Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Usually, resource-constrained sensors operate unattended in an infrastructure-less environment. It attracts various active and passive attacks where wormhole attack gains prime attention due to its effortless implementation in comparison to its devastating effect on localization schemes. Further, an implicit wormhole with a single tunnel makes it difficult to uncover it. A wormhole disturbs hop counts erratically among the sensor pairs which in turn destroys most of the localization algorithms like DV-Hop and its various successors. Therefore, an algorithm is required to detect anomalous sensors as outliers and remove them from participating as reference points in localization. Thus, in this paper, a secure optimized localization in large-scale WSN (SOLLW) is proposed where outliers are detected and removed by using a one-class support vector machine. Further, SOLLW recovers location through linear optimization by introducing error factors in distance values between every sensor pair. The simulation validates SOLLW in comparison to other algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Data availability statement

Data sharing not applicable to this article.

References

  1. Kumar S, Batra N, Kumar S (2022) Optimized localization in large-scale heterogeneous WSN. J Supercomput 1–25. https://doi.org/10.1007/S11227-022-04922-5/METRICS

  2. Almuzaini KK et al (2023) Optimization of the operational state’s routing for mobile wireless sensor networks. Wirel Networks 1–15. https://doi.org/10.1007/S11276-023-03246-3/METRICS

  3. Tagne Fute E, Nyabeye Pangop DK, Tonye E (2022) A new hybrid localization approach in wireless sensor networks based on particle swarm optimization and tabu search. Appl Intell 53(7):7546–7561. https://doi.org/10.1007/S10489-022-03872-Y/METRICS

  4. Rayar V, Naik U, Manage PS (2023) A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. Peer-to-Peer Netw Appl 1–15. https://doi.org/10.1007/S12083-023-01476-Y/METRICS.

  5. de Oliveira LL, Eisenkraemer GH, Carara EA, Martins JB, Monteiro J (2021) Mobile Localization Techniques for Wireless Sensor Networks: Survey and Recommendations. ACM Trans Sens Networks. https://doi.org/10.1145/3561512

    Article  Google Scholar 

  6. Kumar S, Kumar S, Garg R (2023) Range-free localization for GWSN using k-NN algorithm with local linear Gaussian kernel regression (KGR). Evol Syst 14(1):85–100. https://doi.org/10.1007/s12530-022-09436-2

    Article  MathSciNet  Google Scholar 

  7. Mani R, Rios-Navarro A, Sevillano-Ramos J-L, Liouane N (2023) Improved 3D localization algorithm for large scale wireless sensor networks. Wirel Networks 2023:1–16. https://doi.org/10.1007/S11276-023-03265-0

    Article  Google Scholar 

  8. Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13(2):579–589. https://doi.org/10.1007/S12083-019-00739-X/METRICS

    Article  MathSciNet  Google Scholar 

  9. Zhang Q, Chen D, Mahajan Y, Chen IR, Ha DS, Cho JH (2023) Attack-Resistant, Energy-Adaptive Monitoring for Smart Farms: Uncertainty-Aware Deep Reinforcement Learning Approach. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3287069

    Article  Google Scholar 

  10. Dwivedi SK, Amin R, Vollala S (2022) Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer-to-Peer Netw Appl 16(1):1–21. https://doi.org/10.1007/S12083-022-01376-7/METRICS

    Article  Google Scholar 

  11. Chen Z et al (2022) Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. ACM Comput Surv 55(5). https://doi.org/10.1145/3530812.

