Abstract
Recently, the Wormhole Attack (WA) affects the Wireless Sensor Networks (WSN). So far, there are ‘2’ solutions to trounce WA, that is, utilizing specialized hardware or capturing a specific pattern extra overhead over the network. Some prevailing solutions for detectingWAneed special hardware or firmly synchronized clocks or longer processing time in addition to that some solutions can’t even locate the WormHole (WH) and also have low security.This paper proposed an efficient WH detection as well as Optimal Path (OP) selection for safe Data Transmission (DT) in WSN. The proposed workencompasses a '2' phase: i) training, and ii) testing. Here, the WSN values are considered and chosen secure node utilizing the Fit Factor (FF). After selecting the secure nodes, the routes are discovered aimed at the optimal assortment of the optimal routes. Next, the gathered data is tested with a trained system in which feature reduction and classification are performed. Lastly, the MCSC securely transfers the non-attack data. The proposed method’s outcomes are examined and weighed against the other prevailing techniques and the outcomesexhibited the proposed method’s efficiency for attack detection along withdata security.
Similar content being viewed by others
Availability of data and materials
Data sharing is not applicable to this article as no datasets were generated or analysed during the current study.
References
Sharma, M., Tandon, A., Narayan, S., & Bhushan, B. (2017). Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In 2017 3rd International conference on advances in computing, communication & automation (ICACCA) (Fall) (pp. 1–5). IEEE
Fotohi, R., & Bari, S. F. (2020). A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. The Journal of Supercomputing, 1–27. https://doi.org/10.1007/s11227-019-03131-x
Jhanjhi, N. Z, Brohi, S. N., & Malik, N. A. (2019). Proposing a rank and wormhole attack detection framework using machine learning. In 13th international conference on mathematics, actuarial science, computer science and statistics (MACS) (pp. 1–9). IEEE
Singh, M. M., Dutta, N., Singh, T. R, & Nandi, U. (2020). A technique to detect wormhole attack in wireless sensor network using artificial neural network. In Evolutionary computing and mobile sustainable networks (pp. 297–307). Springer. https://doi.org/10.1007/978-981-15-5258-8_29
Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: An up-to-date survey. Applied System Innovation, 3(1), 14.
Bhushan, B., & Sahoo, G. (2020). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communications, 111(3), 1667–1694. https://doi.org/10.1007/s11277-019-06948-0
Carlos-Mancilla, M., López-Mellado, E., & Siller, M. (2016). Wireless sensor networks formation: Approaches and techniques. Journal of Sensors. https://doi.org/10.1155/2016/2081902
Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science, 79, 700–707. https://doi.org/10.1016/j.procs.2016.03.092
Opeyemi Osanaiye, A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access, 6, 6975–7004. https://doi.org/10.1109/ACCESS.2018.2793841
Farjamnia, G., Gasimov, Y., & Kazimov, C. (2019). Review of the techniques against the wormhole attacks on wireless sensor networks. Wireless Personal Communications, 105(4), 1561–1584. https://doi.org/10.1007/s11277-019-06160-0
Jilani, S. A., Koner, C., & Nandi, S. (2020). Security in wireless sensor networks: Attacks and evasion. In National conference on emerging trends on sustainable technology and engineering applications (NCETSTEA) (pp. 1–5). IEEE
Foley, J., Moradpoor, N., & Ochen, H. (2020). Employing a machine learning approach to detect combined internet of things attacks against two objective functions using a novel dataset. Security and Communication Networks. https://doi.org/10.1155/2020/2804291
Boni, K. R. C., Xu, L., Chen, Z., & Baddoo, T. D. (2020). A security concept based on scaler distribution of a novel intrusion detection device for wireless sensor networks in a smart environment. Sensors, 20(17), 4717.
Pundir, S., Wazid, M., Singh, D. P., Das, A. K., Rodrigues, J. J. P. C., & Park, Y. (2020). Designing efficient sinkhole attack detection mechanism in edge-based IoT Deployment. Sensors, 20(5), 1300.
Gómez, J. R., Montoya, H. F. V., & Henao, A. L. (2019). Implementación del ataque Wormhole en redes de sensores inalámbricos con dispositivos XBee S2C. Rev Colomb de Computación, 20(1), 41–58.
Dwivedi, R. K., Sharma, P, & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In 2018 8th international conference on cloud computing, data science & engineering (confluence) (pp. 727–732). IEEE
Harsányi, K., Kiss, A., & Szirányi, T. (2018). Wormhole detection in wireless sensor networks using spanning trees. In IEEE international conference on future IoT technologies (Future IoT) (pp. 1–6). IEEE
Verma, M. K., & Dwivedi, R. K. (2020). A survey on wormhole attack detection and prevention techniques in wireless sensor networks. In International conference on electrical and electronics engineering (ICE3) (pp. 326–331). IEEE
Solangi, S. A., & Bhatti, Z. (2020). Optimal route planning by genetic algorithm for wireless sensor networks. In International conference on information science and communication technology (ICISCT) (pp. 1–4). IEEE
Qureshi, K. N., Bashir, M. U., Lloret, J., & Leon, A. (2020). Optimized cluster-based dynamic energy-aware routing protocol for wireless sensor networks in agriculture precision. Journal of Sensors. https://doi.org/10.1155/2020/9040395
Mezni, A., Dumitrescu, E., Niel, E., & Ahmed, S. B. (2018). Multi criteria automatic generation of optimal routing for WSN. In 14th international wireless communications & mobile computing conference (IWCMC) (pp. 747–752). IEEE
Tang, L., Lu, Z., & Fan, B. (2020). Energy efficient and reliable routing algorithm for wireless sensors networks. Applied Sciences, 10(5), 1885.
Aghbari, Z. A., Khedr, A. M., Osamy, W., Arif, I., & Agrawal, D. P. (2019). Routing in wireless sensor networks using optimization techniques: A survey. Wireless Personal Communications, 1–28. https://doi.org/10.1007/s11277-019-06993-9
Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114(1), 329–345.
Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174(4), 1–8.
Kumar, M., & Dutta, K. (2017). Detecting wormhole attack on data aggregation in hierarchical WSN. International Journal of Information Security and Privacy (IJISP), 11(1), 35–51.
Singh, R., Singh, J., & Singh, R. (2016). WRHT: A hybrid technique for detection of wormhole attack in wireless sensor networks. Mobile Information Systems. https://doi.org/10.1155/2016/8354930
Luo, X., Chen, Y., Li, M., Luo, Q., Xue, K., Liu, S., & Chen, L. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194–18205. https://doi.org/10.1109/ACCESS.2019.2894637
Neelamadhab Padhy Gomathy, V., Samanta, D., Sivaram, M., Jain, V., & Amiri, I. S. (2020). Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. Journal of Ambient Intelligence and Humanized Computing, 1–7. https://doi.org/10.1007/s12652-020-01797-3
Acknowledgements
We thank the anonymous referees for their useful suggestions.
Funding
None.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Verma, V., Jha, V.K. An Efficient Wormhole Detection and Optimal Path Selection for Secure Data Transmission in WSN Environment. Wireless Pers Commun 121, 2927–2945 (2021). https://doi.org/10.1007/s11277-021-08856-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08856-8
Keywords
- Wireless sensor network (WSN)
- Fit factor
- Weight and diversity based deer hunting optimization (WD2HO)
- Missing value imputation based t-distributed stochastic neighbor embedding (MVI-t-DSNE)
- Linear quadratic estimation based deep artificial neural network (LQE-DANN)
- Modified Cramer-Shoup Cryptography (MCSC)