Next Article in Journal
A Low-Cost Lightweight Deflectometer with an Arduino-Based Signal Interpretation Kit to Evaluate Soil Modulus
Next Article in Special Issue
GBDT-IL: Incremental Learning of Gradient Boosting Decision Trees to Detect Botnets in Internet of Things
Previous Article in Journal
Utilizing Spectral, Structural and Textural Features for Estimating Oat Above-Ground Biomass Using UAV-Based Multispectral Data and Machine Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks

1
Modern Power System Simulation Control and Green Energy New Technology Key Laboratory of the Ministry of Education, School of Electrical Engineering, Northeast Electric Power University, Jilin 132012, China
2
School of Electrical Engineering, Northeast Electric Power University, Jilin 132012, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(24), 9709; https://doi.org/10.3390/s23249709
Submission received: 6 September 2023 / Revised: 1 December 2023 / Accepted: 4 December 2023 / Published: 8 December 2023
(This article belongs to the Special Issue Cybersecurity Attack and Defense in Wireless Sensors Networks)

Abstract

:
A sinkhole attack is characterized by low difficulty to launch, high destructive power, and difficulty to detect and defend. It is a common attack mode for wireless sensor networks. This paper proposes a sinkhole attack detection and defense strategy integrating SPA and Jaya algorithms in wireless sensor networks (WSNs). Then, combined with the SPA trust model, the trust values of suspicious nodes were calculated, and the attack nodes were detected. The Jaya algorithm was adopted to avoid the attacked area so that nodes can find the route to communicate with the real Sink, and attack nodes are isolated in the network to improve the capabilities of network directional defense. The simulation results show that the improved detection algorithm can effectively detect malicious nodes in the network, and the defense strategy implemented in the attacked area can improve the packet delivery rate, reduce network delay and energy consumption, and improve the security and reliability of wireless sensor networks.

1. Introduction

A wireless sensor network (WSN) is a network composed of many sensing nodes [1]. Its nodes have communication and computing capabilities and can cooperate in real-time monitoring, sensing, collecting information about various environments or monitoring objects in the network distribution area, and processing this information to obtain detailed and accurate information, which can be transmitted to users who need this information. It can be widely used in national defense and military affairs, national security, environmental monitoring, traffic management, health care, manufacturing, anti-terrorism, disaster relief, and other fields [2]. However, due to limited sensor node resources and often being deployed in unsupervised areas, it is vulnerable to various forms of attacks [3,4,5,6]. A sinkhole attack (Sinkhole) provides a bridge to a wide range of internal attacks, attracting almost all the surrounding data streams to pass through the node and performing malicious operations on the received data, which is highly destructive [7,8]. As a result, network security is one of the most challenging issues in WSNs.
The literature [9] proposed a detection algorithm DFFR based on data traffic, which used data mining techniques to analyze the packet traffic and forwarding rate in the network to detect sinkhole attacks, taking advantage of the significantly larger data traffic within the vortex and the lower packet forwarding rate of the malicious nodes. The literature [10] proposed a PRDSA scheme for defending against sinkhole attacks based on probing routes, which combined the routing mechanisms of far-Sink reverse routing, equal-hop routing, and minimum-hop routing to be able to circumvent sinkhole attacks and found a secure route to the real Sink. The literature [11] proposed a HCODESSA detection scheme for sinkhole attacks based on hop counting, where the base station received all the hop counts from neighboring nodes and sorted the hop counts in ascending order, which caused the node hop count sorting position to change after being attacked, and identified Sinkhole nodes according to the position change. Another paper [12] proposed a hybrid intrusion detection system with PC and MK-Means machine learning techniques, where data pre-processing was performed in PCS to reduce the amount of collected training data features, and the pre-processed features were sent to the MK-Means algorithm for data training and classification enhancement, capable of capturing Sinkhole and Blackhole nodes. The authors of [13] proposed the trust-based RPL secure routing protocol RF-Trust, which used RF algorithms to identify the trustworthiness of nodes in this model and subjective logic to avoid biased or incorrect recommendations. Trust metrics such as the delivery ratio, delay, energy consumption, and honesty were used to detect sinkhole attacks in IoT networks. Other authors [14] proposed a lightweight and secure approach based on a threshold-sensitive high-performance sensor network protocol and watermarking techniques, using watermarking to protect sensed data during transmission, homomorphic encryption processing for internal communication, and the use of network keys for Sinkhole node detection. The authors of [15] proposed a detection method based on contaminated boundaries. The proposed scheme relied on the assumption that contaminated areas and contaminated boundaries exist and used the sequence number as the target feature to calculate the difference value between the sequence number on the contaminated boundary node and the sequence number of its neighbors to identify the malicious behavior of the Sinkhole node. Next, ref. [16] proposed RMHSD, a Sinkhole detection algorithm based on minimum hop selection random paths, which measured the frequency of each node by establishing M optimal hop routes from each node to the Sink node. Dynamic programming was used to build a database, calculate the hop difference between suspect nodes and their neighbors, and compare it with the threshold value to identify malicious nodes. In contrast, ref. [17] used a centralized geostatistical fragile survival model approach to obtain the residual energy of sampled nodes and their geostatistical data to detect suspicious areas in the network, and a distributed monitoring approach using fully trusted surveillance nodes monitoring local information was used to explore each neighborhood in the network to detect malicious behavior.
Some of the existing research is not effective against sinkhole attacks due to the great danger of sinkhole attacks and the difficulty in detecting and defending against them. As a result, the following issues still require improvement:
(1)
In the existing research, there are several methods that can detect sinkhole attacks. However, some studies can only detect the presence of a Sinkhole in a network but cannot determine the location of the Sinkhole.
(2)
It is possible to bypass the scope of a sinkhole attack to reach the Sink using a multi-path forwarding approach, but using multiple routes at the same time can seriously damage the network’s lifespan. Even when multiple routes are used, it is difficult to ensure that one route will bypass the sinkhole attack.
(3)
When a Sinkhole does not perform any attacks on other nodes, neighboring nodes cannot observe the Sinkhole’s illegal behavior. Even if abnormal behavior is observed, warning messages from nodes within the attack range are sent to the Sinkhole, and therefore, the damage caused to the network by the sinkhole attack cannot be eliminated in time. As a result, the network still does not have access to valid warning messages.
(4)
A node in range of an attack cannot report to the Sink whether it is under attack and requires additional hardware or other policies in the network to report the presence of a Sinkhole in the network. This approach will result in increased network costs and reduced network performance.
This paper proposes a sinkhole attack detection and defensive strategy integrating the SPA and Jaya algorithm in WSNs (SJ-SHDDS) with the innovation of using a segmented detection method. Based on the attack characteristics of sinkhole attacks, we first analyzed the number of node hops in the network and then combined the SPA trust model to calculate the trust value of suspicious nodes and identify the attacking nodes. Finally, to avoid retransmitting packets to the attacking node, the Jaya algorithm was used to avoid the attacked area, find the optimal path to communicate with the real Sink node, and isolate the attacking node in the whole network.

