An Improved DV-Hop for Detecting Wormhole Attacks in Wireless Sensor Networks

Document Type : Research Paper


1 Institute of Applied Mathematics, Baku State University, Baku, Azerbaijan

2 Institute of Physics Problems, Baku State University, Baku, Azerbaijan

3 Department of Applied Mathematics and Cybernetics, Baku State University, Baku, Azerbaijan


One of the major against in Wireless Sensor Networks (WSNs) is wormhole so that two or more attacker nodes help each other to rob communications and record the information in another place. Wormhole attacks can disrupt communications, change routing, or cause some other localization errors. This attack can also bring about physical access without permission, cause package losses, and increase traffic in the network. Attacker nodes can convince ordinary sensor nodes that they are neighbors and can observe their information and any other traffic that they send in the link length. Localization is an important problem in WSNs. DV-Hop (Distance Vector-hop) is a traditional algorithm for localizing sensor nodes using a hop distance assessment. The DV-Hop model has poor localization accuracy. This paper improves DV-Hop and increases wormhole attack detection accuracy in WSNs based on localization method. In this paper, a new distance based on correction of Hop-size and gap measurement is proposed to minimize the error that exists in DV-Hop. The results of simulation and assessment show that the proposed model carry outs better than DV-Hop in different topologies, in which proposed model has significantly higher localization accuracy.


