant colony optimization; WIRELESS; PROTOCOL;
D O I
10.1007/s11277-024-11566-6
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks are always a demanding field, no matter how technology advances in recent times. Energy efficiency and security are the major concerns for such networks. While energy efficiency has been taken care of using clustering techniques by many researchers in the past, those energy-efficient clustering techniques still do not focus on security issues. Many researchers in the past considered trust models for the sensor networks that prioritize the detection of packet-dropping malicious nodes by observing the packet forwarding behavior of the nodes in a promiscuous way. This work focuses on the wormhole attack in clustered WSNs for Internet of Things networks and proposes a bio-inspired Ant Colony Optimization trust model to counter the wormhole attack. The proposed model computes the direct trust of the nodes based on the pheromone concentration rather than packet forwarding behavior to avoid packet loss. The proposed model has been compared with existing techniques based on packet delivery ratio, number of packet drops, throughput, remaining energy of the network, average end-to-end delay, average control overhead, average energy consumption per node, and average jitter. Simulation has been done in network simulator 2.35 and results prove that the proposed model can detect the malicious nodes in an energy-efficient way and also causes fewer packet drops.
引用
收藏
页码:1649 / 1670
页数:22
相关论文
共 24 条
[1]   Implementing MRCRLB technique on modulation schemes in wireless rechargeable sensor networks [J].
Angurala, Mohit ;
Bala, Manju ;
Bamber, Sukhvinder Singh .
EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (04) :473-478
[2]   A novel technique for energy replenishment and load balancing in wireless sensor networks [J].
Angurala, Mohit ;
Bala, Manju ;
Bamber, Sukhvinder Singh .
OPTIK, 2021, 248
[3]  
[Anonymous], 2004, AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00043-X
[4]  
Chiu HS, 2006, INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, P149
[5]  
Eriksson Jakob, 2006, 2006 14th IEEE International Conference on Network Protocols, P75
[6]   Wormhole attack detection techniques in ad-hoc network: A systematic review [J].
Gupta, Chitvan ;
Singh, Laxman ;
Tiwari, Rajdev .
OPEN COMPUTER SCIENCE, 2022, 12 (01) :260-288
[7]   AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks [J].
Hanif, Maria ;
Ashraf, Humaira ;
Jalil, Zakia ;
Jhanjhi, Noor Zaman ;
Humayun, Mamoona ;
Saeed, Saqib ;
Almuhaideb, Abdullah M. .
ELECTRONICS, 2022, 11 (15)
[8]   AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks [J].
Hussain, Sadoon ;
Sami, Ahmed ;
Thasin, Abida ;
Saad, Redhwan M. A. .
APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2022, 2022
[9]  
Jain S, 2012, IEEE ICC, P6699, DOI 10.1109/ICC.2012.6364768
[10]   A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It [J].
Jamshidi, Mojtaba ;
Zangeneh, Ehsan ;
Esnaashari, Mehdi ;
Darwesh, Aso Mohammad ;
Meybodi, Mohammad Reza .
WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (01) :145-173