2. Analysis of Typical Cyber Attacks

2.1. Network Model

This paper uses a typical wireless sensor network model [18] where a Sink node is deployed in the network, keeping the location information of all nodes, with unlimited energy and high transmitting power to communicate directly with the nodes. All sensor nodes in the network are randomly distributed with density ρ and are homogeneous, where r is the communication radius. ES is the initial energy. The storage capacity and the computational power are the same. Each node is assigned a unique ID and a fixed location that cannot be moved after deployment, and each node can communicate with its neighbors within the communication radius and obtain the neighbor’s ID and the number of hops to the Sink. The sensor network is of the event-monitoring type. After an event occurs, the node that detects the event will generate a packet, and the sensor node collects the information and transmits it to the Sink node via a shortest path routing algorithm.
The distribution density of sensor nodes is as follows:
ρ = N n o d e S
where Nnode is the number of nodes and S is the approximate uniformly distributed area of each node.
The energy consumption of the sensor nodes is modeled as follows:
E r l , d = E e l e c × l
E s l , d = E e l e c × l + E a m p × l d 2
E C l , d = 2 E e l e c × l + E a m p × l d 2
where Er (l, d) and Es (l, d) are the energy consumed by the node when sending and receiving data, respectively. EC (l, d) is the total energy consumption of the node when performing data forwarding. l is the number of packet bits sent and received. d is the distance between node s and node f. Eelec is the energy per unit bit consumed by node j when transmitting data, and Eamp is the energy consumed by the power amplifier during transmission. If the initial energy of the network node is EB, the remaining energy of the node is
E r e s i d u a l   l , d = E B E C l , d

2.2. Sinkhole Attack Model

A model of a wireless sensor network under a sinkhole attack [19] is shown in Figure 1, where SH is the malicious node and Sink is the aggregation node. Figure 1a shows the data flow in the network without any attack, and Figure 1b shows the data flow in the network with a sinkhole attack.
The sinkhole attack in Figure 1b attracts a large amount of data by broadcasting a false message, creating the illusion of a channel with high quality to the base station. Nodes that receive this message are lured to send their own data to the attacking node, and the lured sensor nodes may continue to spread this false message within their own communication range, again attracting some normal nodes to send packets to the attacker, thus forming a metaphorical Sinkhole around the attacker. A malicious node can arbitrarily organize or tamper with the packets sent by the attacking area nodes, thus posing a significant threat to WSN security.

3. SJ-SHDDS Algorithms

The SJ-SHDDS algorithms proposed in this paper can be divided into three phases—suspiciousness detection phase, malicious identification phase, and defense against attack phase.

