• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

    2021-12-11 13:30:30HafsaShahidHumairaAshrafHafsaJavedMamoonaHumayunNzJhanjhiandMohammedAlZain
    Computers Materials&Continua 2021年8期

    Hafsa Shahid,Humaira Ashraf,Hafsa Javed,Mamoona Humayun,Nz Jhanjhiand Mohammed A.AlZain

    1Department of Computer Science and Software Engineering,International Islamic University Islamabad,Islamabad,Pakistan

    2Department of Information Systems,College of Computer and Information Science,Jouf University,Al-Jouf,Saudi Arabia

    3School of Computer Science and Engineering(SCE),Taylor’s University,Selangor,Malaysia

    4Department of Information Technology,College of Computers and Information Technology,Taif University,Taif,21944,Saudi Arabia

    Abstract:An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy.

    Keywords: IoT; Internet of Things; energy; wormhole; WSN; wireless sensor networks

    1 Introduction

    WSNs are one of the most advanced technologies in the present world.These networks have enabled many possibilities such as modern and satellite telecommunication, space communication,military systems, and underwater networks.This technology is also used in traffic monitoring, weather monitoring, fire detection, forest monitoring, smart homes, and the Internet of Things (IoT).

    The IoT networks follow the basic WSN architecture [1], as shown in Fig.1a.IoT is a fast-growing field due to its high applicability in everyday life, as shown in Fig.1b.Some of its most important applications are traffic monitoring, healthcare services, energy-saving smart grid-stations, fleet management, agriculture, water supply, and home security systems.

    Figure 1:(a) WSN architecture (b) Internet of Things

    Security is a major concern due to the decentralised nature of WSNs.These networks are prone to many security attacks based on node capture and node hacking, leading to the compromise of data and security.IoT networks are comprised of sensor-based networks; therefore,the threats posed to the WSNs are equally dangerous and applicable to the IoT networks.One of the most severe threats is the wormhole attack [2].This attack is most easily launched as no legitimate nodes from the network are compromised and no shared key is required by the attacker.This attack can affect the system on different levels depending on the type of attack and the area of the network in which it is launched.If the attack is launched in the localisation protocol, it misguides the system about the node’s location by transmitting false coordinates; if it is launched in the routing protocol, this attack leads to the compromise of data security.

    Wormhole attacks are launched in two ways, internally and externally.In an internal wormhole attack, the attacker is a part of the system and a virtual wormhole tunnel is created by a series of malicious nodes that are hacked by the attacker, as shown in Fig.2a.This is done by using the packet encapsulation method where the packet is encapsulated when it arrives at the first malicious node.It is then sent through the legitimate network path, but the hops of the wormhole tunnel are not counted.Upon arriving at the last node of the wormhole tunnel, the packet is de-encapsulated, and the hop count is increased by one only.In an external wormhole attack, the attacker is not a part of the system but is an outside intruder party.This is launched by using the packet relay method where the attacker transmits a packet between two far-away nodes, disguising them as each other’s neighbours.The diagram in Fig.2b shows a high-speed out-of-band channel established between two distant nodes, creating the illusion of neighbourhood at both ends of the wormhole tunnel [3].

    Figure 2:(a) Encapsulation (b) high transmission power channel

    In the literature, many techniques have been proposed to tackle this deadly attack [4].We have presented our analysis on competent techniques from the literature in Section 2.There are also significant techniques for the prevention of wormholes in the IoT networks.Surveys have been performed to analyse the effect and value of these techniques [5].Studies have been conducted for a detailed evaluation of the countermeasures of the wormhole attacks in the IoT networks [6].The scheme proposed in this paper has been implemented using the AODV protocol as it allows the scope for energy efficiency in the IoT-based sensor networks [7].The proposed scheme comprises two phases.Phase 1 performs the finding of the suspicious nodes in the network.Phase 2 performs the detection of a possible wormhole on the suspicious nodes.If the wormhole links and the malicious nodes are found, the tunnel is disconnected, and a secure communication path is reestablished.The malicious nodes are reconfigured for the next rounds of communication.We have implemented our scheme in a simulation in MATLAB 2019, and have presented the results of our technique with the help of graphs and tables.We have also compared our results with the results of a competent existing technique [8] showing the improved performance of the ESWI technique.

    The major contributions of this research are:

    (1) The developed ESWI technique detects and eliminates the wormholes during communication in IoT-based WSN.

    (2) The ESWI technique has been designed to be simple and less complicated for efficient wormhole handling with minimum overheads.

    (3) The ESWI technique has been made to consume less energy with a quality output to optimise the resources in a constrained IoT-based WSN.

    (4) The performance results of the ESWI technique have been compared with a competent technique for the performance evaluation.

    The rest of the paper is presented as follows:Section 2 elaborates the literature review with parameter-based analysis of schemes under study; Section 3 presents our proposed scheme with the algorithms and the flowcharts; Section 4 explains the simulation and the results of the proposed scheme; Section 5 concludes our work; and Section 6 provides the directions for the intended future work.

    2 Literature Review

    We have performed an extensive study on the existing techniques against wormhole attacks in WSNs.The findings of our literature study have been categorised and are presented below.

    2.1 Neighbourhood and Connectivity Information-Based Techniques

    Energy Preserving Secure Measure (EPSMAW) with the AODV routing protocol attempts to reduce the false-positive rate in a sparse network.It does not require additional hardware,nor does it cause the transmission overhead.Although malicious nodes can fabricate the neighbourhood lists to manipulate the detection method, they rarely detect wormhole tunnels shorter than 4 hops [8].A Network Neighbourhood and Connectivity Information (NCI)-based method efficiently detects a wormhole attack with a minimised storage cost and without the need for additional hardware.This approach cannot be applied to the dynamic WSN [9].The neighbour discovery and path verification method (NDPV) applies to the AODV protocol and does not need specialised hardware.It has a processing overhead and a low PDR (packet delivery ratio) [10].

