Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

被引:17
作者
Shahid, Hafsa [1 ]
Ashraf, Humaira [1 ]
Javed, Hafsa [1 ]
Humayun, Mamoona [2 ]
Jhanjhi, Nz [3 ]
AlZain, Mohammed A. [4 ]
机构
[1] Int Islamic Univ Islamabad, Dept Comp Sci & Software Engn, Islamabad, Pakistan
[2] Jouf Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Jouf, Saudi Arabia
[3] Taylors Univ, Sch Comp Sci & Engn SCE, Subang Jaya, Selangor, Malaysia
[4] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, At Taif 21944, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 68卷 / 02期
关键词
IoT; Internet of Things; energy; wormhole; WSN; wireless sensor networks; LOCALIZATION;
D O I
10.32604/cmc.2021.015259
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.
引用
收藏
页码:1966 / 1980
页数:15
相关论文
共 39 条
[21]   A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications [J].
Machado, Kassio ;
Rosario, Denis ;
Cerqueira, Eduardo ;
Loureiro, Antonio A. F. ;
Neto, Augusto ;
de Souza, Jose Neuman .
SENSORS, 2013, 13 (02) :1942-1964
[22]  
Maidamwar P., 2012, INT J ADHOC NETWORKI, V2, P37, DOI DOI 10.5121/IJANS.2012.2404
[23]  
Minohara T., 2016, P INT C EMBE WIR SYS, P281
[24]   Scalable and Distributed Detection Anaysis on Wormhole Links in Wireless Sensor Networks for Networked Systems [J].
Padmanabhan, Jayashree ;
Manickavasagam, Venkatesh .
IEEE ACCESS, 2018, 6 :1753-1763
[25]  
Patel Manish, 2019, Advances in Computer Communication and Computational Sciences. Proceedings of IC4S 2017. Advances in Intelligent Systems and Computing (AISC 760), P463, DOI 10.1007/978-981-13-0344-9_39
[26]  
Patel M., 2016, INT J ADHOC NETWORKI, V6, P1, DOI [10.5121/ijans.2016.6101, DOI 10.5121/IJANS.2016.6101]
[27]   The limitations in the state-of-the-art counter-measures against the security threats in H-IoT [J].
Qadri, Yazdan Ahmad ;
Ali, Rashid ;
Musaddiq, Arslan ;
Al-Turjman, Fadi ;
Kim, Dae Wan ;
Kim, Sung Won .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03) :2047-2065
[28]  
Sahoo G., 2018, BIOMIMETICS BIOINSPI
[29]  
Scholar M. T., 2020, INT J SCI RES ENG TR, V6, P440
[30]  
Shaon M. N. A., 2015, P INT C WIR NETW ICW, P115