3.1. Suspiciousness Detection

In WSNs, routing from sensor nodes to the Sink is usually based on a hop-by-hop routing mechanism. When data need to be routed to the Sink, the sensor node chooses the neighboring node with the smallest number of hops to the Sink to forward the data. However, SH nodes usually set their hop count to the Sink to be less than their actual hop count and broadcast a false hop count to all neighboring nodes to detect anomalies based on hop count changes.
Definition 1—Boundary nodes: Using Equations (6) and (7) to calculate the degree of suspiciousness between the average hop count Hopaverage and the lowest hop count Hopmin, if the Suspiciousness degree is greater than the threshold Suspiciousth, the node is defined as a boundary node—that is, the node is a neighboring node contaminated by the attacking node.
H o p a v e r a g e = H o p 1 + H o p 2 + + H o p n n
S u s p i c i o u s     % = ( 1 H o p m i n H o p a v e r a g e ) × 100 %
where n is the number of neighboring nodes. Hopn is the hop count of the nth node. And since the hop count of Sink is 0, the suspiciousness of Sink’s neighboring nodes is 1.
As shown in Figure 2, red nodes are SH nodes, grey nodes are boundary nodes, and the rest of the nodes are normal nodes. Taking node 5 as an example, the degree of suspiciousness values of the nodes are analyzed, as shown in Table 1.
Definition 2—Suspicious node: There is no significant difference between the hop count from a node to a Sink and the hop count from a neighboring node to a Sink. If the neighboring node has an abnormally low hop count, the neighboring node is determined to be suspicious. Thus, the node with the lowest hop count among the neighboring nodes of the boundary node is the suspicious node.

3.2. Building a Trust Evaluation Model

This phase is the malicious identification phase, in which the trust value of a suspicious node in the path is calculated using a boundary node at a fixed time interval to determine the state of the node. The trust degree between nodes is subjective and fuzzy, and the main methods of trust evaluation are hierarchical analysis [20] and fuzzy comprehensive judgment [21]. In this paper, we use set pair analysis (SPA) to use the change of the operation state of nodes to calculate the comprehensive trust value of nodes.

3.2.1. SPA

SPA is a mathematical theory that deals with the interaction of certainty and uncertainty [22] and is able to analyze the effects of uncertainty elements such as randomness, non-linearity, and ambiguity, which is suitable for evaluating trust between nodes.
The expression for SPA connectivity is
μ A , B = S N + F N i + P N j = a + b i + c j
where μ(A, B) is the degree of association of the set pair H(A, B). N is the total number of elements in the set, N = S + P + F. S is the number of elements in the same state (same characteristics) in both sets; F is the number of elements in the different state (different characteristics) in both sets; P is the number of elements in the opposite state (opposite characteristics) in both sets; a is the degree of similarity; b is the degree of difference; c is the degree of opposition, and a,b,c ∈ [0, 1], a + b + c = 1. i is the coefficient of the degree of difference, i ∈ [−1, 1]; j is the coefficient of the degree of opposition, taking a constant value of −1.
Determining the similarity of two sets is ultimately achieved by calculating the magnitude of the degree of connectivity. When the weights of each influencing factor or evaluation indicator are considered, then the degree of connectivity μ for the weights of the same, opposing, and differential characteristics is
μ A , B = k = 1 S ω k + k = S + 1 S + F ω k i + k = S + F + 1 N ω k j
where k = 1 N ω k = 1 .

3.2.2. Direct Trust

This paper uses the SPA method to calculate the trust value of nodes and introduces a reputation maintenance function to adaptively reduce the impact of the number of interactions between nodes in the early stage. Also, since the network nodes may be uncooperative influences brought about by non-intrusive factors—that is, abnormal behavior of the nodes due to the network’s own failures—an abnormal weakening factor is introduced to reduce the false detection rate of the network. The direct trust DTij obtained from the direct interaction behavior of the nodes is expressed as follows:
D T s f ( t ) = κ a s f + Δ a s f G + ρ ( κ b s f + Δ b s f G i + κ c s f + Δ c s f G j )
κ = θ a s f + b s f + c s f
ρ = N i n t N d e t
where asf, bsf, and csf are the number of historical successful, uncertain, and failed communications between node s and node f, respectively, ∆asf, ∆bsf, and ∆csf are the number of successful, uncertain, and failed communications between nodes in ∆t time, and G is the total number of node interactions. κ is the reputation maintenance function, which maintains the impact of the current node behavior on reputation and reduces the impact of historical behavior. θ is a fixed maintenance value to set the range of the maintenance function action. ρ ∈ [0, 1] is the suspicious weakening factor. Nint denotes the number of node anomalous communications due to intrusion factors, and Ndet denotes the total number of anomalous communications in the network.