    The neighbourhood information and alternate path calculation (NIAPC) works on the AODV routing protocol and shows the detection without high storage requirement but with a high falsepositive for the shorter wormholes [11].A spanning trees-based scheme uses only the connectivity information of the node and its neighbourhood.It does not require additional hardware; hence,it does not increase the cost.The performance is not affected by an increased number of wormholes.It performs well for the longer wormhole paths, but the false positive rate increases in the case of the shorter wormholes [12].The credible neighbour discovery (CREDND) protocol uses the hop difference and the local monitoring based on neighbour information.The internal,as well as the external wormholes, were detected without any additional hardware, and time and energy were also saved.The performance decreases in the case where all the nodes have a different communication range and they conform to another distribution [13].An artificial neural network-based method shows a better detection rate for uniform networks than for non-uniform networks [14].In another article, the author uses the node connectivity information to detect the encapsulation-based wormholes.They propose to increase the connection of the density between the neighbouring nodes.A more precise localisation can lead to even better performance [15].

    2.2 Round-Trip Time-Based Techniques

    An AODV-based RTT mechanism uses the round-trip time (RTT) mechanism where the delay and the system overhead are minimized without the need for specialised hardware.It applies to only the stationary nodes and does not work in a dynamic environment.It is also not able to handle the delays caused by queuing or congestion [16].Another author used the EIGRP protocol-based round-trip time variation technique to identify the shortest path and detect the malicious nodes.It is less complicated and shows a better performance result, but it still needs to be enhanced in terms of the performance and compared to other existing techniques [17].The trust-based wormhole mitigation (TBWM) is implemented in the AODV protocol using the two-tier round-trip time concept.It does not require additional hardware or tight clock synchronisation.The throughput still needs to be improved [18].

    2.3 Transmission Power-Based Techniques

    The MAODV technique implements a Modified AODV protocol to identify malicious nodes by measuring their transmission power.This method shows an increased latency [19].The MHTPW (Mitigation of High transmission power-based wormholes) method uses the AODV protocol where the throughput and the PDR are enhanced while the delay is reduced.The repeated authentication may increase the delay in communication [20].

    2.4 Statistical Method-Based Techniques

    The poster mechanism in the duty cycling network detects the wormholes using the information of the delays caused in synchronised communication.This paper shows the detection results for only the type of wormholes that were launched by the node pairs which are both hidden and collaborative [21].The wormhole-resistant hybrid technique (WRHT) uses the watchdog and the Delphi method to calculate the probability of the wormhole’s existence.This method detects all types of wormholes without requiring additional hardware.However, the performance is decreased due to the independent use of the watchdog and Delphi schemes [22].The SPRT-based method uses the sequential probability ratio test to detect the wormholes in the network.Using this method, the wormholes were detected more rapidly, using only a few nodes in the high mobility environment.However, it has a high false-positive ratio [23].

    The distance & maximum likelihood estimation (DMLE) method is applied with the range-free localisation technique.This method does not put the computational load on the resource-constrained unknown nodes, however the detection rates require improvement and a high anchor-to-sensor node ratio increases the cost of the network [24].Another technique (TESRP) is a sequence number method-based scheme that applies two sequence numbers to prevent the wormholes, but it is still prone to node capture threats [25].The EFM technique suggests encapsulating the message and adding extra four-bit information to the message which would be de-capsulated at the destination.It also suggests dividing the message into several fragments and sending them via different routes.It has a poor PDR result [26].The intrusion prevention system (IPS) with the AODV routing protocol has a possibly increased overhead and increased communication cost due to the repeated broadcasting about the malicious nodes [27].

    In another article, the hound packets are used in a modified AODV protocol for the wormhole launched by an out-of-band channel and the encapsulation [28].This method additionally requires the time for processing the hound packets which contributes to the failure in detecting the attacks in a smaller network.In another method, the author uses the distributed detection algorithm for the wormholes launched by using an out-of-band channel [29].This method uses the transmission direction of the deviated innovative packets and produces a high processing cost when applied in a dense network.Another method uses a hybrid approach to detect the encapsulation and the packet relay-based wormholes, and uses the location and neighbour-connectivity information of the node [30].

    2.5 Techniques Based on Location Information and Localisation

    The location information and time synchronisation technique (LITS) detects the wormholes using simple hardware without any complicated calculations.This technique requires a clocksynchronisation module which increases the cost of the network [31].On the contrary, the AWDV-hop based method finds the suspicious nodes to evaluate the localisation error for them and drop them if they are malicious.This method has a false positive detection and an increased localisation error in the scenario of an uneven distribution of the nodes [32].In another technique,the location-based information is used to detect an out-of-band channel-based wormhole.This location-aware scheme follows the adjacent nodes by obtaining their location information from their neighbour nodes.This scheme produces an increased overhead due to the repeated hops.It also gives a high false-positive value and is only applicable in dense networks [33].

    2.6 Authentication Key-Based Techniques

    A method in the (EDAK) management and the generation process generates dynamic keys using the pre-existing information.It does not need a secure channel or a sharing phase.The increased flexibility and scalability make it applicable to large networks.It should include data integrity and freshness [34].The Hybrid key pre-distribution scheme (HKP-HD) combines the q-composite scheme and the polynomial scheme to reduce the probability of the node capture attack [35].The polynomial pool-based key-pre-distribution (PPKP) scheme uses the channel shifting method.It gives the adversary an impression of communication being carried out at a different channel rather than itself.However; it is successful only at the initial stage because once the intruder obtains the current channel information, the network will be prone to both external and internal wormhole attacks [36].

