The security dv-hop algorithm against multiple-wormhole-node-link in WSN

11Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Distance Vector-Hop (DV-Hop) algorithm is widely used in node localization. It often suffers the wormhole attack. The current researches focus on Double-Wormhole-Node-Link (DWNL) and have limited attention to Multi-Wormhole-Node-Link (MWNL). In this paper, we propose a security DV-Hop algorithm (AMLDV-Hop) to resist MWNL. Firstly, the algorithm establishes the Neighbor List (NL) in initialization phase. It uses the NL to find the suspect beacon nodes and then find the actually attacked beacon nodes by calculating the distances to other beacon nodes. The attacked beacon nodes generate and broadcast the conflict sets to distinguish the different wormhole areas. The unknown nodes take the marked beacon nodes as references and mark themselves with different numbers in the first-round marking. If the unknown nodes fail to mark themselves, they will take the marked unknown nodes as references to mark themselves in the second-round marking. The unknown nodes that still fail to be marked are semi-isolated. The results indicate that the localization error of proposed AMLDV-Hop algorithm has 112.3%, 10.2%, 41.7%, 6.9% reduction compared to the attacked DV-Hop algorithm, the Label-based DV-Hop (LBDV-Hop), the Secure Neighbor Discovery Based DV-Hop (NDDV-Hop), and the Against Wormhole DV-Hop (AWDV-Hop) algorithm.

References Powered by Scopus

A hybrid DV-hop algorithm using RSSI for localization in large-scale wireless sensor networks

90Citations
N/AReaders
Get full text

Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol

74Citations
N/AReaders
Get full text

Securing DV-Hop localization against wormhole attacks in wireless sensor networks

56Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Quasi-affine transformation evolutionary algorithm with communication schemes for application of RSSI in wireless sensor networks

102Citations
N/AReaders
Get full text

Symbiotic organism search algorithm with multi-group quantum-behavior communication scheme applied in wireless sensor networks

56Citations
N/AReaders
Get full text

A Wormhole Attack Detection Algorithm Integrated With the Node Trust Optimization Model in WSNs

28Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, J., & Wang, D. (2019). The security dv-hop algorithm against multiple-wormhole-node-link in WSN. KSII Transactions on Internet and Information Systems, 13(4), 2223–2242. https://doi.org/10.3837/tiis.2019.04.027

Readers over time

‘19‘20‘21‘22‘23‘2400.511.52

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

100%

Readers' Discipline

Tooltip

Computer Science 2

67%

Engineering 1

33%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free
0