3.2.3. Indirect Trust

Three evaluation factors are selected to weigh the indirect trust value of the nodes. The set of evaluation factors Q = {q1, q2, q3}, where qm (m = 1, 2, 3) denotes the data delivery rate, node residual energy, and processing delay, respectively. The corresponding weight sets w = (w1, w2, w3). wm (m = 1, 2, 3) denotes the weights of each evaluation factor qm, respectively, and the importance of each factor is calculated by referring to the three-scale method [23] to establish a judgment scale table, which yields w1 = 0.6334,w2 = 0.2605,w3 = 0.1061. The set of trust judgment indicators E = {e1, e2, e3}, em (m = 1, 2, 3) denote untrustworthy, uncertain, and high trustworthiness, respectively. The factors are normalized to the interval [0, 1] and used as input variables, respectively, and the homogeneous inverse vector matrix R of each factor can be obtained according to the affiliation function.
Data-normalization process: The evaluation factor set obtains different values for each, and the data need to be normalized by the deviation, a linear transformation of the original data that maps the results to between 0 and 1. The normalization formula is
x n = 0 , x < x min x x min x max x min , x min x < x max 1 , x x max
where xn is the normalized deviation value of each evaluation factor index, xmax and xmin are the limit values of each corresponding evaluation factor index interval, and each operation state affiliation function is shown in Equations (14)–(16).
(a) The affiliation function when the state is not credible is
c m = 1 , x n 0.2 1 2 1 2 sin π 0.2 x n 0.3 , 0.2 < x n < 0.4 0 , x n 0.4
(b) The affiliation function when the state is uncertain is
b m = 0 , x n 0.2   or   x n 0.8 1 2 + 1 2 sin π 0.2 ( x n 0.3 ) , 0.2 < x n < 0.4 1 , 0.4 x n 0.6 1 2 1 2 sin π 0.2 ( x n 0.7 ) , 0.6 < x n < 0.8
(c) The affiliation function when the state is a credible state is
a m = 0 , x n 0.6 1 2 + 1 2 sin π 0.2 ( x n 0.7 ) , 0.6 < x n < 0.8 1 , 0.8 x n 1
The homogeneous inverse evaluation matrix R of the indirect trust ITsf(t) is constructed by calculating the affiliation functions of the respective ranks according to Equations (14)–(16).
By forming Q and E into a set of set pairs H(Q, E) according to Equation (8), the properties of the sets Q and E are treated as a system, and the identities, differences, and opposites of the sets Q and E in the set pairs are analyzed. To enable a more intuitive and convenient calculation of the degree of connectivity μ when considering weights, the expression for the degree of connectivity is based on the relationship between congruence, dissimilarity, and inverse connectivity as
μ ( Q , E ) = W R I     = ω 1 , ω 2 , ω 3 a 1 b 1 c 1 a 2 b 2 c 2 a 3 b 3 b 3     1 i j = a 1 ω 1 + a 2 ω 2 + a 3 ω 3 + b 1 ω 1 + b 2 ω 2 + b 3 ω 3   i + c 1 ω 1 + c 2 ω 2 + c 3 ω 3 j
where μ(Q, E) is the connectivity of the set pair H(Q, E), W is the vector matrix of weight coefficients, and I is the matrix of homogeneous inverse coefficients.
Using the evaluation index data as input and the value of the connectivity μ calculated by the process of SPA as output, the range of values of the connectivity [−1, 1] was divided into three different intervals, A = [−1, −0.333], B = [−0.333, 0.333], and C = [0.333, 1], according to the principle of mean score [24], with A, B, and C representing the trust levels of untrustworthiness, uncertainty, and trustworthiness, as shown in Table 2. When the level of indirect trust is uncertain, the trend of level transformation will be considered, and a comparison between the pessimistic and optimistic potential will determine which trend the indirect trust tends to follow before determining the fixed value of indirect trust using the following formula.
Pessimistic potential: a trend where uncertainty translates into untrustworthiness.
n e g a t i v e = c 1 ω 1 + c 2 ω 2 + c 3 ω 3 b 1 ω 1 + b 2 ω 2 + b 3 ω 3 + c 1 ω 1 + c 2 ω 2 + c 3 ω 3
Optimistic potential: a trend where uncertainty translates into trustworthiness.
p o s i t i v e = a 1 ω 1 + a 2 ω 2 + a 3 ω 3 a 1 ω 1 + a 2 ω 2 + a 3 ω 3 + b 1 ω 1 + b 2 ω 2 + b 3 ω 3

3.2.4. Comprehensive Trust

After the calculation of indirect trust is completed, the direct trust and indirect trust are synthesized to obtain the combined trust value of the evaluated node, and the formula for the combined trust value of the node is as follows:
C T s f t = γ   D T s f t + 1 γ     I T s f t
where γ = 0.5 is the trust weight, and the comprehensive trust value takes the value in [0, 1]; the higher the trust value, the higher the reliability of the node. When a node is attacked, it causes the comprehensive trust value of the node to drop sharply and will be detected when it is less than the trust threshold K.

3.3. Jaya-Based Defense Attack Model

In many previous studies, there was an assumption that once anomalous information was detected, the detection results could be transmitted to the real Sink. However, in an actual sinkhole attack, if the original route was used, the detection results would still be transmitted to the fake Sink. This will block communication between nodes within the attack range of the Sinkhole and nodes within the unaffected area, forming a so-called “isolated island” that can only detect sinkhole attacks and cannot provide a method for reporting detection information to the Sink. This is not very applicable in practical applications. Therefore, this paper combines the strategy of updating the solution of the Jaya algorithm to find an optimal path that can avoid the attack region and reach the real Sink.