    2.7 Analysis of Schemes

    The literature study in this paper explores the summary metrics mostly used for the performance comparison in the wormhole detection and prevention-based schemes.It also explores the findings and the limitations of these schemes.It has been observed that the detection rate is improved in EPSMAW [8], NIAPC [11], ANN-based [14], SPRT [23], and AWDV-hop [32] and eventually decreases for WRHT [22] and DMLE [24].The security is improved in many techniques, especially in the authentication-based schemes, and energy consumption is reduced in these schemes.The localisation error rate is reduced in [24] and [32].In an ANN-based scheme [14], the false-positive and false-negative detection rates are improved.The schemes NCI [9], NIAPC [11],and HKP-HD [35] minimise the storage costs, whereas the other schemes have not discussed it.The EPSMAW [8] dominates with a 100% detection rate.The PDR varies from 80 to 98% in most of the schemes but [20] lags with 22% and TESRP [25] excels with 100% PDR.In most of the schemes, special hardware is not required to mitigate the wormhole attacks except for in DMLE [24] that requires additional cost for hardware, and LITS [31] uses simple hardware.

    3 Proposed ESWI Technique

    We propose a lightweight and less energy-consuming scheme for the detection of a wormhole attack in IoT-based WSNs.We identified the suspicious links by using the information of the geographical distance between the sender and the receiver nodes.The detection algorithm is then run on the suspicious nodes, and the wormholes are detected by evaluating the hop-count time gap using the hop-time stamp.Tab.1 explains the important terms and the variables used in the algorithm explained later.

    Table 1:Notations for scheme algorithms

    3.1 Phase 1:Finding Suspicious Nodes

    As the communication starts and the wormholes are launched in the network, we need to find the malicious nodes and the wormhole links.To identify the suspicious nodes, we use the time travelled information, as shown in Fig.3.We call the functions to evaluate the estimated time for the packets to move from a source to its destination.We mark the time of arrival of the packets when they reach the destination, and calculate the difference between the estimated time of arrival and the actual time of arrival to obtain the duration.This difference is compared with a predefined distance threshold.If this value exceeds the threshold, then we mark the communicating nodes as suspicious nodes.The detection algorithm is then run for the suspicious nodes to locate the wormhole links.

    Algorithm 1:Finding Suspicious Links and Nodes Step 0 Deploy sensor network,configure nodes,establish communication Step 1 Set transmission time threshold, Tt=R ?d Step 2 Embed,source and destination address, St with data packets,add hop time stamp at each hop Step 3 For arriving packets from Ns f travel by packat node Nr, Mark stamp Rt Step 4 Find duration oets, Dt=Rt ?St Step 5 Check if (Dt>Tt)then:Step 6 Mark suspicious flag S=“TRUE,” suspicious node found Step 7 Call Detection algorithm for suspicious nodes Ns and Nr Else:Step 7 Consider the path Safe and continue communication

    The flowchart in the Fig.3 describes the working of the first phase of our algorithm in which we find the suspicious nodes.The wormhole detection algorithm is run for the suspicious nodes in the second phase.The flowchart describes the checking of a condition and the decision of declaring the nodes as either suspicious or not by choosing between the true or false options.

    Figure 3:Flowchart of algorithm used to find suspicious nodes

    3.2 Phase 2:Detecting and Handling Wormhole Attack

    Once a link is found to be suspicious, we run a detection algorithm on the suspicious nodes to detect the wormhole.The detection algorithm is based on two methods; the first method checks if the hop-interval duration surpasses the threshold and the second method checks the existence of a high-power transmission channel.If either is found, a wormhole path is confirmed, and the malicious nodes are identified, as shown in Fig.4.We disconnect the wormhole path, kill the malicious nodes and re-establish a secure path for safe communication between the source and the destination nodes.Later, we reconfigure the dead nodes for the next rounds of the communication.

    Algorithm 2:Detection and Handling of Wormhole Link and Malicious Nodes Step 0 Access suspicious sender node Ns and its other end Nr and their information,Step 1 Set hop interval threshold, Th=dn ?R Step 2 Check if ((H c==1) is True then Step 3 Check if (Hi>Th)then Step 4 Mark W=“TRUE”else Step 4 Mark W=“FALSE”Step 5 Check if (W==“TRUE”)Then Step 6 Delink path between Ns and Nr Step 7 Re-establish communication by secure route Step 8 Allow Ns and Nr to reconfigure Else Step 6 Consider path safe and allow to continue communication

    The flowchart in Fig.4 describes the detection of a wormhole link if it is present between the suspicious nodes.The hop-interval duration indicates if the packets have skipped any hops,indicating the presence of a wormhole link.When the packet travels on a wormhole path, its hop-count does not increase except for once at the last hop while reaching the destination.

    Figure 4:Flowchart of the detection of malicious nodes and wormhole links

    We check the possibility of skipped hops to identify the wormhole links.In the second part of the condition, we also check whether a high-speed private channel exists between the source and destination.If this condition is true, then this private channel represents an external wormhole.Therefore, we eliminate this link, reconfigure the attacked nodes and add them to the monitoring list for the next few rounds of communication.We re-establish secure communication between the nodes and make the network safely functional again.

    4 Simulation and Results Evaluation

    The network simulation was performed in MATLAB 2019.The AODV routing protocol was used and the random wormholes were launched in our simulation.The visualisation of the network, the experiment of the simulation, and the results of our detection algorithm are discussed below.

    4.1 Simulation Environment

    The parameters involved in our simulation experiment and their values are given in Tab.2.

    Table 2:Parameter values for the simulation environment

    4.2 Experiment

    The following series of graphs elaborate the whole experiment stepwise, describing how a wormhole attack is detected and network security is enhanced.We experimented with three network sizes, including 50, 100 and 150 nodes.The simulation for each set of nodes is explained with two images, one showing a network under attack and the other showing a removed wormhole and a new and safe communication path.

