Open Access
ARTICLE
Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks
1 Department of Computer Science and Software Engineering, International Islamic University Islamabad, Islamabad, Pakistan
2 Department of Information Systems, College of Computer and Information Science, Jouf University, Al-Jouf, Saudi Arabia
3 School of Computer Science and Engineering (SCE), Taylor’s University, Selangor, Malaysia
4 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
* Corresponding Author: Nz Jhanjhi. Email:
Computers, Materials & Continua 2021, 68(2), 1967-1981. https://doi.org/10.32604/cmc.2021.015259
Received 12 November 2020; Accepted 23 February 2021; Issue published 13 April 2021
Abstract
An IoT-based wireless sensor network (WSN) comprises many small sensors to collect the data and share it with the central repositories. These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it. During data sharing, security is an important concern in such networks as they are prone to many threats, of which the deadliest is the wormhole attack. These attacks are launched without acquiring the vital information of the network and they highly compromise the communication, security, and performance of the network. In the IoT-based network environment, its mitigation becomes more challenging because of the low resource availability in the sensing devices. We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology. The analysis of literature has motivated our research. In this paper, we developed the ESWI technique for detecting the wormhole attack while improving the performance and security. This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation. The simulation results of our technique show competitive results for the detection rate and packet delivery ratio. It also gives an increased throughput, a decreased end-to-end delay, and a much-reduced consumption of energy.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.