Abstract
Wireless sensor networks are always a demanding field, no matter how technology advances in recent times. Energy efficiency and security are the major concerns for such networks. While energy efficiency has been taken care of using clustering techniques by many researchers in the past, those energy-efficient clustering techniques still do not focus on security issues. Many researchers in the past considered trust models for the sensor networks that prioritize the detection of packet-dropping malicious nodes by observing the packet forwarding behavior of the nodes in a promiscuous way. This work focuses on the wormhole attack in clustered WSNs for Internet of Things networks and proposes a bio-inspired Ant Colony Optimization trust model to counter the wormhole attack. The proposed model computes the direct trust of the nodes based on the pheromone concentration rather than packet forwarding behavior to avoid packet loss. The proposed model has been compared with existing techniques based on packet delivery ratio, number of packet drops, throughput, remaining energy of the network, average end-to-end delay, average control overhead, average energy consumption per node, and average jitter. Simulation has been done in network simulator 2.35 and results prove that the proposed model can detect the malicious nodes in an energy-efficient way and also causes fewer packet drops.
Similar content being viewed by others
Code Availability
The authors declare the availability of the working code of the NS2 simulator.
References
Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.
Nguyen, T. N., Tran, D.-H., Chien, T. V., Phan, V.-D., Nguyen, N.-T., Voznak, M., Chatzinotas, S., Ottersten, B., & Poor, H. V. (2023). Physical layer security in AF-based cooperative SWIPT sensor networks. IEEE Sensors Journal, 23(1), 689–705. https://doi.org/10.1109/JSEN.2022.3224128
Liu, J., Zhao, Z., Ji, J., & Hu, M. (2020). Research and application of wireless sensor network technology in power transmission and distribution system. Intelligent and Converged Networks, 1(2), 199–220. https://doi.org/10.23919/ICN.2020.0016
Liu, X., Yu, J., Li, F., Lv, W., Wang, Y., & Cheng, X. (2020). Data aggregation in wireless sensor Networks: From the perspective of security. IEEE Internet of Things Journal, 7(7), 6495–6513. https://doi.org/10.1109/JIOT.2019.2957396
Chiu, H.S., & Lui, K., (2006). DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks. In In 1st international symposium on wireless pervasive computing. IEEE. phuket: IEEE, pp. 1–6. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1613586
Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M., (2006). TrueLink: A practical countermeasure to the wormhole attack in wireless networks. Proceedings - International Conference on Network Protocols, ICNP, pp.75–84
Jain, S., Ta, T., & Baras, J.S., (2012). Wormhole detection using channel characteristics. 2012 IEEE International Conference on Communications (ICC), pp.6699–6704. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6364768.Jamshidi
Zangeneh, M., Esnaashari, E., Darwesh, M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173. https://doi.org/10.1007/s11277-018-6107-5
Kaur, D., & Kaur, M. R. (2017). Wormhole attack detection in mobile Ad Hoc networks. Wireless Personal Communications, 2(2), 174–179. https://doi.org/10.1007/s11277-017-4643-z
Khan, F. A., Farooqi, A. H., & Derhab, A. (2019). A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. Journal of Supercomputing, 75, 2221–2242.
Khalil, I., Bagchi, S., & Shroff, N. B. (2007). L ITE W ORP : Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750–3772.
Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 6(3), 344–362.
Korkmaz, T., (2005). Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. International Conference on Information Technology: Coding and Computing (ITCC’05) - Volume II, Vol. 2 pp.704–709
Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063. https://doi.org/10.1016/j.adhoc.2008.09.005
Meghdadi, M., Ozdemir, S., & Gueler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. Iete Technical Review, 28(2), 89–102.
Rajakumar, P., Prasanna, V.T., & Pitchaikkannu, A., (2014). Security attacks and detection schemes in MANET. 2014 International Conference on Electronics and Communication Systems, ICECS 2014
Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118, 789–814.
Singh, H., Bala, M., & Bamber, S. S. (2020). Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent. Wireless Networks, 26, 5965–5979. https://doi.org/10.1007/s11276-020-02422-z
Forestiero, A., Hussain, S., Sami, A., Thasin, A., & Saad, R. M. A. (2022). AI-enabled ant-routing protocol to secure communication in flying networks. Applied Computational Intelligence and Soft Computing, 2022, 1–9. https://doi.org/10.1155/2022/3330168
Vimal, V., & Nigam, M.J., (2017). Plummeting Flood Based Distributed-DoS Attack to Upsurge Networks Performance in Ad-Hoc networks Using Neighborhood Table Technique. IEEE Region 10 Conference (TENCON), Nov 5–8, pp.139–144
Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324. https://doi.org/10.3390/electronics11152324
Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260–288. https://doi.org/10.1515/comp-2022-0245
Angurala, M., et al. (2021). A novel technique for energy replenishment and load balancing in wireless sensor networks. Optik Journal, 248(2021), 1–10.
Angurala, M., et al. (2021). MRCRLB technique on modulation schemes in wireless rechargeable sensor networks. Egyptian Informatics Journal ISSN, 22(4), 473–478. https://doi.org/10.1016/j.eij.2021.03.002
Funding
This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, H., Bala, M., Bamber, S.S. et al. Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network. Wireless Pers Commun 138, 1649–1670 (2024). https://doi.org/10.1007/s11277-024-11566-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-11566-6