Abstract
Usually, resource-constrained sensors operate unattended in an infrastructure-less environment. It attracts various active and passive attacks where wormhole attack gains prime attention due to its effortless implementation in comparison to its devastating effect on localization schemes. Further, an implicit wormhole with a single tunnel makes it difficult to uncover it. A wormhole disturbs hop counts erratically among the sensor pairs which in turn destroys most of the localization algorithms like DV-Hop and its various successors. Therefore, an algorithm is required to detect anomalous sensors as outliers and remove them from participating as reference points in localization. Thus, in this paper, a secure optimized localization in large-scale WSN (SOLLW) is proposed where outliers are detected and removed by using a one-class support vector machine. Further, SOLLW recovers location through linear optimization by introducing error factors in distance values between every sensor pair. The simulation validates SOLLW in comparison to other algorithms.
Similar content being viewed by others
Data availability statement
Data sharing not applicable to this article.
References
Kumar S, Batra N, Kumar S (2022) Optimized localization in large-scale heterogeneous WSN. J Supercomput 1–25. https://doi.org/10.1007/S11227-022-04922-5/METRICS
Almuzaini KK et al (2023) Optimization of the operational state’s routing for mobile wireless sensor networks. Wirel Networks 1–15. https://doi.org/10.1007/S11276-023-03246-3/METRICS
Tagne Fute E, Nyabeye Pangop DK, Tonye E (2022) A new hybrid localization approach in wireless sensor networks based on particle swarm optimization and tabu search. Appl Intell 53(7):7546–7561. https://doi.org/10.1007/S10489-022-03872-Y/METRICS
Rayar V, Naik U, Manage PS (2023) A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. Peer-to-Peer Netw Appl 1–15. https://doi.org/10.1007/S12083-023-01476-Y/METRICS.
de Oliveira LL, Eisenkraemer GH, Carara EA, Martins JB, Monteiro J (2021) Mobile Localization Techniques for Wireless Sensor Networks: Survey and Recommendations. ACM Trans Sens Networks. https://doi.org/10.1145/3561512
Kumar S, Kumar S, Garg R (2023) Range-free localization for GWSN using k-NN algorithm with local linear Gaussian kernel regression (KGR). Evol Syst 14(1):85–100. https://doi.org/10.1007/s12530-022-09436-2
Mani R, Rios-Navarro A, Sevillano-Ramos J-L, Liouane N (2023) Improved 3D localization algorithm for large scale wireless sensor networks. Wirel Networks 2023:1–16. https://doi.org/10.1007/S11276-023-03265-0
Hong S (2020) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Netw Appl 13(2):579–589. https://doi.org/10.1007/S12083-019-00739-X/METRICS
Zhang Q, Chen D, Mahajan Y, Chen IR, Ha DS, Cho JH (2023) Attack-Resistant, Energy-Adaptive Monitoring for Smart Farms: Uncertainty-Aware Deep Reinforcement Learning Approach. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2023.3287069
Dwivedi SK, Amin R, Vollala S (2022) Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer-to-Peer Netw Appl 16(1):1–21. https://doi.org/10.1007/S12083-022-01376-7/METRICS
Chen Z et al (2022) Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats. ACM Comput Surv 55(5). https://doi.org/10.1145/3530812.
Dhanaraj RK, Islam SH, Rajasekar V (2022) A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments. Wirel Networks 28(7):3127–3142. https://doi.org/10.1007/S11276-022-03017-6/METRICS
Shirafkan M, Shahidienjad A, Ghobaei-Arani M (2022) An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw Appl 15(1):484–502. https://doi.org/10.1007/S12083-021-01255-7/METRICS
Maurya P, Kushwaha V (2023) Impact Analysis of Hello Flood Attack on RPL. Commun Comput Inf Sci 1798 CCIS 554–568. https://doi.org/10.1007/978-3-031-28183-9_39/COVER
Garg R, Gulati T (2023) “Issues and Challenges of Wormhole Attack Detection for Secure Localization in WSNs”, in. International Conference on Advancement in Computation & Computer Technologies (InCACCT) 2023:628–633. https://doi.org/10.1109/InCACCT57535.2023.10141721
Hanif M et al (2022) AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks. Electron 11(15):2324. https://doi.org/10.3390/ELECTRONICS11152324
Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou H (2022) PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int J Intell Syst 37(2):1204–1221. https://doi.org/10.1002/INT.22666
Niculescu B, Nath D (2001) Ad-Hoc positioning systems in Proceedings of IEEE GLOBECOM ’01 2926–2931. https://doi.org/10.1109/GLOCOM.2001.965964
Lalama Z, Boulfekhar S, Semechedine F (2021) Localization Optimization in WSNs Using Meta-Heuristics Optimization Algorithms: A Survey Wirel Pers Commun 1222, vol. 122, no. 2, pp. 1197–1220. https://doi.org/10.1007/S11277-021-08945-8
Kaur A, Gupta GP, Mittal S (2021) Comparative Study of the Different Variants of the DV ‑ Hop Based Node Localization Algorithms for Wireless Sensor 123:0123456789. Springer US. https://doi.org/10.1007/s11277-021-09206-4
Han D et al (2022) A novel secure DV-Hop localization algorithm against wormhole attacks. Telecommun Syst 803, vol. 80, no. 3, pp. 413–430. https://doi.org/10.1007/S11235-022-00914-1
Inderst F, Oliva G, Panzieri S, Pascucci F, Setola R (2018) Faulty or malicious anchor detection criteria for distance-based localization. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 10707 LNCS 229–240. https://doi.org/10.1007/978-3-319-99843-5_21/COVER
Jadoon RN, Awan AA, Khan MA, Zhou WY, Shahzad A, Hou-Sheng S (2020) An Efficient Nodes Failure Recovery Management Algorithm for Mobile Sensor Networks. Math Probl Eng vol. 2020. https://doi.org/10.1155/2020/1749467
Geng X, Zhang B (2023) Deep Q-Network-based Intelligent Routing Protocol for Underwater Acoustic Sensor Network. IEEE Sens J 1–1. https://doi.org/10.1109/JSEN.2023.3234112
Kaliyar P, Ben Jaballah W, Conti M, Lal C (2020) LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Comput Secur 94:101849. https://doi.org/10.1016/j.cose.2020.101849
Xu Y (2008) Anchor-Free Localization in Mixed Wireless Sensor Network Systems. Dartmouth Coll Ph.D Diss Accessed: Aug. 28, 2023 [Online] Available: https://digitalcommons.dartmouth.edu/dissertations/24
Xu Y, Ouyang Y, Le Z, Ford J, Makedon F (2007) Analysis of Range-Free Anchor-Free Localization in a Wsn under Wormhole Attack in Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. 344–351. https://doi.org/10.1145/1298126.1298185.