    4.2.1 Simulation for 50 Node Network Size

    A sensor network with the size of 50 nodes is shown under a wormhole attack in Fig.5a,where node 22 is the source and node 14 is the destination.A random wormhole path exists between nodes 1 and 32.It is clear that the security of the communication has been compromised.

    It can be seen in Fig.5b that the wormhole link has been eliminated.The malicious nodes have been marked, while a secure path has been established between the source node and the destination node.

    4.2.2 Simulation for 100 Node Network Size

    An under-attack network with the size of 100 nodes is shown in Fig.6a.Here, node 12 is the source and node 39 is the destination.A wormhole path exists between nodes 80 and 49.The security of the network is compromised due to the data packets entering the wormhole.

    It is shown in Fig.6b that the wormhole link has been disconnected, and the malicious nodes have been killed and marked for reconfiguration.A secure communication path has been established between the source and destination nodes.

    Figure 5:(a) Attacked & security compromised (b) wormhole eliminated & secure path

    Figure 6:(a) Attacked & security compromised (b) wormhole eliminated & secure path

    4.2.3 Simulation for 150 Node Network Size

    The image in Fig.7a shows an under-attack network, where node 74 is the source and node 30 is the destination.A wormhole exists from nodes 85 to 50.It is clear that the message is diverted due to the wormhole and the communication has been compromised.

    It can be seen in Fig.7b that the wormhole path has been de-linked and the malicious nodes have been killed.A new and safe path has been established between the source and destination nodes.

    Figure 7:(a) Attacked & security compromised (b) wormhole eliminated & secure path

    4.3 Evaluation Parameters

    The ESWI technique has shown exceptional performance.The evaluation parameters are:throughput (kbps), end-to-end delay (seconds), packet delivery ratio%, detection rate% and energy consumption (joules).This technique gives a 99% detection rate and 99% packet delivery ratio.Our false-positive values were 0.0187, 0.1642, and 0.0364 for 50, 100 and 150 nodes, respectively.These values are very low compared to a few techniques in the literature that have described their false positive values [12,14,23].The other important parameters are discussed below.

    4.3.1 Detection Rate

    This is the proportion of wormholes detected correctly by the security algorithm to all of the wormholes launched in the network.It is a measure of the performance of the security algorithm applied in the network [37].It is usually measured in terms of % percentage, and is evaluated with the formula, where DR is the detection rate as DR=(Wd)/(Wd+Wt), Wd is the number of the detected wormholes, and Wt is the total number of the launched wormholes.The detection rate results of the ESWI technique are parallel to the EPSMAW [8].

    4.3.2 Packet Delivery Ratio

    This is the ratio of the total packets delivered successfully to the total number of packets transmitted in a communication session [38].The performance of a network increases with an increase in the packet delivery ratio.It is measured in terms of % percentage and evaluated with a formula, where PDR is the packet delivery ratio, Pt is the transmitted packets and Pr is the packets received in a communication round.It is formulated as, PDR=(Pr)/(Pt)for the total packet delivery ratio in a transmission session.The PDR of the ESWI technique is parallel to that of EPSMAW [8].

    4.3.3 Throughput

    The throughput of a sensor network is an important factor for the performance evaluation.It is the number of packets successfully received per-second in a transmission session between the source and destination nodes [38].An increased throughput signifies an excellent speed of communication and increased performance.It is measured in unit kbps (kilobits per second).It is evaluated with the formula, where Th is the throughput, Th=sec and Pr is the packets received.The graph in Fig.8a shows the increased throughput (kbps) values of 56.5, 79.1, and 124.7 for network sizes of 50, 100, and 150 nodes, respectively.

    Figure 8:Results comparison of the ESWI and EPSMAW [8] techniques for (a) throughput,(b) end-to-end delay, and (c) energy consumption

    4.3.4 End-to-End Delay

    It is the time required by the packets to get from the source to the destination.The processing and queuing time are added to it if they are not zero.This parameter signifies the speed and the efficiency of the network [38].It is measured in seconds or milliseconds and is evaluated using the formula, D=λ?Ti+td ?(N ?1), whereλis the number of hops, Ti is the time delay by the considered packet, N is the total number of nodes, td is the transmission delay and D is the total end-to-end delay.This is an important parameter in terms of the performance of a sensor network.The ESWI technique has been designed to give a reduced end-to-end delay, which is 0.0709 s, 0.0506 s, and 0.0321 s, as shown in Fig.8b.

    4.3.5 Energy Consumption

    Energy is a limited resource in an IoT-based WSN.The algorithms used for other functionalities such as routing, localisation and security, etc.are required to consume less energy while performing efficiently [8].The unit of the consumed energy is the simple Joule.There is no specific formula for calculating the consumed energy.However, this research modified the simplest formula given in [39] into the formula Ed=(λi ?(ET+ER), where ET is the transmitting energy, ER is the receiving energy,λi is the current hop on the routed path, and Ed is the sum of the total energy consumed on all the hops of the path from the sender to the receiver.This is the most important parameter in our research as energy is a critical resource.The ESWI technique consumes 18.1 J for 50 nodes, 15.4 J for 100 nodes, and 29.6 J for 150 nodes, while [8] consumes 70 J, 21 J, and 129 J, respectively.Fig.8c shows our results compared with a good existing technique.

    4.4 Results Comparison

    We have compared the results of the ESWI technique with those of the EPSMAW [8]in Fig.8.

    We can see that the throughput (kbps) of our scheme, as shown in Fig.8a, is improved and increased in all three scenarios compared to the best-case value of [8].The end-to-end delay of our scheme is improved and reduced; as shown in Fig.8b, our technique gives a delay of fewer than 0.1 seconds in all three scenarios, which is even lower than the best-case value of 0.2 from [8].

