IDEAS home Printed from https://ideas.repec.org/a/spr/telsys/v87y2024i3d10.1007_s11235-024-01213-7.html
   My bibliography  Save this article

Secure positioning of wireless sensor networks against wormhole attacks

Author

Listed:
  • Xiuwu Yu

    (University of South China
    University of South China)

  • Xun Wang

    (University of South China)

  • Yong Liu

    (Shenzhen University)

Abstract

In wireless sensor networks, the location of nodes is closely related to all tasks, so the accuracy and security of node localization are highly required. The core of the DV-HOP algorithm is based on the number of hops between nodes for localization, but wormhole attacks replay information through wormholes, and this attack greatly affects the parameter hop count. To address this security flaw, the DV-HOP algorithm is improved by first detecting the presence of wormhole attacks based on the communication characteristics between nodes, then the affected beacon nodes use a correction formula to fix the incorrect hop count information and transmit the correct information again, and finally the sensor nodes further evaluate and determine the location of the wormhole connection to prevent it in subsequent applications. Through experimental simulations, the proposed method improves the average localization accuracy by about 51.3 and 12.7 $$\%$$ % , respectively, compared with the DV-HOP and LBDV algorithms without security improvements, which confirms that the proposed method is robust to wormhole attacks and reduces the localization errors affected by wormhole attacks.

Suggested Citation

  • Xiuwu Yu & Xun Wang & Yong Liu, 2024. "Secure positioning of wireless sensor networks against wormhole attacks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 87(3), pages 835-843, November.
  • Handle: RePEc:spr:telsys:v:87:y:2024:i:3:d:10.1007_s11235-024-01213-7
    DOI: 10.1007/s11235-024-01213-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s11235-024-01213-7
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s11235-024-01213-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Prabhjot Singh & Nitin Mittal & Parulpreet Singh, 2022. "A novel hybrid range-free approach to locate sensor nodes in 3D WSN using GWO-FA algorithm," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 80(3), pages 303-323, July.
    2. Huaying Yin & Hongmei Yang & Saeid Shahmoradi, 2022. "Correction to: EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(1), pages 21-21, September.
    3. Huaying Yin & Hongmei Yang & Saeid Shahmoradi, 2022. "EATMR: an energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(1), pages 1-19, September.
    4. Dezhi Han & Mengxiao Liu & Tien-Hsiung Weng & Canren Tang & Mario Donato Marino & Kuan-Ching Li, 2022. "A novel secure DV-Hop localization algorithm against wormhole attacks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 80(3), pages 413-430, July.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Ramin Ramazanzadeh & Nahideh Derakhshanfard, 2023. "Fuzzy assisted dynamic message replication and routing in delay tolerant networks," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 193-209, February.
    2. Ke Zhang & Guang Zhang & Xiuwu Yu & Shaohua Hu & Youcui Yuan, 2022. "WSNs node localization algorithm based on multi-hop distance vector and error correction," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 81(3), pages 461-474, November.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:telsys:v:87:y:2024:i:3:d:10.1007_s11235-024-01213-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.