Abstract
Wireless sensor networks (WSNs) contain a collection of sensor nodes. These nodes are linked with one another and have low computational power. Wireless sensor network is used for sending messages, data, and other important information over a wireless link for military purpose, environmental monitoring, Health checkups for patents, habitat monitoring, target tracking, and disaster management. Security is most important concept in WSN while sending such important message over wireless link. This permit attacker to penetrate the network and carried out various possible attacks with the purpose of stealing or editing actual data/information. In this paper, discussions are made on different techniques available to avoid and detect wormhole attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks, 22(8), 2695–2704. https://doi.org/10.1007/s11276-015-1124-82.
Pathak, S., Dutta, N., & Jain, S. (2014). An improved cluster maintenance scheme for mobile AdHoc networks. In IEEE 2014 international conference on advances in computing, communications and informatics, pp. 2117–2121. https://doi.org/10.1109/icacci.2014.6968281.
Pathak, S., & Jain, S. (2017). An optimized stable clustering algorithm for mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking, Volume (2017), Number (1), pp. 1–11. https://doi.org/10.1186/s13638-017-0832-4.
Pathak S, Jain S: A novel weight based clustering algorithm for routing in MANET, Wireless Networks-The Journal of Mobile Communication, Computation and Information, Springer Link, Vol. 21, No. 8, pp 1–10 (2016).
Parmar Amish, V.B. Vaghela Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol, 7th International Conference on Communication, Computing and Virtualization 2016, ScienceDirect, Procedia Computer Science 79(2016) 700–707.
Pravin Khandare, Prof. N. P. Kulkarni, Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack, International Journal of Computer Trends and Technology- volume 4, Issue-3, pp. 247–252, 2013.
Saurabh Ughade, R.K. Kapoor, Ankur Pandey, An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach, International Journal of Recent Development in Engineering and Technology, 2014.
Nishant Sharma, Upinderpal Singh, Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks, A monthly journal of Computer Science and technology, IJCSMC, Vol. 3, Issue. 2, February 2014, pg. 29–33.
Nishant Sharma, Upinderpal Singh, A Location Based Approach to Prevent Wormhole Attack in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014.
J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L. Tong, Timing based localization of in-band wormhole tunnels in manets, in ACM WiSec, 2010.
R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Network, vol. 13, no. 1, 2007.
Honglong Chen, Wei Lou, Zhi Wang, On providing wormhole-attack-resistant localization using conflicting sets, Wireless Communications and Mobile Computing, vol. 15, pp. 1865, 2015, ISSN 15308669.
Y. C. Hu, A. Perrig and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976–1986, 2003.
Maliheh Shahryari, Hamid Reza Naj, A cluster based approach for wormhole attack detection in wireless sensor networks, Journal of Advanced Computer Science & Technology, 4 (1) (2015) 95–102.
Kehkasa Mirza, Vaidehi Shah, Using Cluster Based Approach Wormhole Attack Detection in Wireless Sensor Network: A Survey, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 12, December 2015.
Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, Yanjun Li, Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, vol. 2014, pp. 1, 2014, ISSN 1550-1329.
Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash Kak, DAWN: Defending against wormhole attacks in wireless network coding systems, INFOCOM 2014 Proceedings IEEE, pp. 664–672, 2014.
Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Pragma Kar, Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network, Journal of Computer Networks and Communications, vol. 2016, pp. 1, 2016, ISSN 2090-7141.
Priya Maidamwar and Nekita Chavhan, Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor Network, International Journal of Advanced Computer Research (ISSN) Volume-3 Number-1 Issue-8 March-2013, https://doi.org/10.5121/ijns.2012.2404.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Giri, D., Borah, S., Pradhan, R. (2018). Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey. In: Bera, R., Sarkar, S., Chakraborty, S. (eds) Advances in Communication, Devices and Networking. Lecture Notes in Electrical Engineering, vol 462. Springer, Singapore. https://doi.org/10.1007/978-981-10-7901-6_92
Download citation
DOI: https://doi.org/10.1007/978-981-10-7901-6_92
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7900-9
Online ISBN: 978-981-10-7901-6
eBook Packages: EngineeringEngineering (R0)