Pandey OJ, Mahajan A, Hegde RM (2018) Joint Localization and Data Gathering Over a Small-World WSN With Optimal Data MULE Allocation. IEEE Trans Veh Technol 67(7):6518–6532. https://doi.org/10.1109/TVT.2018.2805921
Pandey OJ, Gautam V, Jha S, Shukla MK, Hegde RM (2020) Time Synchronized Node Localization Using Optimal H-Node Allocation in a Small World WSN. IEEE Commun Lett 24(11):2579–2583. https://doi.org/10.1109/LCOMM.2020.3008086
Chen C, Tong F, Zhang Y, Zhu Z (2022) A Novel Detection and Localization Scheme of Wormhole Attack in IoT Network in 2022 13th Asian Control Conference (ASCC) 1983–1988. https://doi.org/10.23919/ASCC56756.2022.9828159
Thangavel K, Gayathri Lakshmi M, Priya SS, Srinivasan S (2022) Detecting and Securing Internet of Things from Wormhole attacks in a Wireless Sensor Networks in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) 507–512. https://doi.org/10.1109/ICICCS53718.2022.9788395
Kuo S-Y, Tseng F-H, Chou Y-H (2023) Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Futur Gener Comput Syst 143:179–190. https://doi.org/10.1016/j.future.2023.01.017
Banihashemian SS, Adibnia F (2022) A Novel Robust Soft-Computed Range-Free Localization Algorithm Against Malicious Anchor Nodes. 13(4):992–1007. Accessed: Sep. 01, 2022. [Online]. Available: https://link.springer.com/article/https://doi.org/10.1007/s12559-021-09879-w
Garg R, Gulati T, Kumar S (2023) Range free localization in WSN against wormhole attack using Farkas’ Lemma. Wirel Networks 1–15. https://doi.org/10.1007/S11276-023-03279-8/METRICS
Todkar SS, Baltazart V, Ihamouten A, Dérobert X, Guilbert D (2021) One-class SVM based outlier detection strategy to detect thin interlayer debondings within pavement structures using Ground Penetrating Radar data. J Appl Geophys 192:104392. https://doi.org/10.1016/J.JAPPGEO.2021.104392.
Kumar S, Kumar S, Batra N (2021) Optimized Distance Range Free Localization Algorithm for WSN. Wirel Pers Commun 117(3):1879–1907. https://doi.org/10.1007/s11277-020-07950-7
Taylor JR (1997) An Introduction to Error Analysis: The Study of Uncertainties in Physical Measurements. University Science Books. [Online]. Available: https://books.google.co.in/books?id=ypNnQgAACAAJ
Chou H-Y, Lin P-Y, Lin C-J (2020) Dual Coordinate-Descent Methods for Linear One-Class SVM and SVDD in Proceedings of the 2020 SIAM International Conference on Data Mining (SDM). 181–189. https://doi.org/10.1137/1.9781611976236.21
Karmarkar N (1984) A new polynomial-time algorithm for linear programming. Proc Annu ACM Symp Theory Comput 302–311. https://doi.org/10.1145/800057.808695
Coppersmith D, Winograd S (1990) Matrix multiplication via arithmetic progressions. J Symb Comput 9(3):251–280. https://doi.org/10.1016/S0747-7171(08)80013-2
Barr KC, Asanović K (2006) Energy-aware lossless data compression. ACM Trans Comput Syst 24(3):250–291. https://doi.org/10.1145/1151690.1151692
Chatterjee B et al (2021) Context-Aware Collaborative Intelligence with Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed. IEEE Internet Things J 8(8):6800–6814. https://doi.org/10.1109/JIOT.2020.3036087
Uhlig H (1996) A law of large numbers for large economies. Econ Theory 8(1):41–50. https://doi.org/10.1007/BF01212011/METRICS
Emakoua A (2023) A SIR Stochastic Epidemic Model in Continuous Space: Law of Large Numbers and Central Limit Theorem. Accessed: Jul. 09, 2023 [Online]. Available: https://arxiv.org/abs/2301.02343v1
Rappaport TS (2010) Wireless Communications: Principles And Practice, 2/E. Pearson Education [Online] Available: https://books.google.co.in/books?id=VmPT8B-5%5C_tAC
Funding
No funding was received for conducting this study.
Author information
Authors and Affiliations
Contributions
All authors have equal contributions in this work.
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to participate
All the authors involved have agreed to participate in this submitted article.
Consent to publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Conflict of interest
Authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Garg, R., Gulati, T. & Kumar, S. Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 16, 2833–2849 (2023). https://doi.org/10.1007/s12083-023-01563-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-023-01563-0