    Our algorithm has performed well in all three scenarios in the case of energy consumption,as shown in Fig.8c.Our best case of energy consumption is for the network size of 50 and 100 nodes.The maximum energy is consumed for 150 nodes which are only 33 joules and is greatly reduced compared to [8].

    5 Conclusion

    The IoT-based WSNs are prone to many security attacks of which the wormhole attack is quite challenging.There has been ongoing research and development on the security against these attacks to propose a reliable solution.Initially, a detailed literature review was conducted through which the major limitations of the existing techniques were found.These limitations are the low detection rate, a poor packet delivery ratio, a decreased throughput, and high energy consumption.This study has provided the motivation for the research and for developing a technique against the wormhole attack with improved performance.The ESWI algorithm has been designed by simplifying the detection and handling process to give an excellent performance while consuming less energy from the network.Initially, the suspicious nodes are identified by using the transmission-time information between the sender and receiver nodes.Later, the detection procedure is performed on the suspicious nodes by using the hop-count and hop interval duration.The simulation for the ESWI technique shows a result of 99% for both the detection rate and the packet delivery ratio.It has given an increased throughput and a decreased end-to-end delay along with reducing the energy consumption in comparison with a competent existing technique.

    6 Future Work

    In the future, we will further review the impact of the wormhole attacks on the secure routing and data sharing schemes.We intend to explore the metaheuristic approaches for the optimisation of resources and to enhance the performance of the security algorithms for the IoT-based WSNs.

