Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks

被引:1
作者
Garg, Ruchi [1 ]
Gulati, Tarun [1 ]
Kumar, Sumit [2 ]
机构
[1] Maharishi Markandeshwar Deemed to be Univ, Maharishi Markandeshwar Engn Coll, Dept Elect & Commun Engn, Ambala 133207, Haryana, India
[2] Maharishi Markandeshwar Deemed to be Univ, Maharishi Markandeshwar Engn Coll, Dept Comp Sci & Engn, Ambala 133207, Haryana, India
基金
英国科研创新办公室;
关键词
Localization; WSN; OCSVM; Range free; Wormhole attack;
D O I
10.1007/s12083-023-01563-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Usually, resource-constrained sensors operate unattended in an infrastructure-less environment. It attracts various active and passive attacks where wormhole attack gains prime attention due to its effortless implementation in comparison to its devastating effect on localization schemes. Further, an implicit wormhole with a single tunnel makes it difficult to uncover it. A wormhole disturbs hop counts erratically among the sensor pairs which in turn destroys most of the localization algorithms like DV-Hop and its various successors. Therefore, an algorithm is required to detect anomalous sensors as outliers and remove them from participating as reference points in localization. Thus, in this paper, a secure optimized localization in large-scale WSN (SOLLW) is proposed where outliers are detected and removed by using a one-class support vector machine. Further, SOLLW recovers location through linear optimization by introducing error factors in distance values between every sensor pair. The simulation validates SOLLW in comparison to other algorithms.
引用
收藏
页码:2833 / 2849
页数:17
相关论文
共 45 条
[1]  
Almuzaini KKet, 2023, WIREL NETW, DOI [10.1007/S11276-023-03246-3/METRICS, DOI 10.1007/S11276-023-03246-3/METRICS]
[2]  
BanihashemianSS Adibnia F, 2022, NOVEL ROBUST SOFT CO, V13, P992, DOI [10.1007/s12559-021-09879-w, DOI 10.1007/S12559-021-09879-W]
[3]   Energy-aware lossless data compression [J].
Barr, Kenneth C. ;
Asanovic, Krste .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2006, 24 (03) :250-291
[4]   Context-Aware Collaborative Intelligence With Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed [J].
Chatterjee, Baibhab ;
Dong-Hyun Seo ;
Chakraborty, Shramana ;
Avlani, Shitij ;
Jiang, Xiaofan ;
Zhang, Heng ;
Abdallah, Mustafa ;
Raghunathan, Nithin ;
Mousoulis, Charilaos ;
Shakouri, Ali ;
Bagchi, Saurabh ;
Peroulis, Dimitrios ;
Sen, Shreyas .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) :6800-6814
[5]  
Chen C, 2022, 2022 13 ASIAN CONTRO, P1983, DOI [10.23919/ASCC56756.2022.9828159, DOI 10.23919/ASCC56756.2022.9828159]
[6]   PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs [J].
Chen, Yuling ;
Sun, Jing ;
Yang, Yixian ;
Li, Tao ;
Niu, Xinxin ;
Zhou, Huiyu .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (02) :1204-1221
[7]   Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats [J].
Chen, Zhiyan ;
Liu, Jinxin ;
Shen, Yu ;
Simsek, Murat ;
Kantarci, Burak ;
Mouftah, Hussein T. ;
Djukic, Petar .
ACM COMPUTING SURVEYS, 2023, 55 (05)
[8]   Dual Coordinate-Descent Methods for Linear One-Class SVM and SVDD [J].
Chou, Hung-Yi ;
Lin, Pin-Yen ;
Lin, Chih-Jen .
PROCEEDINGS OF THE 2020 SIAM INTERNATIONAL CONFERENCE ON DATA MINING (SDM), 2020, :181-189
[9]   MATRIX MULTIPLICATION VIA ARITHMETIC PROGRESSIONS [J].
COPPERSMITH, D ;
WINOGRAD, S .
JOURNAL OF SYMBOLIC COMPUTATION, 1990, 9 (03) :251-280
[10]   Mobile Localization Techniques for Wireless Sensor Networks: Survey and Recommendations [J].
de Oliveira, Leonardo L. ;
Eisenkraemer, Gabriel H. ;
Carara, Everton A. ;
Martins, Joao B. ;
Monteiro, Jose .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (02)