3.3.1. Strategy for Updating the Solution of the Jaya Algorithm

The Jaya algorithm has only one stage and has the advantages of running parameter-free, solving fast, and not easily falling into local optima [25]. The algorithm strives to win by reaching the optimal solution, and the basic idea of the Jaya algorithm is to converge to the optimal solution and stay away from the worst solution. The idea of this paper is to find the shortest path to the Sink, hiding boundary nodes to avoid re-entering the malicious-node-contaminated area to affect packet transmission. Therefore, the improved Jaya algorithm in this paper updates the path node adaptation as follows:
H o p N e x t , i t e r = H o p N o d e , i t e r + S u s p i c i o u s b e s t , i t e r ( H o p b e s t , i t e r H o p N o d e , i t e r ) S u s p i c i o u s w o r s t , i t e r ( H o p w o r s t , i t e r H o p N o d e , i t e r )
where HopNode,iter is the original node hop count. iter is the current iteration count. HopNode,1 is the hop count of the boundary node where the malicious node is found. Suspiciousbest,iter and Suspiciousworst,iter are the suspiciousness values of the nodes with the smallest hop count and the greatest suspiciousness, respectively, taking values between [0, 1]. Hopbest,iter and Hopworst,iter are the hop values of the nodes with the smallest hop count and the greatest suspiciousness, respectively. HopNext,iter is the fitness of the updated path node. If the generated new fitness is better than the original node, the original node is replaced with the node found to have the smallest hop count; otherwise, it is not replaced. Then, Jaya is calculated for the second fewest hop count until the optimal path is transmitted to the Sink. This paper does not take the node of the previous hop of the path into account in the calculation.

3.3.2. Defensive Strategies to Circumvent SH Nodes

To find the optimal path under the Sinkhole attack as shown in Figure 3, red nodes are SH nodes, grey nodes are boundary nodes, yellow nodes are the nodes in the optimal path, and the rest of the nodes are normal nodes. Figure 3a shows the boundary nodes affected by the SH node, while Figure 3b shows finding the optimal path while avoiding the sinkhole attack.
The pseudocode of SJ-SHDDS algorithm is shown in Algorithm 1.
Algorithm 1: SJ-SHDDS Algorithm Description
1. begin
2. while true do
 3.     for i∈true % i represents the neighboring node of the boundary node
 4.     query its neighboring nodes
5.      for p,q Γ (i) % p, q represents the neighbor node of i
6.     if p=max[Suspicious] %Suspicious for suspicion
7.      max[Suspicious]=Suspiciousworst
 8.      p[hop]=Hopworst %p[hop] is the number of hops of p
9.     endif
10.     remove p from neighboring nodes
11.    if q=min[hop] %hop is the number of hops
12.     min[hop]=Hopbest
 13.        q[Suspicious]=Suspiciousbest %q[Suspicious] is the degree of suspicion of q
14.    endif
15.     endfor
16.   for j=1:iter
17.    H o p N e x t , i t e r = H o p N o d e , i t e r   + S u s p i c i o u s b e s t , i t e r ( H o p b e s t , i t e r H o p N o d e , i t e r )   S u s p i c i o u s w o r s t , i t e r ( H o p w o r s t , i t e r H o p N o d e , i t e r )
18.   endfor
19.   if HopNext,iterHopNode,iter
20.     Use n node as the next hop node
21.   else pick the second small hop node
22.      reture HopNext,iter
23.   endif
24.  endfor
25. endwhile
The SJ-SHDDS algorithm process is shown in Figure 4.

4. Simulation Results and Performance Analysis

In this paper, MATLAB 2020b is used to build the simulation environment. A square with 100 m as the side length is used as the monitoring area. A total of 100 sensor nodes are randomly placed in this area. The communication range of the nodes is 15 m; malicious nodes drop packets with a probability of 0.1 to 0.5. The evaluation of node trust value is conducted after each time period of operation. Each time period is divided into t time slot. Each time slot is recorded once for forwarding rate, and a certain percentage of malicious nodes are randomly selected for performance analysis. The specific simulation parameters are shown in Table 3.
In this paper, the algorithm performance is judged using the detection rate DR, false detection rate FPNR, packet delivery rate PDR, and end-to-end delay EED, as follows:
P D R = Packets   received   by   Sin k Packets   sent   by   the   source   node
F P N R = Normal   node   misjudged Total   number   of   nodes + Malicious   nodes   missed   detection Total   number   of   nodes
P D R = Packets   received   by   Sin k Data   packets   sent   by   the   source   node
E E D = l = 1 L time   delay l L
where L is the total number of nodes in the path.

4.1. Selection of Suspiciousness Threshold

As the number of SH nodes M increases, more boundary nodes are affected, as shown in Figure 5. It can be seen that the detection of boundary nodes is missed due to the larger threshold value, resulting in a gradual decrease in the detection rate of boundary nodes with the increase in the threshold value of suspiciousness. As can be seen in Figure 6, the false detection rate of boundary nodes increases after decreasing first, which is due to the fact that when the suspiciousness threshold is less than 0.35, the nodes appearing as normal nodes are mistakenly detected as boundary nodes. When the suspiciousness threshold is greater than 0.35, the boundary nodes are missed as normal nodes. Combining the detection rate and false detection rate of boundary nodes, the suspiciousness threshold Suspiciousth of 0.35 is chosen in this paper.