    Funding Statement:Taif University Researchers Supporting Project number (TURSP-2020/98), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    一本久久精品| 男人舔女人的私密视频| 曰老女人黄片| 午夜激情av网站| 亚洲五月色婷婷综合| 丝袜在线中文字幕| 丝袜喷水一区| 少妇被粗大的猛进出69影院| 欧美激情 高清一区二区三区| 两个人看的免费小视频| 国产欧美日韩综合在线一区二区| 久久精品亚洲av国产电影网| 精品免费久久久久久久清纯 | 在线精品无人区一区二区三| 国产精品.久久久| 精品人妻1区二区| 极品少妇高潮喷水抽搐| 国产又色又爽无遮挡免| 51午夜福利影视在线观看| 黄片大片在线免费观看| 欧美一级毛片孕妇| 男男h啪啪无遮挡| 国产精品久久久久久精品电影小说| 每晚都被弄得嗷嗷叫到高潮| 80岁老熟妇乱子伦牲交| 啦啦啦免费观看视频1| www.自偷自拍.com| 久久精品aⅴ一区二区三区四区| 亚洲国产日韩一区二区| 久久久久国内视频| 老鸭窝网址在线观看| 伊人亚洲综合成人网| 成人亚洲精品一区在线观看| 亚洲五月婷婷丁香| 超碰成人久久| 亚洲少妇的诱惑av| 国产精品影院久久| a级毛片黄视频| 久久99热这里只频精品6学生| 日本wwww免费看| 青草久久国产| 一级,二级,三级黄色视频| 国产伦人伦偷精品视频| 久久人妻福利社区极品人妻图片| 男人舔女人的私密视频| 国产人伦9x9x在线观看| 法律面前人人平等表现在哪些方面 | 日本精品一区二区三区蜜桃| 亚洲专区国产一区二区| 国产精品免费大片| 久久人人爽av亚洲精品天堂| 美女扒开内裤让男人捅视频| 精品国产一区二区久久| 国产精品1区2区在线观看. | 深夜精品福利| 亚洲视频免费观看视频| 国产淫语在线视频| 国产日韩欧美亚洲二区| 另类精品久久| 999久久久精品免费观看国产| 国产精品99久久99久久久不卡| 久久人妻熟女aⅴ| 女警被强在线播放| 久久国产精品大桥未久av| 精品乱码久久久久久99久播| 精品国产超薄肉色丝袜足j| 大片电影免费在线观看免费| 国产精品 国内视频| 日韩精品免费视频一区二区三区| 黄色视频在线播放观看不卡| 高潮久久久久久久久久久不卡| 99热国产这里只有精品6| a级毛片在线看网站| 欧美黑人欧美精品刺激| 亚洲三区欧美一区| netflix在线观看网站| 欧美一级毛片孕妇| 国产精品 国内视频| 国产亚洲欧美在线一区二区| 热99久久久久精品小说推荐| 美女视频免费永久观看网站| 色播在线永久视频| av又黄又爽大尺度在线免费看| a在线观看视频网站| 欧美激情 高清一区二区三区| 麻豆乱淫一区二区| av天堂久久9| 汤姆久久久久久久影院中文字幕| 亚洲国产毛片av蜜桃av| 国产精品二区激情视频| 国产精品免费大片| 男女之事视频高清在线观看| 久久人人爽人人片av| 夜夜夜夜夜久久久久| 亚洲精品久久成人aⅴ小说| 亚洲 欧美一区二区三区| 精品亚洲成国产av| bbb黄色大片| 91精品国产国语对白视频| 另类亚洲欧美激情| 久久热在线av| 69av精品久久久久久 | 免费观看a级毛片全部| 国产淫语在线视频| 国产精品久久久人人做人人爽| 午夜影院在线不卡| 搡老岳熟女国产| 国产97色在线日韩免费| 久久久精品免费免费高清| 欧美激情久久久久久爽电影 | 欧美在线黄色| videos熟女内射| 国产欧美日韩一区二区三区在线| 精品卡一卡二卡四卡免费| 极品人妻少妇av视频| 亚洲av日韩在线播放| 国产精品九九99| 人人妻人人澡人人爽人人夜夜| 80岁老熟妇乱子伦牲交| 国产亚洲一区二区精品| 精品国产国语对白av| 亚洲av男天堂| 男女免费视频国产| 国产xxxxx性猛交| 日韩 亚洲 欧美在线| 精品一区二区三区四区五区乱码| 美女大奶头黄色视频| 亚洲男人天堂网一区| 丁香六月天网| 97人妻天天添夜夜摸| av国产精品久久久久影院| √禁漫天堂资源中文www| 在线观看免费午夜福利视频| 亚洲一区二区三区欧美精品| 中文字幕另类日韩欧美亚洲嫩草| 免费在线观看完整版高清| www.999成人在线观看| 国产野战对白在线观看| 国产精品99久久99久久久不卡| 国产精品久久久久成人av| 777米奇影视久久| 国产成人一区二区三区免费视频网站| 大香蕉久久成人网| 亚洲性夜色夜夜综合| 欧美午夜高清在线| 精品人妻一区二区三区麻豆| 天堂俺去俺来也www色官网| 亚洲av片天天在线观看| 菩萨蛮人人尽说江南好唐韦庄| 99国产精品一区二区蜜桃av | 欧美日韩亚洲综合一区二区三区_| 亚洲,欧美精品.| 欧美变态另类bdsm刘玥| 精品一区二区三卡| 18禁国产床啪视频网站| 午夜免费观看性视频| 国产成人欧美| 亚洲精品国产av成人精品| 看免费av毛片| 菩萨蛮人人尽说江南好唐韦庄| 母亲3免费完整高清在线观看| 大型av网站在线播放| 欧美在线一区亚洲| 国产精品99久久99久久久不卡| 丁香六月欧美| 亚洲欧美一区二区三区久久| 国产成人欧美在线观看 | 欧美大码av| 三级毛片av免费| 久久人妻福利社区极品人妻图片| 蜜桃在线观看..