iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11277-024-11566-6
Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network | Wireless Personal Communications Skip to main content
Log in

Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are always a demanding field, no matter how technology advances in recent times. Energy efficiency and security are the major concerns for such networks. While energy efficiency has been taken care of using clustering techniques by many researchers in the past, those energy-efficient clustering techniques still do not focus on security issues. Many researchers in the past considered trust models for the sensor networks that prioritize the detection of packet-dropping malicious nodes by observing the packet forwarding behavior of the nodes in a promiscuous way. This work focuses on the wormhole attack in clustered WSNs for Internet of Things networks and proposes a bio-inspired Ant Colony Optimization trust model to counter the wormhole attack. The proposed model computes the direct trust of the nodes based on the pheromone concentration rather than packet forwarding behavior to avoid packet loss. The proposed model has been compared with existing techniques based on packet delivery ratio, number of packet drops, throughput, remaining energy of the network, average end-to-end delay, average control overhead, average energy consumption per node, and average jitter. Simulation has been done in network simulator 2.35 and results prove that the proposed model can detect the malicious nodes in an energy-efficient way and also causes fewer packet drops.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Code Availability

The authors declare the availability of the working code of the NS2 simulator.

References

  1. Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.

    Article  Google Scholar 

  2. Nguyen, T. N., Tran, D.-H., Chien, T. V., Phan, V.-D., Nguyen, N.-T., Voznak, M., Chatzinotas, S., Ottersten, B., & Poor, H. V. (2023). Physical layer security in AF-based cooperative SWIPT sensor networks. IEEE Sensors Journal, 23(1), 689–705. https://doi.org/10.1109/JSEN.2022.3224128

    Article  Google Scholar 

  3. Liu, J., Zhao, Z., Ji, J., & Hu, M. (2020). Research and application of wireless sensor network technology in power transmission and distribution system. Intelligent and Converged Networks, 1(2), 199–220. https://doi.org/10.23919/ICN.2020.0016

    Article  Google Scholar 

  4. Liu, X., Yu, J., Li, F., Lv, W., Wang, Y., & Cheng, X. (2020). Data aggregation in wireless sensor Networks: From the perspective of security. IEEE Internet of Things Journal, 7(7), 6495–6513. https://doi.org/10.1109/JIOT.2019.2957396

    Article  Google Scholar 

  5. Chiu, H.S., & Lui, K., (2006). DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks. In In 1st international symposium on wireless pervasive computing. IEEE. phuket: IEEE, pp. 1–6. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1613586

  6. Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M., (2006). TrueLink: A practical countermeasure to the wormhole attack in wireless networks. Proceedings - International Conference on Network Protocols, ICNP, pp.75–84

  7. Jain, S., Ta, T., & Baras, J.S., (2012). Wormhole detection using channel characteristics. 2012 IEEE International Conference on Communications (ICC), pp.6699–6704. Available at: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6364768.Jamshidi

  8. Zangeneh, M., Esnaashari, E., Darwesh, M., & Meybodi, M. R. (2019). A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it. Wireless Personal Communications, 105(1), 145–173. https://doi.org/10.1007/s11277-018-6107-5

    Article  Google Scholar 

  9. Kaur, D., & Kaur, M. R. (2017). Wormhole attack detection in mobile Ad Hoc networks. Wireless Personal Communications, 2(2), 174–179. https://doi.org/10.1007/s11277-017-4643-z

    Article  Google Scholar 

  10. Khan, F. A., Farooqi, A. H., & Derhab, A. (2019). A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. Journal of Supercomputing, 75, 2221–2242.

    Article  Google Scholar 

  11. Khalil, I., Bagchi, S., & Shroff, N. B. (2007). L ITE W ORP : Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750–3772.

    Article  Google Scholar 

  12. Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 6(3), 344–362.

    Article  Google Scholar 

  13. Korkmaz, T., (2005). Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. International Conference on Information Technology: Coding and Computing (ITCC’05) - Volume II, Vol. 2 pp.704–709

  14. Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063. https://doi.org/10.1016/j.adhoc.2008.09.005

    Article  Google Scholar 

  15. Meghdadi, M., Ozdemir, S., & Gueler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. Iete Technical Review, 28(2), 89–102.

    Article  Google Scholar 

  16. Rajakumar, P., Prasanna, V.T., & Pitchaikkannu, A., (2014). Security attacks and detection schemes in MANET. 2014 International Conference on Electronics and Communication Systems, ICECS 2014

  17. Singh, S., & Saini, H. S. (2021). Learning-based security technique for selective forwarding attack in clustered WSN. Wireless Personal Communications, 118, 789–814.

    Article  Google Scholar 

  18. Singh, H., Bala, M., & Bamber, S. S. (2020). Augmenting network lifetime for heterogenous WSN assisted IoT using mobile agent. Wireless Networks, 26, 5965–5979. https://doi.org/10.1007/s11276-020-02422-z

    Article  Google Scholar 

  19. Forestiero, A., Hussain, S., Sami, A., Thasin, A., & Saad, R. M. A. (2022). AI-enabled ant-routing protocol to secure communication in flying networks. Applied Computational Intelligence and Soft Computing, 2022, 1–9. https://doi.org/10.1155/2022/3330168

    Article  Google Scholar 

  20. Vimal, V., & Nigam, M.J., (2017). Plummeting Flood Based Distributed-DoS Attack to Upsurge Networks Performance in Ad-Hoc networks Using Neighborhood Table Technique. IEEE Region 10 Conference (TENCON), Nov 5–8, pp.139–144

  21. Hanif, M., Ashraf, H., Jalil, Z., Jhanjhi, N. Z., Humayun, M., Saeed, S., & Almuhaideb, A. M. (2022). AI-based wormhole attack detection techniques in wireless sensor networks. Electronics, 11(15), 2324. https://doi.org/10.3390/electronics11152324

    Article  Google Scholar 

  22. Gupta, C., Singh, L., & Tiwari, R. (2022). Wormhole attack detection techniques in ad-hoc network: A systematic review. Open Computer Science, 12(1), 260–288. https://doi.org/10.1515/comp-2022-0245

    Article  Google Scholar 

  23. Angurala, M., et al. (2021). A novel technique for energy replenishment and load balancing in wireless sensor networks. Optik Journal, 248(2021), 1–10.

    Google Scholar 

  24. Angurala, M., et al. (2021). MRCRLB technique on modulation schemes in wireless rechargeable sensor networks. Egyptian Informatics Journal ISSN, 22(4), 473–478. https://doi.org/10.1016/j.eij.2021.03.002

    Article  Google Scholar 

Download references

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohit Angurala.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, H., Bala, M., Bamber, S.S. et al. Detection of Wormhole Attack Via Bio-Inspired Ant Colony Optimization Based Trust Model in WSN Assisted IoT Network. Wireless Pers Commun 138, 1649–1670 (2024). https://doi.org/10.1007/s11277-024-11566-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11566-6

Keywords

Navigation