4.2. Selection of Trust Threshold

In Figure 7 and Figure 8, it can be seen that the detection rate of SH nodes gradually increases with the increase in the trust threshold, and the detection rate reaches the highest and remains stable after the trust threshold is greater than 0.45 in both cases. The false detection rate decreases and then increases as the trust threshold increases due to missed detection at trust thresholds less than 0.45 and false detection at trust thresholds greater than 0.45, resulting in inadequate detection of SH nodes. In summary, when the trust threshold is at 0.45, the detection rate is the highest and the false detection rate is the lowest, and SH nodes can be effectively detected, so 0.45 is chosen as the trust threshold in this paper.

4.3. Comparative Performance Analysis of Different Algorithms

To verify the effectiveness and security of the algorithm in this paper, an experimental comparative analysis is performed with algorithms such as HCODESSA [11], ICZSHD [15], and RMHSD [16].
In Figure 9 and Figure 10, it can be seen that with the increase in the number of SH nodes, the detection rate of all four methods tends to decrease, and the false detection rate tends to increase, but the detection rate and false detection rate of this paper’s method are better than the other three methods. This is due to the fact that the method in this paper uses a segmented detection method to detect boundary nodes using anomalies and then combines the SPA method to calculate the comprehensive trust value of suspicious nodes, which can distinguish normal nodes from SH nodes and improve the accuracy of detection. Other algorithms directly judge the state of nodes through differences, such as the number of sinkhole attack hops and sequence numbers, without comprehensively considering changes in indicators such as the forwarding rate and energy consumption of nodes in the attack state. The number of neighboring nodes affected by SH nodes increases with the number of SH nodes, which can easily be incorrectly detected as SH nodes, increasing the false detection rate.
As can be seen in Figure 11, the sinkhole attack leads to a decreasing trend and gradual deterioration of the packet delivery rate. The other three algorithms still transmit packets on the original path according to the attraction of SH nodes after the discovery of SH nodes and are unable to transmit packets to the real Sink, resulting in a decreasing packet delivery rate as the number of SH nodes increases. The defense algorithm proposed in this paper uses the Jaya algorithm to circumvent the SH nodes and boundary nodes in the attack area, which can effectively defend against the sinkhole attack of compromised nodes inside and guarantee the normal delivery of packets.
The sinkhole attack leads to an increase in end-to-end delay. The three compared algorithms in Figure 12 have no defense measures, and packet loss is severe as the number of malicious nodes increases, which will lead to nodes needing to re-establish connections and transmit packets, increasing the end-to-end delay. In contrast, the SJ-SHDDS algorithm in this article can effectively defend against sinkhole attacks, and the selection of the optimal path slows down the end-to-end delay growth rate caused by data retransmission.
As can be seen in Figure 13, the mean remaining energy of the network tends to decrease with the increase in the number of packet transmissions. RMHSD and HCODESSA use a multi-path forwarding method with excessive node energy consumption, and the mean remaining energy decreases more rapidly; IDZSHD, with the increase in malicious nodes, leads to energy voids in the contaminated area, both accelerating the energy consumption of network nodes. In contrast, the optimized SJ-SHDDS attack detection and defense mechanism can accurately complete the detection and elimination of SH nodes, effectively reducing the energy consumption of network nodes.

5. Conclusions

With the widespread use of wireless sensor networks, security issues have become increasingly important. In this paper, we propose a sinkhole attack detection and defensive strategy for WSNs that incorporates SPA and Jaya algorithms, which considers the abnormal changes in hop count, packet forwarding rate, energy consumption, and delay caused by sinkhole attacks to identify SH nodes and, with the basic idea that Jaya algorithms converge to the optimal solution and stay away from the worst solution, find the optimal path to reach the real Sink and circumvent the attacked area, including the boundary nodes. Simulation results show that the SJ-SHDDS algorithm is able to effectively detect SH nodes and defend against sinkhole attacks on compromised internal nodes compared to other algorithms, guaranteeing the secure and reliable operation of wireless sensor networks. There are still many problems to be studied and solved in the detection of sinkhole attacks in wireless sensor networks, and the next phase will focus on improving the trust evaluation model for the sinkhole attack method of cluster-based wireless sensor networks to improve the security of the network.

Author Contributions

Software, M.L. (Meng Li); Investigation, L.Y.; Resources, J.G.; Writing—original draft, Z.T.; Writing—review & editing, M.L. (Mingzhe Li). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by [National Outstanding Youth Science Fund Project of National Natural Science Foundation of China] grant number [61501107]. And The APC was funded by [61501107].