| 亚洲欧美色中文字幕在线| 欧美精品一区二区大全| 黄色视频在线播放观看不卡| 菩萨蛮人人尽说江南好唐韦庄| 久久av网站| 无限看片的www在线观看| 亚洲熟女精品中文字幕| 一区二区日韩欧美中文字幕| 久久ye,这里只有精品| 国产精品二区激情视频| 亚洲欧美清纯卡通| 99香蕉大伊视频| 好男人电影高清在线观看| av网站在线播放免费| 电影成人av| 91精品三级在线观看| 亚洲国产精品999| kizo精华| 国产精品九九99| 最近中文字幕2019免费版| 国内毛片毛片毛片毛片毛片| 天堂中文最新版在线下载| 国产欧美亚洲国产| 欧美激情高清一区二区三区| 成年美女黄网站色视频大全免费| 亚洲国产欧美一区二区综合| 满18在线观看网站| 亚洲av国产av综合av卡| 一级片免费观看大全| cao死你这个sao货| 亚洲av国产av综合av卡| 欧美成狂野欧美在线观看| 久久精品久久久久久噜噜老黄| 极品人妻少妇av视频| 精品欧美一区二区三区在线| 亚洲国产中文字幕在线视频| 50天的宝宝边吃奶边哭怎么回事| 国产av国产精品国产| 91精品国产国语对白视频| 男人爽女人下面视频在线观看| 色老头精品视频在线观看| 97人妻天天添夜夜摸| 国产无遮挡羞羞视频在线观看| 18禁观看日本| 精品人妻1区二区| 欧美97在线视频| 精品乱码久久久久久99久播| 大型av网站在线播放| 久久精品亚洲av国产电影网| 在线av久久热| 亚洲av电影在线观看一区二区三区| 日本av手机在线免费观看| 大片免费播放器 马上看| 欧美日韩亚洲国产一区二区在线观看 | cao死你这个sao货| 国产男女超爽视频在线观看| 他把我摸到了高潮在线观看 | 热99re8久久精品国产| 母亲3免费完整高清在线观看| 51午夜福利影视在线观看| 在线精品无人区一区二区三| 国产野战对白在线观看| 亚洲成人免费电影在线观看| 国产av国产精品国产| 亚洲精品乱久久久久久| 国产熟女午夜一区二区三区| 满18在线观看网站| 国产欧美日韩精品亚洲av| 少妇精品久久久久久久| 国产在线一区二区三区精| 精品视频人人做人人爽| 国产精品二区激情视频| 成在线人永久免费视频| 中文字幕av电影在线播放| 高潮久久久久久久久久久不卡| 亚洲欧美一区二区三区久久| 水蜜桃什么品种好| 午夜视频精品福利| 国产xxxxx性猛交| 在线看a的网站| 免费观看a级毛片全部| 最新在线观看一区二区三区| 亚洲 欧美一区二区三区| 秋霞在线观看毛片| 国产主播在线观看一区二区| 国产男女超爽视频在线观看| 欧美成狂野欧美在线观看| 亚洲国产中文字幕在线视频| 午夜福利视频精品| 韩国高清视频一区二区三区| 久久精品aⅴ一区二区三区四区| 久久亚洲国产成人精品v| 叶爱在线成人免费视频播放| 一进一出抽搐动态| av一本久久久久| 欧美 亚洲 国产 日韩一| 妹子高潮喷水视频| 国产在线观看jvid| cao死你这个sao货| 中文字幕最新亚洲高清| 国产无遮挡羞羞视频在线观看| 久久久久精品人妻al黑| 亚洲五月婷婷丁香| 91大片在线观看| 一本综合久久免费| 亚洲成人免费av在线播放| 少妇裸体淫交视频免费看高清 | 国产成人a∨麻豆精品| 欧美日韩黄片免| 久久狼人影院| 免费女性裸体啪啪无遮挡网站| 女人精品久久久久毛片| 高清在线国产一区| 午夜福利视频精品| 男男h啪啪无遮挡| 91大片在线观看| 欧美中文综合在线视频| 夜夜夜夜夜久久久久| 一区二区av电影网| av福利片在线| 免费人妻精品一区二区三区视频| 亚洲欧美一区二区三区黑人| 一个人免费在线观看的高清视频 | 欧美97在线视频| 女人高潮潮喷娇喘18禁视频| 国产深夜福利视频在线观看| 丝袜在线中文字幕| 另类精品久久| 每晚都被弄得嗷嗷叫到高潮| 亚洲精品国产区一区二| 国产精品香港三级国产av潘金莲| 天天添夜夜摸| 免费在线观看黄色视频的| 一级毛片电影观看| 中文字幕精品免费在线观看视频| 婷婷成人精品国产| 欧美激情 高清一区二区三区| 久久99一区二区三区| 亚洲av男天堂| 国产1区2区3区精品| 亚洲欧美激情在线| 美女中出高潮动态图| 久久女婷五月综合色啪小说| 最黄视频免费看| 成人18禁高潮啪啪吃奶动态图| 亚洲精品第二区| 欧美日本中文国产一区发布| 国产精品秋霞免费鲁丝片| 国产亚洲精品一区二区www | 国产黄频视频在线观看| 午夜成年电影在线免费观看| 一区二区三区乱码不卡18| 成人国产一区最新在线观看| 99国产精品免费福利视频| 十八禁人妻一区二区| 欧美国产精品一级二级三级| 夜夜骑夜夜射夜夜干| 18禁观看日本| 一二三四社区在线视频社区8| 日韩大码丰满熟妇| 久久久国产一区二区| 中文字幕精品免费在线观看视频| 亚洲专区中文字幕在线| 欧美黑人欧美精品刺激| 中亚洲国语对白在线视频| 免费不卡黄色视频| netflix在线观看网站| 天天躁夜夜躁狠狠躁躁| 老汉色av国产亚洲站长工具| 91国产中文字幕| 久久ye,这里只有精品| 国产精品免费视频内射| 午夜免费观看性视频| 人成视频在线观看免费观看| 色综合欧美亚洲国产小说| 国产在视频线精品| 精品人妻一区二区三区麻豆| 午夜福利免费观看在线| 国产成人av教育| 国产99久久九九免费精品| 亚洲中文字幕日韩| 国产男女超爽视频在线观看| 高清av免费在线| 又紧又爽又黄一区二区| 宅男免费午夜| 日本精品一区二区三区蜜桃| 亚洲精品久久成人aⅴ小说| 中亚洲国语对白在线视频| 日韩大码丰满熟妇| 国产高清国产精品国产三级| 水蜜桃什么品种好| 在线观看免费视频网站a站| 99国产精品一区二区蜜桃av | 成年av动漫网址| 人人妻人人澡人人爽人人夜夜| 欧美日韩一级在线毛片| 免费一级毛片在线播放高清视频 | e午夜精品久久久久久久| 91精品国产国语对白视频| 十八禁高潮呻吟视频| 美女脱内裤让男人舔精品视频| 极品人妻少妇av视频| 精品国产国语对白av| 十八禁高潮呻吟视频| 69av精品久久久久久 | 熟女少妇亚洲综合色aaa.