  12. Dhanaraj RK, Islam SH, Rajasekar V (2022) A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wirel Networks 28(7):3127–3142. https://doi.org/10.1007/S11276-022-03017-6/METRICS

    Article  Google Scholar 

  13. Shirafkan M, Shahidienjad A, Ghobaei-Arani M (2022) An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw Appl 15(1):484–502. https://doi.org/10.1007/S12083-021-01255-7/METRICS

    Article  Google Scholar 

  14. Maurya P, Kushwaha V (2023) Impact Analysis of Hello Flood Attack on RPL. Commun Comput Inf Sci 1798 CCIS 554–568. https://doi.org/10.1007/978-3-031-28183-9_39/COVER

  15. Garg R, Gulati T (2023) “Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs”, in. International Conference on Advancement in Computation & Computer Technologies (InCACCT) 2023:628–633. https://doi.org/10.1109/InCACCT57535.2023.10141721

    Article  Google Scholar 

  16. Hanif M et al (2022) AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks. Electron 11(15):2324. https://doi.org/10.3390/ELECTRONICS11152324

  17. Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou H (2022) PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int J Intell Syst 37(2):1204–1221. https://doi.org/10.1002/INT.22666

    Article  Google Scholar 

  18. Niculescu B, Nath D (2001) Ad-Hoc positioning systems in Proceedings of IEEE GLOBECOM ’01 2926–2931. https://doi.org/10.1109/GLOCOM.2001.965964

  19. Lalama Z, Boulfekhar S, Semechedine F (2021) Localization Optimization in WSNs Using Meta-Heuristics Optimization Algorithms: A Survey Wirel Pers Commun 1222, vol. 122, no. 2, pp. 1197–1220. https://doi.org/10.1007/S11277-021-08945-8

  20. Kaur A, Gupta GP, Mittal S (2021) Comparative Study of the Different Variants of the DV ‑ Hop Based Node Localization Algorithms for Wireless Sensor 123:0123456789. Springer US. https://doi.org/10.1007/s11277-021-09206-4

  21. Han D et al (2022) A novel secure DV-Hop localization algorithm against wormhole attacks. Telecommun Syst 803, vol. 80, no. 3, pp. 413–430. https://doi.org/10.1007/S11235-022-00914-1

  22. Inderst F, Oliva G, Panzieri S, Pascucci F, Setola R (2018) Faulty or malicious anchor detection criteria for distance-based localization. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 10707 LNCS 229–240. https://doi.org/10.1007/978-3-319-99843-5_21/COVER

  23. Jadoon RN, Awan AA, Khan MA, Zhou WY, Shahzad A, Hou-Sheng S (2020) An Efficient Nodes Failure Recovery Management Algorithm for Mobile Sensor Networks. Math Probl Eng vol. 2020. https://doi.org/10.1155/2020/1749467

  24. Geng X, Zhang B (2023) Deep Q-Network-based Intelligent Routing Protocol for Underwater Acoustic Sensor Network. IEEE Sens J 1–1. https://doi.org/10.1109/JSEN.2023.3234112

  25. Kaliyar P, Ben Jaballah W, Conti M, Lal C (2020) LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput Secur 94:101849. https://doi.org/10.1016/j.cose.2020.101849

  26. Xu Y (2008) Anchor-Free Localization in Mixed Wireless Sensor Network Systems. Dartmouth Coll Ph.D Diss Accessed: Aug. 28, 2023 [Online] Available: https://digitalcommons.dartmouth.edu/dissertations/24

  27. Xu Y, Ouyang Y, Le Z, Ford J, Makedon F (2007) Analysis of Range-Free Anchor-Free Localization in a Wsn under Wormhole Attack in Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. 344–351. https://doi.org/10.1145/1298126.1298185.

  28. Pandey OJ, Mahajan A, Hegde RM (2018) Joint Localization and Data Gathering Over a Small-World WSN With Optimal Data MULE Allocation. IEEE Trans Veh Technol 67(7):6518–6532. https://doi.org/10.1109/TVT.2018.2805921

    Article  Google Scholar 

  29. Pandey OJ, Gautam V, Jha S, Shukla MK, Hegde RM (2020) Time Synchronized Node Localization Using Optimal H-Node Allocation in a Small World WSN. IEEE Commun Lett 24(11):2579–2583. https://doi.org/10.1109/LCOMM.2020.3008086

    Article  Google Scholar 

  30. Chen C, Tong F, Zhang Y, Zhu Z (2022) A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network in 2022 13th Asian Control Conference (ASCC) 1983–1988. https://doi.org/10.23919/ASCC56756.2022.9828159