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khanna, N.; Sachdeva, M. A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs. Comput. Sci. Rev. 2019, 32, 24–44. [Google Scholar] [CrossRef]
  2. Li, J.; Zhang, Q.; Zhang, Z.; Yin, Y.; Zhang, H. Congestion Control and Energy Optimization Routing Algorithm for Wireless Sensor Networks. J. Northeast Electr. Power Univ. 2020, 40, 69–74. [Google Scholar] [CrossRef]
  3. Rehman, A.-U.; Rehman, S.U.; Raheem, H. Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 2018, 106, 2291–2313. [Google Scholar] [CrossRef]
  4. Huang, X.; Wu, Y. Identify Selective Forwarding Attacks Using Danger Model: Promote the Detection Accuracy in Wireless Sensor Networks. J. IEEE Sensors Journal. 2022, 22, 9997–10008. [Google Scholar] [CrossRef]
  5. Wang, J.; Zhu, Z.; Liu, J. A Detection and Defense Method for Black Hole Attacks in Wireless Sensor Networks. Comput. Sci. 2019, 46, 102–108. [Google Scholar] [CrossRef]
  6. Teng, Z.; Gu, J.; Cui, Y. Artificial Bee Colony Malicious Node Identification Strategy Considering Reputation in WSN. J. Harbin Inst. Technol. 2023. Available online: http://kns.cnki.net/kcms/detail/23.1235.t.20231107.1525.002.html (accessed on 8 November 2023).
  7. Weiguo, L.; Hongwei, L.; Xinyu, L.; Liming, C.; Lijun, G. Voltage Synchronization Signal Detection Technology Based On Improved SOGI–PLL. J. Northeast Electr. Power Univ. 2021, 41, 93–100. [Google Scholar] [CrossRef]
  8. Zhang, H.; Yang, Y.; Song, X.; Li, W.; Guo, S. An Abnormal Intrusion Detection Method of Surveillance Video Based on Self-organizing Mathematical Model. J. Northeast Electr. Power Univ. 2022, 42, 63–69. [Google Scholar] [CrossRef]
  9. Yang, X. The Intrusion Detection Technology of Wireless Sensor Network. Master’s Thesis, Xidian University, Xi’an, China, 2015. [Google Scholar]
  10. Liu, Y.; Ma, M.; Liu, X.; Xiong, N.N.; Liu, A.; Zhu, Y. Design and analysis of probing route to defense sink-hole attacks for Internet of things security. IEEE Trans. Netw. Sci. Eng. 2018, 7, 356–372. [Google Scholar] [CrossRef]
  11. Sejaphala, L.C.; Velempini, M. The Design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks. Wirel. Pers. Commun. 2020, 113, 977–993. [Google Scholar] [CrossRef]
  12. Dhanaraj, R.K.; Krishnasamy, L.; Geman, O.; Izdrui, D.R. Black hole and sink hole attack detection in wireless body area networks. Comput. Mater. Contin. 2021, 68, 1949–1965. [Google Scholar] [CrossRef]
  13. Prathapchandran, K.; Janani, T. A trust aware security mechanism to detect sinkhole attack in RPL-based IoT environment using random forest–RFTRUST. Comput. Netw. 2021, 198, 108413. [Google Scholar] [CrossRef]
  14. Babaeer, H.A.; Al-Ahmadi, S.A. Efficient and secure data transmission and sinkhole detection in a multi-clustering wireless sensor network based on homomorphic encryption and watermarking. IEEE Access 2020, 8, 92098–92109. [Google Scholar] [CrossRef]
  15. Sánchez-Casado, L.; Maciá-Fernández, G.; García-Teodoro, P.; Aschenbruck, N. Identification of contamination zones for sinkhole detection in MANETs. J. Netw. Comput. Appl. 2015, 54, 62–77. [Google Scholar] [CrossRef]
  16. Zhang, Z.; Liu, S.; Bai, Y.; Zheng, Y. M optimal routes hops strategy: Detecting sinkhole attacks in wireless sensor networks. Clust. Comput. 2018, 22, 7677–7685. [Google Scholar] [CrossRef]
  17. Shafiei, H.; Khonsari, A.; Derakhshi, H.; Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. J. Comput. Syst. Sci. 2014, 80, 644–653. [Google Scholar] [CrossRef]
  18. Fang, X.F.; Fang, K.; Wang, X.D.; Peng, F. Sybil Attack Detection Method Based on Energy Consumption Trust Value in WSN. Chin. J. Sens. Actuators 2020, 33, 907–915. [Google Scholar] [CrossRef]
  19. Rana, G.K. A Secure Wireless Sensor Network for Defending against Sinkhole Attacks and Black Hole Routing Attacks. Master’s Thesis, Beijing University of Technology, Beijing, China, 2018. [Google Scholar]
  20. Chang, Y.; Tang, H.; Li, B.; Yuan, X. Distributed Joint Optimization Routing Algorithm Based on the Analytic Hierarchy Process for Wireless Sensor Networks. IEEE Commun. Lett. 2017, 21, 2718–2721. [Google Scholar] [CrossRef]
  21. Pang, B.; Teng, Z.; Sun, H.; Du, C.; Li, M.; Zhu, W. A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network. IEEE Wirel. Commun. Lett. 2021, 10, 1613–1617. [Google Scholar] [CrossRef]
  22. Cheng, Z.; Liu, D.; Wu, J.; Chen, L. Comprehensive Evaluation of Power Quality Based on Set Pair Analysis and Variable Fuzzy Sets. Power Syst. Technol. 2020, 44, 1950–1956. [Google Scholar] [CrossRef]
  23. Yao, L.; Wang, D.; Liang, X.; Wan, J. Research on multi-level fuzzy trust model for wireless sensor networks. Chin. J. Sci. Instrum. 2014, 35, 1606–1613. [Google Scholar] [CrossRef]