| av电影中文网址| 男人添女人高潮全过程视频| av超薄肉色丝袜交足视频| 91大片在线观看| 黄色 视频免费看| 男女床上黄色一级片免费看| 精品久久久久久电影网| 9热在线视频观看99| 在线天堂中文资源库| 国产精品秋霞免费鲁丝片| 国产在视频线精品| 亚洲国产毛片av蜜桃av| 欧美xxⅹ黑人| 制服人妻中文乱码| 蜜桃国产av成人99| 久久女婷五月综合色啪小说| 18禁裸乳无遮挡动漫免费视频| 9热在线视频观看99| 欧美老熟妇乱子伦牲交| 亚洲精品久久久久久婷婷小说| 色视频在线一区二区三区| 亚洲全国av大片| 成年人免费黄色播放视频| 人人妻人人澡人人看| 99国产精品一区二区三区| 考比视频在线观看| 久久久国产成人免费| 中文字幕精品免费在线观看视频| 国产欧美日韩一区二区三 | 成人18禁高潮啪啪吃奶动态图| 国产亚洲一区二区精品| 在线精品无人区一区二区三| e午夜精品久久久久久久| 免费在线观看影片大全网站| 伊人亚洲综合成人网| 99九九在线精品视频| 国产淫语在线视频| 男女边摸边吃奶| 青青草视频在线视频观看| 纯流量卡能插随身wifi吗| 肉色欧美久久久久久久蜜桃| 国产精品免费大片| 999精品在线视频| 久久人妻福利社区极品人妻图片| 黑人猛操日本美女一级片| 亚洲精品国产av蜜桃| 国产成人精品久久二区二区91| 亚洲精品久久午夜乱码| 国产野战对白在线观看| 伊人亚洲综合成人网| 久久综合国产亚洲精品| 伊人久久大香线蕉亚洲五| 久久人妻熟女aⅴ| 黑人猛操日本美女一级片| 伊人久久大香线蕉亚洲五| 黄频高清免费视频| 夫妻午夜视频| 国产精品国产三级国产专区5o| 深夜精品福利| e午夜精品久久久久久久| 在线 av 中文字幕| 亚洲国产精品999| 亚洲国产av新网站| 国产老妇伦熟女老妇高清| 国产成人精品在线电影| 午夜久久久在线观看| 日韩制服丝袜自拍偷拍| 香蕉丝袜av| 中文字幕最新亚洲高清| 日韩制服丝袜自拍偷拍| 国内毛片毛片毛片毛片毛片| 亚洲全国av大片| 一个人免费在线观看的高清视频 | 国产日韩一区二区三区精品不卡| videos熟女内射| 如日韩欧美国产精品一区二区三区| 亚洲精品国产av成人精品| 国产精品香港三级国产av潘金莲| 国产色视频综合| 一区二区三区乱码不卡18| 久久毛片免费看一区二区三区| 久久这里只有精品19| 亚洲欧美精品综合一区二区三区| 亚洲av日韩精品久久久久久密| 国产精品免费大片| 亚洲精品国产av蜜桃| 国产精品久久久久久人妻精品电影 | 视频区欧美日本亚洲| 亚洲国产中文字幕在线视频| 女人被躁到高潮嗷嗷叫费观| 满18在线观看网站| 一级毛片女人18水好多| 丁香六月天网| 丝袜人妻中文字幕| 一区二区三区乱码不卡18| 1024香蕉在线观看| 三级毛片av免费| 一级黄色大片毛片| 国产av精品麻豆| av天堂久久9| 搡老岳熟女国产| 精品久久久久久电影网| 天天躁夜夜躁狠狠躁躁| 黄片大片在线免费观看| 国产免费一区二区三区四区乱码| 在线精品无人区一区二区三| 老司机福利观看| 亚洲全国av大片| 亚洲av国产av综合av卡| 我要看黄色一级片免费的| 亚洲精品美女久久久久99蜜臀| 亚洲国产中文字幕在线视频| 日本91视频免费播放| 日本撒尿小便嘘嘘汇集6| 亚洲国产成人一精品久久久| 高清黄色对白视频在线免费看| 国产成人av激情在线播放| 在线观看人妻少妇| 中文欧美无线码| 男人爽女人下面视频在线观看| 国产三级黄色录像| 欧美久久黑人一区二区| 国产日韩欧美在线精品| 亚洲国产av影院在线观看| 国产无遮挡羞羞视频在线观看| 母亲3免费完整高清在线观看| 欧美人与性动交α欧美软件| 女人久久www免费人成看片| 搡老乐熟女国产| 欧美av亚洲av综合av国产av| 久久精品久久久久久噜噜老黄| 久久久久久免费高清国产稀缺| 免费观看人在逋| 国产1区2区3区精品| 黄片小视频在线播放| 少妇的丰满在线观看| 天天影视国产精品| 91麻豆av在线| 国产成人系列免费观看| 狂野欧美激情性xxxx| 欧美97在线视频| 男女国产视频网站| 人妻一区二区av| 50天的宝宝边吃奶边哭怎么回事| 日韩,欧美,国产一区二区三区| 久久 成人 亚洲| 免费高清在线观看日韩| 精品高清国产在线一区| 99国产精品免费福利视频| 国产男女内射视频| 免费少妇av软件| 国产区一区二久久| 三上悠亚av全集在线观看| 久久精品亚洲av国产电影网| 黑人巨大精品欧美一区二区mp4| 欧美亚洲 丝袜 人妻 在线| 黑人巨大精品欧美一区二区mp4| 亚洲黑人精品在线| 国产亚洲精品一区二区www | 欧美黄色淫秽网站| 好男人电影高清在线观看| 午夜精品久久久久久毛片777| 国产亚洲av高清不卡| 美女大奶头黄色视频| 欧美国产精品va在线观看不卡| 国产精品一区二区在线观看99| 久久99热这里只频精品6学生| 久久亚洲国产成人精品v| 免费久久久久久久精品成人欧美视频| 日本五十路高清| 国产精品亚洲av一区麻豆| av在线app专区| 各种免费的搞黄视频| 涩涩av久久男人的天堂| 18禁裸乳无遮挡动漫免费视频| 人人妻,人人澡人人爽秒播| 最黄视频免费看| 老汉色∧v一级毛片| 国产精品偷伦视频观看了| 亚洲五月色婷婷综合| 国产精品久久久久久人妻精品电影 | 亚洲av电影在线进入| 亚洲精品av麻豆狂野| 十八禁网站免费在线| 精品一区在线观看国产| 一区福利在线观看| 亚洲成国产人片在线观看| av在线app专区| 色婷婷av一区二区三区视频| 好男人电影高清在线观看| 美女主播在线视频| 婷婷成人精品国产| 中文欧美无线码| 国产亚洲一区二区精品| 又大又爽又粗| 又紧又爽又黄一区二区| 中亚洲国语对白在线视频| 下体分泌物呈黄色| 亚洲黑人精品在线| 手机成人av网站| 亚洲精品久久久久久婷婷小说| 久久久久久免费高清国产稀缺| 成人手机av| 午夜精品国产一区二区电影| 国产麻豆69| 午夜免费成人在线视频| 国产极品粉嫩免费观看在线| 女人被躁到高潮嗷嗷叫费观| 99香蕉大伊视频| 三上悠亚av全集在线观看| 精品国产乱码久久久久久小说| 久久久久久人人人人人| 别揉我奶头~嗯~啊~动态视频 | av福利片在线| av天堂在线播放| 一本色道久久久久久精品综合| 天天躁狠狠躁夜夜躁狠狠躁| 一区二区av电影网| 亚洲精品一区蜜桃| av片东京热男人的天堂| 丝袜喷水一区| 亚洲第一欧美日韩一区二区三区 | 国产在视频线精品| 亚洲一码二码三码区别大吗| 手机成人av网站| 1024视频免费在线观看| 精品少妇一区二区三区视频日本电影| 汤姆久久久久久久影院中文字幕| 亚洲五月色婷婷综合| 黄片大片在线免费观看| 999精品在线视频| 女警被强在线播放| 亚洲伊人色综图| 大码成人一级视频| 日韩 欧美 亚洲 中文字幕| 精品久久蜜臀av无| 80岁老熟妇乱子伦牲交| 亚洲国产精品一区三区|