Skip to main content
Log in

Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The Internet of Things, also called IoT for short, consists of billions of devices distributed around the world, all of which are connected through the Internet. Data is collected by things and shared with each other. Due to the nature and infrastructure of wireless IoT, they have several vulnerabilities. IoT security refers to the protection methods used to secure Internet-connected or network-based devices. In fact, the security of communication between things has become one of the open issues and challenges due to the existence of various types of attacks in IoT. One of these attacks that can disrupt the normal communication between things and destroy the network's efficiency is the wormhole attack. Thus, in this type of attack, two intruders are located in two different areas of the network and try to exchange confidential information quickly, as a result, they inform things about the fake route and things send the information to the destination from the same fake route. In fact, it is sent to the intruder's things, which leads to the deletion of data by these intruders. This attack alters the data stream and misleads the well. Therefore, to solve this problem, the proposed method of this paper (Sec-IoT) addresses two basic issues to secure communication between things against wormhole attacks in the Internet of Things. Thus, in the first phase of Sec-IoT, it examines the trust of all things in the route discovery process. The purpose of the first phase was to identify intruding nodes and remove them from the process of participating in network operations. And in the second phase, Cluster Head selection is done using TOPSIS algorithm and data transfer between things is done encrypted using Hash-based Cryptography. The goal of the second phase was to guarantee the integrity of the information sent. The simulation results showed that the proposed method is superior to HRCA and HBC methods in terms of throughput (25%, 18%), PDR (24%, 19%) and lost packet (19%, 15%).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Availability of data and material

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Code availability

All code for data analysis associated with the current submission is available from the corresponding author upon reasonable request.

References

  1. Pishva, D. (2017). Internet of Things: Security and privacy issues and possible solution. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 797–808). IEEE.

  2. Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., & Marrocco, G. (2014). RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things Journal, 1(2), 144–152.

    Article  Google Scholar 

  3. Gonzalez, F., Guo, D., Nowicki, A., & Zalewski, J. (2017). Senior lab projects for teaching the Internet of Things in a Software Engineering program. Zeszyty Naukowe Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej.

  4. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125–1142.

    Article  Google Scholar 

  5. Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems Frontiers, 17(2), 243–259.

    Article  Google Scholar 

  6. Thomas, A., Kumar, T. G., & Mohan, A. K. (2018). Neighbor attack detection in internet of things. In Advanced Computational and Communication Paradigms (pp. 187–196). Springer, Singapore.

  7. Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 32–37). IEEE.

  8. Diro, A. A., & Chilamkurti, N. (2018). Distributed attack detection scheme using deep learning approach for Internet of Things. Future Generation Computer Systems, 82, 761–768.

    Article  Google Scholar 

  9. Nguyen, T. D., Khan, J. Y., & Ngo, D. T. (2017). An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications. In 2017 IEEE International Conference on Communications (ICC) (pp. 1–6). IEEE.

  10. Neerugatti, V., & Reddy, R. M. (2019). Acknowledgement based technique for detection of the wormhole attack in RPL based internet of things networks. Asian Journal of Computer Science and Technology, 8(S3), 100–104.

    Article  Google Scholar 

  11. Kaliyar, P., Jaballah, W. B., Conti, M., & Lal, C. (2020). LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. Computers & Security, 94, 101849.

    Article  Google Scholar 

  12. Ambili, K. N., & Jose, J. (2020). Trust based intrusion detection system to detect insider attacks in IoT systems. In Information Science and Applications (pp. 631–638). Springer, Singapore.

  13. Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840–847.

    Article  Google Scholar 

  14. Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing, 22, 1313–1328.

    Article  Google Scholar 

  15. Ai, Z. Y., Zhou, Y. T., & Song, F. (2018). A smart collaborative routing protocol for reliable data diffusion in IoT scenarios. Sensors, 18(6), 1926.

    Article  Google Scholar 

  16. Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a rpl network: Challenges and effects. In 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS) (pp. 95–102). IEEE.

  17. Wani, A., & Revathi, S. (2017). Analyzing threats of iot networks using sdn based intrusion detection system (sdiot-ids). In International Conference on Next Generation Computing Technologies (pp. 536–542). Springer, Singapore.

  18. Acharjya, D. P., & Ahmed, N. S. S. (2017). Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. In Internet of Things: Novel Advances and Envisioned Applications (pp. 149–172). Springer, Cham.

  19. Iwendi, C., Maddikunta, P. K. R., Gadekallu, T. R., Lakshmanna, K., Bashir, A. K., & Piran, M. J. (2020). A metaheuristic optimization approach for energy efficiency in the IoT networks. Software: Practice and Experience, 51, 2558–2571.

    Google Scholar 

  20. Zhu, M., Chang, L., Wang, N., & You, I. (2020). A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access, 8, 20413–20427.

    Article  Google Scholar 

  21. Zhang, X. J., Qu, Z. Y., & Zhang, M. L. (2017). A high efficient self-organizing network protocol for large scale aware nodes in internet of things. DEStech Transactions on Engineering and Technology Research, (amma).

  22. Vellanki, M., Kandukuri, S. P. R., & Razaque, A. (2016). Node level energy efficiency protocol for Internet of Things. Journal of Theoretical and Computational Science, 3, 140.

    Google Scholar 

  23. Alzubi, J. A., Alzubi, O. A., Suseendran, G., & Akila, D. (2019). A novel Chaotic map encryption methodology for image cryptography and secret Communication with steganography. Int J Recent Technol Eng, 8(1C2), 1122–1128.

    Google Scholar 

  24. Alzubi, O. A., Alzubi, J. A., Dorgham, O., & Alsayyed, M. (2020). Cryptosystem design based on Hermitian curves for IoT security. The Journal of Supercomputing, 76(11), 8566–8589.

    Article  Google Scholar 

  25. Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.

    Article  Google Scholar 

  26. Aldabbas, H., & Amin, R. (2021). A novel mechanism to handle address spoofing attacks in SDN based IoT. Cluster Computing, 24(4), 3011–3026.

    Article  Google Scholar 

  27. Senouci, M. A., Mushtaq, M. S., Hoceini, S., & Mellouk, A. (2016). TOPSIS-based dynamic approach for mobile network interface selection. Computer Networks, 107, 304–314.

    Article  Google Scholar 

  28. Fotohi, R., Nazemi, E., & Aliee, F. S. (2020). An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Vehicular Communications, 26, 100267.

    Article  Google Scholar 

  29. Canedo, J., & Skjellum, A. (2016). Using machine learning to secure IoT systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 219–222). IEEE.

  30. Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081–7106.

    Article  Google Scholar 

Download references

Funding

This study has received no funding from any organizations.

Author information

Authors and Affiliations

Authors

Contributions

TS: Formal analysis, Conceptualization, Methodology, Data curation, Investigation, Validation, Writing—original draft. RM: Data curation, Methodology, Writing—review & editing, Supervision. FR: Formal analysis, Data curation, Methodology, Conceptualization, Writing—review & editing. HY: Formal analysis, Conceptualization, Writing—review & editing.

Corresponding author

Correspondence to Razieh Malekhosseini.

Ethics declarations

Conflict of interest

All of the authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sahraneshin, T., Malekhosseini, R., Rad, F. et al. Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem. Wireless Netw 29, 969–983 (2023). https://doi.org/10.1007/s11276-022-03169-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03169-5

Keywords

Navigation