Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data...
Gespeichert in:
Veröffentlicht in: | Computers, materials & continua materials & continua, 2021-01, Vol.68 (2), p.1967-1981 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1981 |
---|---|
container_issue | 2 |
container_start_page | 1967 |
container_title | Computers, materials & continua |
container_volume | 68 |
creator | Shahid, Hafsa Ashraf, Humaira Javed, Hafsa Humayun, Mamoona Jhanjhi, Nz A. AlZain, Mohammed |
description | An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy. |
doi_str_mv | 10.32604/cmc.2021.015259 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2520255797</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2520255797</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</originalsourceid><addsrcrecordid>eNpNkEFPAjEQRhujiYjePTbxvDhtt116RIJKQuQghmNTui0W2C22JYZ_7yIePM0c3vdN5iF0T2DAqIDy0TRmQIGSARBOubxAPcJLUVBKxeW__RrdpLQBYIJJ6KHlpLVxfcTzffaNT7bG79Ycos9HrNfatynjZYjNZ9hZPMpZmy32LZ6GRfGkT_TSR7uzKXWxNoWI32z-DnGbbtGV07tk7_5mH308Txbj12I2f5mOR7PCMMJywWi5crWV0kkihivgznDOKl0J7YBTGJYrS4RxkkJZg7Gcd4_UrqocB81tzfro4dy7j-HrYFNWm3CIbXdS0S5POa9k1VFwpkwMKUXr1D76RsejIqB-9alOnzrpU2d97AfkzmMg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2520255797</pqid></control><display><type>article</type><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><source>EZB Electronic Journals Library</source><creator>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</creator><creatorcontrib>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</creatorcontrib><description>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2021.015259</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Algorithms ; Data retrieval ; Energy consumption ; Sensors ; Wireless networks ; Wireless sensor networks ; Wormholes</subject><ispartof>Computers, materials & continua, 2021-01, Vol.68 (2), p.1967-1981</ispartof><rights>2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</citedby><cites>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Shahid, Hafsa</creatorcontrib><creatorcontrib>Ashraf, Humaira</creatorcontrib><creatorcontrib>Javed, Hafsa</creatorcontrib><creatorcontrib>Humayun, Mamoona</creatorcontrib><creatorcontrib>Jhanjhi, Nz</creatorcontrib><creatorcontrib>A. AlZain, Mohammed</creatorcontrib><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><title>Computers, materials & continua</title><description>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</description><subject>Algorithms</subject><subject>Data retrieval</subject><subject>Energy consumption</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>Wormholes</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkEFPAjEQRhujiYjePTbxvDhtt116RIJKQuQghmNTui0W2C22JYZ_7yIePM0c3vdN5iF0T2DAqIDy0TRmQIGSARBOubxAPcJLUVBKxeW__RrdpLQBYIJJ6KHlpLVxfcTzffaNT7bG79Ycos9HrNfatynjZYjNZ9hZPMpZmy32LZ6GRfGkT_TSR7uzKXWxNoWI32z-DnGbbtGV07tk7_5mH308Txbj12I2f5mOR7PCMMJywWi5crWV0kkihivgznDOKl0J7YBTGJYrS4RxkkJZg7Gcd4_UrqocB81tzfro4dy7j-HrYFNWm3CIbXdS0S5POa9k1VFwpkwMKUXr1D76RsejIqB-9alOnzrpU2d97AfkzmMg</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Shahid, Hafsa</creator><creator>Ashraf, Humaira</creator><creator>Javed, Hafsa</creator><creator>Humayun, Mamoona</creator><creator>Jhanjhi, Nz</creator><creator>A. AlZain, Mohammed</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20210101</creationdate><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><author>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Data retrieval</topic><topic>Energy consumption</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>Wormholes</topic><toplevel>online_resources</toplevel><creatorcontrib>Shahid, Hafsa</creatorcontrib><creatorcontrib>Ashraf, Humaira</creatorcontrib><creatorcontrib>Javed, Hafsa</creatorcontrib><creatorcontrib>Humayun, Mamoona</creatorcontrib><creatorcontrib>Jhanjhi, Nz</creatorcontrib><creatorcontrib>A. AlZain, Mohammed</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials & continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shahid, Hafsa</au><au>Ashraf, Humaira</au><au>Javed, Hafsa</au><au>Humayun, Mamoona</au><au>Jhanjhi, Nz</au><au>A. AlZain, Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</atitle><jtitle>Computers, materials & continua</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>68</volume><issue>2</issue><spage>1967</spage><epage>1981</epage><pages>1967-1981</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2021.015259</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-2226 |
ispartof | Computers, materials & continua, 2021-01, Vol.68 (2), p.1967-1981 |
issn | 1546-2226 1546-2218 1546-2226 |
language | eng |
recordid | cdi_proquest_journals_2520255797 |
source | EZB Electronic Journals Library |
subjects | Algorithms Data retrieval Energy consumption Sensors Wireless networks Wireless sensor networks Wormholes |
title | Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T19%3A06%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Energy%20Optimised%20Security%20against%20Wormhole%20Attack%20in%20IoT-Based%20Wireless%20Sensor%20Networks&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Shahid,%20Hafsa&rft.date=2021-01-01&rft.volume=68&rft.issue=2&rft.spage=1967&rft.epage=1981&rft.pages=1967-1981&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2021.015259&rft_dat=%3Cproquest_cross%3E2520255797%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2520255797&rft_id=info:pmid/&rfr_iscdi=true |