  31. Thangavel K, Gayathri Lakshmi M, Priya SS, Srinivasan S (2022) Detecting and Securing Internet of Things from Wormhole attacks in a Wireless Sensor Networks in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) 507–512. https://doi.org/10.1109/ICICCS53718.2022.9788395

  32. Kuo S-Y, Tseng F-H, Chou Y-H (2023) Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Futur Gener Comput Syst 143:179–190. https://doi.org/10.1016/j.future.2023.01.017

    Article  Google Scholar 

  33. Banihashemian SS, Adibnia F (2022) A Novel Robust Soft-Computed Range-Free Localization Algorithm Against Malicious Anchor Nodes. 13(4):992–1007. Accessed: Sep. 01, 2022. [Online]. Available: https://link.springer.com/article/https://doi.org/10.1007/s12559-021-09879-w

  34. Garg R, Gulati T, Kumar S (2023) Range free localization in WSN against wormhole attack using Farkas’ Lemma. Wirel Networks 1–15. https://doi.org/10.1007/S11276-023-03279-8/METRICS

  35. Todkar SS, Baltazart V, Ihamouten A, Dérobert X, Guilbert D (2021) One-class SVM based outlier detection strategy to detect thin interlayer debondings within pavement structures using Ground Penetrating Radar data.  J Appl Geophys  192:104392. https://doi.org/10.1016/J.JAPPGEO.2021.104392.

  36. Kumar S, Kumar S, Batra N (2021) Optimized Distance Range Free Localization Algorithm for WSN. Wirel Pers Commun 117(3):1879–1907. https://doi.org/10.1007/s11277-020-07950-7

    Article  Google Scholar 

  37. Taylor JR (1997) An Introduction to Error Analysis: The Study of Uncertainties in Physical Measurements. University Science Books. [Online]. Available: https://books.google.co.in/books?id=ypNnQgAACAAJ

  38. Chou H-Y, Lin P-Y, Lin C-J (2020) Dual Coordinate-Descent Methods for Linear One-Class SVM and SVDD in Proceedings of the 2020 SIAM International Conference on Data Mining (SDM). 181–189. https://doi.org/10.1137/1.9781611976236.21

  39. Karmarkar N (1984) A new polynomial-time algorithm for linear programming. Proc Annu ACM Symp Theory Comput 302–311. https://doi.org/10.1145/800057.808695

  40. Coppersmith D, Winograd S (1990) Matrix multiplication via arithmetic progressions. J Symb Comput 9(3):251–280. https://doi.org/10.1016/S0747-7171(08)80013-2

    Article  MathSciNet  MATH  Google Scholar 

  41. Barr KC, Asanović K (2006) Energy-aware lossless data compression. ACM Trans Comput Syst 24(3):250–291. https://doi.org/10.1145/1151690.1151692

    Article  Google Scholar 

  42. Chatterjee B et al (2021) Context-Aware Collaborative Intelligence with Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed. IEEE Internet Things J 8(8):6800–6814. https://doi.org/10.1109/JIOT.2020.3036087

    Article  Google Scholar 

  43. Uhlig H (1996) A law of large numbers for large economies. Econ Theory 8(1):41–50. https://doi.org/10.1007/BF01212011/METRICS

    Article  MathSciNet  MATH  Google Scholar 

  44. Emakoua A (2023) A SIR Stochastic Epidemic Model in Continuous Space: Law of Large Numbers and Central Limit Theorem. Accessed: Jul. 09, 2023 [Online]. Available: https://arxiv.org/abs/2301.02343v1

  45. Rappaport TS (2010) Wireless Communications: Principles And Practice, 2/E. Pearson Education [Online] Available: https://books.google.co.in/books?id=VmPT8B-5%5C_tAC

Download references

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Sumit Kumar.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to participate

All the authors involved have agreed to participate in this submitted article.

Consent to publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Conflict of interest

Authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Garg, R., Gulati, T. & Kumar, S. Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 16, 2833–2849 (2023). https://doi.org/10.1007/s12083-023-01563-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-023-01563-0

Keywords

Navigation