  24. Jin, J.; Kong, L.; Cui, Y.; Zhou, R.; Chen, M.; Ning, S. Assessment of Regional Agricultural Drought Vulnerability Based on Five-Element Semi-Partial Subtraction Set Pair Potential. Trans. Chin. Soc. Agric. Mach. 2022, 53, 340–348. [Google Scholar] [CrossRef]
  25. Rao, R. Jaya: A Simple and New Optimization Algorithm for Solving Constrained and Unconstrained Optimization Problems. Int. J. Ind. Eng. Comput. 2016, 7, 19–34. [Google Scholar]
Figure 1. (a) No attack on the network; (b) sinkhole attack. The black arrow refers to the communication path that is not affected by the SH node, the red arrow refers to the communication path that is affected by the SH node, the green node represents the normal node, the red node represents the SH node, and the black node represents the sink node.
Figure 1. (a) No attack on the network; (b) sinkhole attack. The black arrow refers to the communication path that is not affected by the SH node, the red arrow refers to the communication path that is affected by the SH node, the green node represents the normal node, the red node represents the SH node, and the black node represents the sink node.
Sensors 23 09709 g001
Figure 2. Network topology. The red dotted line refers to the boundary nodes affected by the SH node.
Figure 2. Network topology. The red dotted line refers to the boundary nodes affected by the SH node.
Sensors 23 09709 g002
Figure 3. (a) A boundary node in network; (b) The optimal path to circumvent the attacked area.
Figure 3. (a) A boundary node in network; (b) The optimal path to circumvent the attacked area.
Sensors 23 09709 g003
Figure 4. SJ-SHDDS algorithm flow chart.
Figure 4. SJ-SHDDS algorithm flow chart.
Sensors 23 09709 g004
Figure 5. Influence of suspiciousness threshold on detection rate of boundary node.
Figure 5. Influence of suspiciousness threshold on detection rate of boundary node.
Sensors 23 09709 g005
Figure 6. Influence of suspiciousness threshold on false detection rate of boundary node.
Figure 6. Influence of suspiciousness threshold on false detection rate of boundary node.
Sensors 23 09709 g006
Figure 7. Influence of trust threshold on detection rate of SH nodes.
Figure 7. Influence of trust threshold on detection rate of SH nodes.
Sensors 23 09709 g007
Figure 8. Influence of trust threshold on false detection rate of SH nodes.
Figure 8. Influence of trust threshold on false detection rate of SH nodes.
Sensors 23 09709 g008
Figure 9. Comparison of detection rate of different algorithms.
Figure 9. Comparison of detection rate of different algorithms.
Sensors 23 09709 g009
Figure 10. Comparison of false detection rate of different algorithms.
Figure 10. Comparison of false detection rate of different algorithms.
Sensors 23 09709 g010
Figure 11. Comparison of packet delivery rate of different algorithms.
Figure 11. Comparison of packet delivery rate of different algorithms.
Sensors 23 09709 g011
Figure 12. Comparison of end-to-end delay of different algorithms.
Figure 12. Comparison of end-to-end delay of different algorithms.
Sensors 23 09709 g012
Figure 13. Mean residual energy.
Figure 13. Mean residual energy.
Sensors 23 09709 g013
Table 1. Information table for each node itself.
Table 1. Information table for each node itself.
Node IDNeighboring Node IDNeighboring Node HopsSuspiciousness
52572%
43
65
81
Table 2. The relationship between trust level and indirect trust and connection value.
Table 2. The relationship between trust level and indirect trust and connection value.
Trust LevelsConnectivity IntervalConnectivity ValueIndirect Trust
untrustworthyA[−1, −0.333]0
uncertainB[−0.333, 0.333](Pessimistic potential) 0.25
(Optimistic potential) 0.75
trustworthyC[0.333, 1]1
Table 3. Simulation parameters.
Table 3. Simulation parameters.
ParameterNumerical Value
Simulation area (m)100 × 100
Total number of nodes100
Number of SH nodes1~5
Communication radius (m)15
Initial energy (J)2
Packet size (bit)800
Transmission and reception energy consumption (nJ/bit)50
Amplifier energy consumption (pJ/bit/m2)10
θ150
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Teng, Z.; Li, M.; Yu, L.; Gu, J.; Li, M. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Sensors 2023, 23, 9709. https://doi.org/10.3390/s23249709

AMA Style

Teng Z, Li M, Yu L, Gu J, Li M. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Sensors. 2023; 23(24):9709. https://doi.org/10.3390/s23249709

Chicago/Turabian Style

Teng, Zhijun, Mingzhe Li, Libo Yu, Jinliang Gu, and Meng Li. 2023. "Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks" Sensors 23, no. 24: 9709. https://doi.org/10.3390/s23249709

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop