Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers, materials & continua materials & continua, 2021-01, Vol.68 (2), p.1967-1981
Hauptverfasser: Shahid, Hafsa, Ashraf, Humaira, Javed, Hafsa, Humayun, Mamoona, Jhanjhi, Nz, A. AlZain, Mohammed
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1981
container_issue 2
container_start_page 1967
container_title Computers, materials & continua
container_volume 68
creator Shahid, Hafsa
Ashraf, Humaira
Javed, Hafsa
Humayun, Mamoona
Jhanjhi, Nz
A. AlZain, Mohammed
description An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.
doi_str_mv 10.32604/cmc.2021.015259
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2520255797</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2520255797</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</originalsourceid><addsrcrecordid>eNpNkEFPAjEQRhujiYjePTbxvDhtt116RIJKQuQghmNTui0W2C22JYZ_7yIePM0c3vdN5iF0T2DAqIDy0TRmQIGSARBOubxAPcJLUVBKxeW__RrdpLQBYIJJ6KHlpLVxfcTzffaNT7bG79Ycos9HrNfatynjZYjNZ9hZPMpZmy32LZ6GRfGkT_TSR7uzKXWxNoWI32z-DnGbbtGV07tk7_5mH308Txbj12I2f5mOR7PCMMJywWi5crWV0kkihivgznDOKl0J7YBTGJYrS4RxkkJZg7Gcd4_UrqocB81tzfro4dy7j-HrYFNWm3CIbXdS0S5POa9k1VFwpkwMKUXr1D76RsejIqB-9alOnzrpU2d97AfkzmMg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2520255797</pqid></control><display><type>article</type><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><source>EZB Electronic Journals Library</source><creator>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</creator><creatorcontrib>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</creatorcontrib><description>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2021.015259</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Algorithms ; Data retrieval ; Energy consumption ; Sensors ; Wireless networks ; Wireless sensor networks ; Wormholes</subject><ispartof>Computers, materials &amp; continua, 2021-01, Vol.68 (2), p.1967-1981</ispartof><rights>2021. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</citedby><cites>FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,777,781,27905,27906</link.rule.ids></links><search><creatorcontrib>Shahid, Hafsa</creatorcontrib><creatorcontrib>Ashraf, Humaira</creatorcontrib><creatorcontrib>Javed, Hafsa</creatorcontrib><creatorcontrib>Humayun, Mamoona</creatorcontrib><creatorcontrib>Jhanjhi, Nz</creatorcontrib><creatorcontrib>A. AlZain, Mohammed</creatorcontrib><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><title>Computers, materials &amp; continua</title><description>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</description><subject>Algorithms</subject><subject>Data retrieval</subject><subject>Energy consumption</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>Wormholes</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpNkEFPAjEQRhujiYjePTbxvDhtt116RIJKQuQghmNTui0W2C22JYZ_7yIePM0c3vdN5iF0T2DAqIDy0TRmQIGSARBOubxAPcJLUVBKxeW__RrdpLQBYIJJ6KHlpLVxfcTzffaNT7bG79Ycos9HrNfatynjZYjNZ9hZPMpZmy32LZ6GRfGkT_TSR7uzKXWxNoWI32z-DnGbbtGV07tk7_5mH308Txbj12I2f5mOR7PCMMJywWi5crWV0kkihivgznDOKl0J7YBTGJYrS4RxkkJZg7Gcd4_UrqocB81tzfro4dy7j-HrYFNWm3CIbXdS0S5POa9k1VFwpkwMKUXr1D76RsejIqB-9alOnzrpU2d97AfkzmMg</recordid><startdate>20210101</startdate><enddate>20210101</enddate><creator>Shahid, Hafsa</creator><creator>Ashraf, Humaira</creator><creator>Javed, Hafsa</creator><creator>Humayun, Mamoona</creator><creator>Jhanjhi, Nz</creator><creator>A. AlZain, Mohammed</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20210101</creationdate><title>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</title><author>Shahid, Hafsa ; Ashraf, Humaira ; Javed, Hafsa ; Humayun, Mamoona ; Jhanjhi, Nz ; A. AlZain, Mohammed</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-324bfde99f9168b05fc5537a76af052084be16cf9204d0ce55154df77f50a5ed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Data retrieval</topic><topic>Energy consumption</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>Wormholes</topic><toplevel>online_resources</toplevel><creatorcontrib>Shahid, Hafsa</creatorcontrib><creatorcontrib>Ashraf, Humaira</creatorcontrib><creatorcontrib>Javed, Hafsa</creatorcontrib><creatorcontrib>Humayun, Mamoona</creatorcontrib><creatorcontrib>Jhanjhi, Nz</creatorcontrib><creatorcontrib>A. AlZain, Mohammed</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials &amp; continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shahid, Hafsa</au><au>Ashraf, Humaira</au><au>Javed, Hafsa</au><au>Humayun, Mamoona</au><au>Jhanjhi, Nz</au><au>A. AlZain, Mohammed</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks</atitle><jtitle>Computers, materials &amp; continua</jtitle><date>2021-01-01</date><risdate>2021</risdate><volume>68</volume><issue>2</issue><spage>1967</spage><epage>1981</epage><pages>1967-1981</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2021.015259</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1546-2226
ispartof Computers, materials & continua, 2021-01, Vol.68 (2), p.1967-1981
issn 1546-2226
1546-2218
1546-2226
language eng
recordid cdi_proquest_journals_2520255797
source EZB Electronic Journals Library
subjects Algorithms
Data retrieval
Energy consumption
Sensors
Wireless networks
Wireless sensor networks
Wormholes
title Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T19%3A06%3A35IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Energy%20Optimised%20Security%20against%20Wormhole%20Attack%20in%20IoT-Based%20Wireless%20Sensor%20Networks&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Shahid,%20Hafsa&rft.date=2021-01-01&rft.volume=68&rft.issue=2&rft.spage=1967&rft.epage=1981&rft.pages=1967-1981&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2021.015259&rft_dat=%3Cproquest_cross%3E2520255797%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2520255797&rft_id=info:pmid/&rfr_iscdi=true