|
|
Unique-preorder-node Based DV-Hop Localization against Wormhole Attack for Wireless Sensor Networks |
Jiuhu Zheng, Huanyan Qian, Jiguang Chen, Jiang Xu |
|
|
Abstract DV-Hop is a range-free localization algorithm widely applied in
wireless sensor network. Wormhole attack is one of the most serious
attacks on DV-Hop. Previous solutions are mainly based on location
leash and time leash which need hardware support, while the rest of
the mechanisms without hardware support often require a higher ratio
of beacon nodes and very complex operations. In this paper, we have
analyzed the impact of the wormhole attack on the DV-Hop location
algorithm. When the DV-Hop is invaded by the wormhole attack, the
probability of the wormhole attack tunnel to be the shortest path is
the biggest of all. Then we put forward the PDWA wormhole attack
detection algorithm based on the Unique Preorder Node (UPN). It
analyses the number of UPN and relationship through the statistics,
detects the wormhole attack nodes without hardware support, and its
computational complexity is also not high. The simulation results
show that our proposed location scheme can fully detect the wormhole
attacker. The obtained positioning accuracy is almost the same as
the DV-Hop without a wormhole attack. What's more, after it is
applied to the improved MHDV-Hop algorithm, we also achieved a
perfect effect. So the results fully show that our proposed scheme
can resist the influence of the wormhole attack on DV-Hop.
|
|
DOI:10.12733/jics20105716 |
|
|
|
[1] |
Anuwat Dechvijankit, Hiroshi Nagahashi, Kota Aoki. An Enhanced Way to Create Disk Topology Patch For Bounded-Parameterization[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 1-11. |
[2] |
You Lu, Chang Liu. The Explicit Piecewise Polynomials of Locally Supported Box Spline[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 13-27. |
[3] |
Demin Wei, Shuo Yao, Zhuangning Xie. Directional wind Pressure of Cladding Structure[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 29-41. |
[4] |
Xinghua Huo, Yafeng Yao, Zhao Chen. Implementation of a Direct Rotation CORDIC Algorithm with High Speed and Low Resource Consumption[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 43-50. |
[5] |
Hui Zhi, Yanjun Hu, Jun Zhu, Quan Yuan, Mengmeng He. Cross-Layer Power Allocation Scheme for Two-Way Relaying System[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 51-58. |
[6] |
Zhaolei Wei, Chunliang Chen, Ying Shen, Jiulin Luo. Research on Quality Evaluation of the Requirement Scheme for Equipment System[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 59-67. |
[7] |
. Table of Contents - JICS Vol 13 No 1[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 1000-1000. |
[8] |
. JICS Vol 13 No 1 Cover[J]. JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE, 2016, 13(1): 1001-1001. |
[9] |
Wenxiong Li;Haitao Ma;Taicong Chen. Exact Beam Element and Algorithms for Stability Analysis of Frame Structures Including Transverse Shear Deformation[J]. , 2015, 12(6): 2335-2350. |
[10] |
Minyou Chen;Xuemin Tan. Batch Mode Active Learning Algorithm Combining with Self-training for Multiclass Brain-computer Interfaces[J]. , 2015, 12(6): 2351-2359. |
[11] |
Qingyong Xu;Shunliang Jiang;Wei Huang;Famao Ye;Shaoping Xu. Feature Fusion Based Image Retrieval Using Deep Learning[J]. , 2015, 12(6): 2361-2373. |
[12] |
Li Liu;Junjie Lv;Jingyuan Li;Yuanzhuo Wang. Evolutionary Game Model of Information Interaction in Social Network[J]. , 2015, 12(6): 2375-2388. |
[13] |
Changbiao Xu;Zheng Zhang;Shimeng Zhang. A Scheme for the Power Control of WBAN Based on RSSI/LQI All-feed Information[J]. , 2015, 12(6): 2389-2396. |
[14] |
Chunfei Zhang;Zhiyi Fang. Gateway Deployment Algorithm for Load Balance in Wireless Mesh Networks[J]. , 2015, 12(6): 2397-2405. |
[15] |
Xiaochuan Wu;Weibo Deng;Qiang Yang. Dictionary Optimization for DOA Approximation in a Single Snapshot[J]. , 2015, 12(6): 2407-2415. |
|
|
|
|