  1. G. Farjamnia, Y. Gasimov, and C. Kazimov, "Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks," Wireless Personal Communications, vol. 105, no. 4, pp. 1561-1584, Feb. 2019.
  2. M. Sajwan, D. Gosain, and A.K. Sharma, "Hybrid energy-efficient multi-path routing for wireless sensor networks," Computers & Electrical Engineering, vol. 67, no. 1, pp. 96-113, April 2018.
  3. M. Sadeghizadeh and O.r. Marouzi, "Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining," Journal of Communication Engineering, vol. 8, no. 1, pp. 1-19, Aug. 2019.
  4. S. Yahiaoui, M. Omar, A. Bouabdallah, E. Natalizio, and Y. Challal, "An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks," AEU - International Journal of Electronics and Communications, vol. 83, no. 1, pp. 193-203, Jan. 2018.
  5. M. Patel, A. Aggarwal, and N. Chaubey, Performance Evaluation of Wireless Sensor Network in the Presence of Wormhole Attack, in Progress in Advanced Computing and Intelligent Engineering, Singapore: Springer Singapore, Dec. 2019.
  6. M. Imran, F.A. Khan, T. Jamal, and M.H. Durad, "Analysis of Detection Features for Wormhole Attacks in MANETs," Procedia Computer Science, vol. 56, no. 1, pp. 384-390, 2015.
  7. H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, May 2014.
  8. J. Govindasamy and S. Punniakody, "A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack," Journal of Electrical Systems and Information Technology, vol. 5, no. 3, pp. 735-744, Dec. 2018.
  9. M. Patel, A. Aggarwal, and N. Chaubey, Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks, in Progress in Computing, Analytics and Networking, Singapore: Springer Singapore, April 2018.
  10. H. Chen, W. Lou, Z. Wang, J. Wu, Z. Wang, and A. Xia, "Securing DV-Hop localization against wormhole attacks in wireless sensor networks," Pervasive and Mobile Computing, vol. 16, no. 1, pp. 22-35, Jan. 2015.
  11. R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wireless Networks, vol. 13, no. 1, pp. 27-59, May 2007.
  12. B. Bhushan and G. Sahoo, "Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks," Wireless Personal Communications, vol. 98, no. 2, pp. 2037-2077, Sept. 2018.
  13. J. Cui, L. Shao, H. Zhong, Y. Xu, and L. Liu, "Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks," Peer-to-Peer Networking and Applications, vol. 11, no. 5, pp. 1022-1037, Sept. 2018.
  14. D. Giri, S. Borah, and R. Pradhan, Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey, in Advances in Communication, Devices and Networking, Singapore: Springer Singapore, May 2018.
  15. K. Lee, H. Jeon, and D. Kim, Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks, in New Technologies, Mobility and Security, H. Labiod and M. Badra, Editors. 2007, Springer Netherlands: Dordrecht. p. 361-372.
  16. N. Dutta and M.M. Singh, Wormhole Attack in Wireless Sensor Networks: A Critical Review, in Advanced Computing and Communication Technologies, Singapore: Springer Singapore, July 2019.
  17. Y. Xu, G. Chen, J. Ford, and F. Makedon, Detecting Wormhole Attacks in Wireless Sensor Networks, in Critical Infrastructure Protection, Boston, MA: Springer US, 2008.
  18. S. Dong, X.-g. Zhang, and W.-g. Zhou, "A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks," Journal of Electrical Engineering & Technology, vol. 15, no. 2, pp. 919-926, Feb. 2020.
  19. W. Zhao, S. Su, and F. Shao, "Improved DV-Hop Algorithm Using Locally Weighted Linear Regression in Anisotropic Wireless Sensor Networks," Wireless Personal Communications, vol. 98, no. 4, pp. 3335-3353, Oct. 2018.
  20. J. Li, D. Wang, and Y. Wang, "Security DV-hop localisation algorithm against wormhole attack in wireless sensor network," IET Wireless Sensor Systems, vol. 8, no. 2, pp. 68-75, March 2018.
  21. H. Huang, H. Chen, S. Cheng, and F. Li, An improved DV-HOP algorithm for indoor positioning based on Bacterial Foraging Optimization, in 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP), Oct. 2016.
  22. P. Hu and B. Zhang, An Improved Localization Algorithm Based on DV-HOP in WSN, in 2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), Nov. 2019.
  23. D. Prashar and K. Jyoti, "Distance Error Correction Based Hop Localization Algorithm for Wireless Sensor Network," Wireless Personal Communications, vol. 106, no. 3, pp. 1465-1488, March 2019.
  24. N. Labraoui, M. Gueroui, and M. Aliouat, Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks, in Digital Information and Communication Technology and Its Applications, Berlin, Heidelberg: Springer Berlin Heidelberg, Sept. 2011.
  25. H. Chen, W. Lou, and Z. Wang, A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs, in Wireless Algorithms, Systems, and Applications, Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
  26. B. Tian, Q. Li, Y.-x. Yang, D. Li, and Y. Xin, "A ranging based scheme for detecting the wormhole attack in wireless sensor networks," The Journal of China Universities of Posts and Telecommunications, vol. 19, no., pp. 6-10, June 2012.
  27. S. Tomic and I. Mezei, "Improvements of DV-Hop localization algorithm for wireless sensor networks," Telecommunication Systems, vol. 61, no. 1, pp. 93-106, Jan. 2016.
  28. H. Wang and T. Li, Distributed Detection Approach for Wormhole Attack in Wireless Sensor Networks, in Advances in Computer Science and Information Engineering, Berlin, Heidelberg: Springer Berlin Heidelberg, Dec. 2012.
  29. R. de Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini, Distributed Detection of Wormhole Attacks in Wireless Sensor Networks, in Ad Hoc Networks, Berlin, Heidelberg: Springer Berlin Heidelberg, Sept. 2010.
  30. I. Khalil, S. Bagchi, and N.B. Shroff, "LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks," Computer Networks, vol. 51, no. 13, pp. 3750-3772, 2007.
  31. S.M. Naidu and V.B. Himaja, Handling Wormhole Attacks in WSNs Using Location Based Approach, in Proceedings of the First International Conference on Computational Intelligence and Informatics, Singapore: Springer Singapore, Dec. 2017.
  32. E. Karapistoli, P. Sarigiannidis, and A.A. Economides, Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks, in International Conference on Security and Privacy in Communication Networks, Cham: Springer International Publishing, Nov. 2015.
  33. T. Najeh, H. Sassi, and N. Liouane, "A Novel Range Free Localization Algorithm in Wireless Sensor Networks Based on Connectivity and Genetic Algorithms," International Journal of Wireless Information Networks, vol. 25, no. 1, pp. 88-97, March 2018.
  34. T. Dimitriou and A. Giannetsos, Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks, in Distributed Computing in Sensor Systems, Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
  35. L. Buttyán, L. Dóra, and I. Vajda, Statistical Wormhole Detection in Sensor Networks, in Security and Privacy in Ad-hoc and Sensor Networks, Berlin, Heidelberg: Springer Berlin Heidelberg, July 2005.
  36. G. Liu, Z. Qian, and X. Wang, "An improved DV-Hop localization algorithm based on hop distances correction," China Communications, vol. 16, no. 6, pp. 200-214, July 2019.
  37. Y. Cao and Z. Wang, "Improved DV-Hop Localization Algorithm Based on Dynamic Anchor Node Set for Wireless Sensor Networks," IEEE Access, vol. 7, no. 1, pp. 124876-124890, Aug. 2019.
  38. S. Bhagat and T. Panse, A detection and prevention of wormhole attack in homogeneous Wireless sensor Network, in 2016 International Conference on ICT in Business Industry & Government (ICTBIG), Nov. 2016.
  39. A. Louazani, L. Sekhri, and B. Kechar, A time Petri net model for wormhole attack detection in wireless sensor networks, in 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT), June 2013.
  40. W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Jan. 2000.
  41. W. Fang, H. Xu, and G. Yang, Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance, in 2019 5th International Conference on Information Management (ICIM), March 2019.
  42. S. Marian and P. Mircea, Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme, in 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics, May 2015.