Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks
Abstract
:1. Introduction
- (1)
- In the existing research, there are several methods that can detect sinkhole attacks. However, some studies can only detect the presence of a Sinkhole in a network but cannot determine the location of the Sinkhole.
- (2)
- It is possible to bypass the scope of a sinkhole attack to reach the Sink using a multi-path forwarding approach, but using multiple routes at the same time can seriously damage the network’s lifespan. Even when multiple routes are used, it is difficult to ensure that one route will bypass the sinkhole attack.
- (3)
- When a Sinkhole does not perform any attacks on other nodes, neighboring nodes cannot observe the Sinkhole’s illegal behavior. Even if abnormal behavior is observed, warning messages from nodes within the attack range are sent to the Sinkhole, and therefore, the damage caused to the network by the sinkhole attack cannot be eliminated in time. As a result, the network still does not have access to valid warning messages.
- (4)
- A node in range of an attack cannot report to the Sink whether it is under attack and requires additional hardware or other policies in the network to report the presence of a Sinkhole in the network. This approach will result in increased network costs and reduced network performance.
2. Analysis of Typical Cyber Attacks
2.1. Network Model
2.2. Sinkhole Attack Model
3. SJ-SHDDS Algorithms
3.1. Suspiciousness Detection
3.2. Building a Trust Evaluation Model
3.2.1. SPA
3.2.2. Direct Trust
3.2.3. Indirect Trust
3.2.4. Comprehensive Trust
3.3. Jaya-Based Defense Attack Model
3.3.1. Strategy for Updating the Solution of the Jaya Algorithm
3.3.2. Defensive Strategies to Circumvent SH Nodes
Algorithm 1: SJ-SHDDS Algorithm Description |
1. begin |
2. while true do |
3. for i∈true % i represents the neighboring node of the boundary node |
4. query its neighboring nodes |
5. for p,q∈(i) % p, q represents the neighbor node of i |
6. if p=max[Suspicious] %Suspicious for suspicion |
7. max[Suspicious]=Suspiciousworst |
8. p[hop]=Hopworst %p[hop] is the number of hops of p |
9. endif |
10. remove p from neighboring nodes |
11. if q=min[hop] %hop is the number of hops |
12. min[hop]=Hopbest |
13. q[Suspicious]=Suspiciousbest %q[Suspicious] is the degree of suspicion of q |
14. endif |
15. endfor |
16. for j=1:iter |
17. |
18. endfor |
19. if HopNext,iter≥HopNode,iter |
20. Use n node as the next hop node |
21. else pick the second small hop node |
22. reture HopNext,iter |
23. endif |
24. endfor |
25. endwhile |
4. Simulation Results and Performance Analysis
4.1. Selection of Suspiciousness Threshold
4.2. Selection of Trust Threshold
4.3. Comparative Performance Analysis of Different Algorithms
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Khanna, N.; Sachdeva, M. A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Comput. Sci. Rev. 2019, 32, 24–44. [Google Scholar] [CrossRef]
- Li, J.; Zhang, Q.; Zhang, Z.; Yin, Y.; Zhang, H. Congestion Control and Energy Optimization Routing Algorithm for Wireless Sensor Networks. J. Northeast Electr. Power Univ. 2020, 40, 69–74. [Google Scholar] [CrossRef]
- Rehman, A.-U.; Rehman, S.U.; Raheem, H. Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 2018, 106, 2291–2313. [Google Scholar] [CrossRef]
- Huang, X.; Wu, Y. Identify Selective Forwarding Attacks Using Danger Model: Promote the Detection Accuracy in Wireless Sensor Networks. J. IEEE Sensors Journal. 2022, 22, 9997–10008. [Google Scholar] [CrossRef]
- Wang, J.; Zhu, Z.; Liu, J. A Detection and Defense Method for Black Hole Attacks in Wireless Sensor Networks. Comput. Sci. 2019, 46, 102–108. [Google Scholar] [CrossRef]
- Teng, Z.; Gu, J.; Cui, Y. Artificial Bee Colony Malicious Node Identification Strategy Considering Reputation in WSN. J. Harbin Inst. Technol. 2023. Available online: http://kns.cnki.net/kcms/detail/23.1235.t.20231107.1525.002.html (accessed on 8 November 2023).
- Weiguo, L.; Hongwei, L.; Xinyu, L.; Liming, C.; Lijun, G. Voltage Synchronization Signal Detection Technology Based On Improved SOGI–PLL. J. Northeast Electr. Power Univ. 2021, 41, 93–100. [Google Scholar] [CrossRef]
- Zhang, H.; Yang, Y.; Song, X.; Li, W.; Guo, S. An Abnormal Intrusion Detection Method of Surveillance Video Based on Self-organizing Mathematical Model. J. Northeast Electr. Power Univ. 2022, 42, 63–69. [Google Scholar] [CrossRef]
- Yang, X. The Intrusion Detection Technology of Wireless Sensor Network. Master’s Thesis, Xidian University, Xi’an, China, 2015. [Google Scholar]
- Liu, Y.; Ma, M.; Liu, X.; Xiong, N.N.; Liu, A.; Zhu, Y. Design and analysis of probing route to defense sink-hole attacks for Internet of things security. IEEE Trans. Netw. Sci. Eng. 2018, 7, 356–372. [Google Scholar] [CrossRef]
- Sejaphala, L.C.; Velempini, M. The Design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks. Wirel. Pers. Commun. 2020, 113, 977–993. [Google Scholar] [CrossRef]
- Dhanaraj, R.K.; Krishnasamy, L.; Geman, O.; Izdrui, D.R. Black hole and sink hole attack detection in wireless body area networks. Comput. Mater. Contin. 2021, 68, 1949–1965. [Google Scholar] [CrossRef]
- Prathapchandran, K.; Janani, T. A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST. Comput. Netw. 2021, 198, 108413. [Google Scholar] [CrossRef]
- Babaeer, H.A.; Al-Ahmadi, S.A. Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access 2020, 8, 92098–92109. [Google Scholar] [CrossRef]
- Sánchez-Casado, L.; Maciá-Fernández, G.; García-Teodoro, P.; Aschenbruck, N. Identification of contamination zones for sinkhole detection in MANETs. J. Netw. Comput. Appl. 2015, 54, 62–77. [Google Scholar] [CrossRef]
- Zhang, Z.; Liu, S.; Bai, Y.; Zheng, Y. M optimal routes hops strategy: Detecting sinkhole attacks in wireless sensor networks. Clust. Comput. 2018, 22, 7677–7685. [Google Scholar] [CrossRef]
- Shafiei, H.; Khonsari, A.; Derakhshi, H.; Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. J. Comput. Syst. Sci. 2014, 80, 644–653. [Google Scholar] [CrossRef]
- Fang, X.F.; Fang, K.; Wang, X.D.; Peng, F. Sybil Attack Detection Method Based on Energy Consumption Trust Value in WSN. Chin. J. Sens. Actuators 2020, 33, 907–915. [Google Scholar] [CrossRef]
- Rana, G.K. A Secure Wireless Sensor Network for Defending against Sinkhole Attacks and Black Hole Routing Attacks. Master’s Thesis, Beijing University of Technology, Beijing, China, 2018. [Google Scholar]
- Chang, Y.; Tang, H.; Li, B.; Yuan, X. Distributed Joint Optimization Routing Algorithm Based on the Analytic Hierarchy Process for Wireless Sensor Networks. IEEE Commun. Lett. 2017, 21, 2718–2721. [Google Scholar] [CrossRef]
- Pang, B.; Teng, Z.; Sun, H.; Du, C.; Li, M.; Zhu, W. A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network. IEEE Wirel. Commun. Lett. 2021, 10, 1613–1617. [Google Scholar] [CrossRef]
- Cheng, Z.; Liu, D.; Wu, J.; Chen, L. Comprehensive Evaluation of Power Quality Based on Set Pair Analysis and Variable Fuzzy Sets. Power Syst. Technol. 2020, 44, 1950–1956. [Google Scholar] [CrossRef]
- Yao, L.; Wang, D.; Liang, X.; Wan, J. Research on multi-level fuzzy trust model for wireless sensor networks. Chin. J. Sci. Instrum. 2014, 35, 1606–1613. [Google Scholar] [CrossRef]
- Jin, J.; Kong, L.; Cui, Y.; Zhou, R.; Chen, M.; Ning, S. Assessment of Regional Agricultural Drought Vulnerability Based on Five-Element Semi-Partial Subtraction Set Pair Potential. Trans. Chin. Soc. Agric. Mach. 2022, 53, 340–348. [Google Scholar] [CrossRef]
- Rao, R. Jaya: A Simple and New Optimization Algorithm for Solving Constrained and Unconstrained Optimization Problems. Int. J. Ind. Eng. Comput. 2016, 7, 19–34. [Google Scholar]
Node ID | Neighboring Node ID | Neighboring Node Hops | Suspiciousness |
---|---|---|---|
5 | 2 | 5 | 72% |
4 | 3 | ||
6 | 5 | ||
8 | 1 |
Trust Levels | Connectivity Interval | Connectivity Value | Indirect Trust |
---|---|---|---|
untrustworthy | A | [−1, −0.333] | 0 |
uncertain | B | [−0.333, 0.333] | (Pessimistic potential) 0.25 |
(Optimistic potential) 0.75 | |||
trustworthy | C | [0.333, 1] | 1 |
Parameter | Numerical Value |
---|---|
Simulation area (m) | 100 × 100 |
Total number of nodes | 100 |
Number of SH nodes | 1~5 |
Communication radius (m) | 15 |
Initial energy (J) | 2 |
Packet size (bit) | 800 |
Transmission and reception energy consumption (nJ/bit) | 50 |
Amplifier energy consumption (pJ/bit/m2) | 10 |
θ | 150 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Teng, Z.; Li, M.; Yu, L.; Gu, J.; Li, M. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Sensors 2023, 23, 9709. https://doi.org/10.3390/s23249709
Teng Z, Li M, Yu L, Gu J, Li M. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Sensors. 2023; 23(24):9709. https://doi.org/10.3390/s23249709
Chicago/Turabian StyleTeng, Zhijun, Mingzhe Li, Libo Yu, Jinliang Gu, and Meng Li. 2023. "Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks" Sensors 23, no. 24: 9709. https://doi.org/10.3390/s23249709