Skip to main content

Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey

  • Conference paper
  • First Online:
Advances in Communication, Devices and Networking

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 462))

Abstract

Wireless sensor networks (WSNs) contain a collection of sensor nodes. These nodes are linked with one another and have low computational power. Wireless sensor network is used for sending messages, data, and other important information over a wireless link for military purpose, environmental monitoring, Health checkups for patents, habitat monitoring, target tracking, and disaster management. Security is most important concept in WSN while sending such important message over wireless link. This permit attacker to penetrate the network and carried out various possible attacks with the purpose of stealing or editing actual data/information. In this paper, discussions are made on different techniques available to avoid and detect wormhole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pathak, S., & Jain, S. (2016). A novel weight based clustering algorithm for routing in MANET. Wireless Networks, 22(8), 2695–2704. https://doi.org/10.1007/s11276-015-1124-82.

  2. Pathak, S., Dutta, N., & Jain, S. (2014). An improved cluster maintenance scheme for mobile AdHoc networks. In IEEE 2014 international conference on advances in computing, communications and informatics, pp. 2117–2121. https://doi.org/10.1109/icacci.2014.6968281.

  3. Pathak, S., & Jain, S. (2017). An optimized stable clustering algorithm for mobile ad hoc networks, EURASIP Journal on Wireless Communications and Networking, Volume (2017), Number (1), pp. 1–11. https://doi.org/10.1186/s13638-017-0832-4.

  4. Pathak S, Jain S: A novel weight based clustering algorithm for routing in MANET, Wireless Networks-The Journal of Mobile Communication, Computation and Information, Springer Link, Vol. 21, No. 8, pp 1–10 (2016).

    Google Scholar 

  5. Parmar Amish, V.B. Vaghela Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol, 7th International Conference on Communication, Computing and Virtualization 2016, ScienceDirect, Procedia Computer Science 79(2016) 700–707.

    Google Scholar 

  6. Pravin Khandare, Prof. N. P. Kulkarni, Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack, International Journal of Computer Trends and Technology- volume 4, Issue-3, pp. 247–252, 2013.

    Google Scholar 

  7. Saurabh Ughade, R.K. Kapoor, Ankur Pandey, An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach, International Journal of Recent Development in Engineering and Technology, 2014.

    Google Scholar 

  8. Nishant Sharma, Upinderpal Singh, Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks, A monthly journal of Computer Science and technology, IJCSMC, Vol. 3, Issue. 2, February 2014, pg. 29–33.

    Google Scholar 

  9. Nishant Sharma, Upinderpal Singh, A Location Based Approach to Prevent Wormhole Attack in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 1, January 2014.

    Google Scholar 

  10. J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L. Tong, Timing based localization of in-band wormhole tunnels in manets, in ACM WiSec, 2010.

    Google Scholar 

  11. R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Network, vol. 13, no. 1, 2007.

    Google Scholar 

  12. Honglong Chen, Wei Lou, Zhi Wang, On providing wormhole-attack-resistant localization using conflicting sets, Wireless Communications and Mobile Computing, vol. 15, pp. 1865, 2015, ISSN 15308669.

    Google Scholar 

  13. Y. C. Hu, A. Perrig and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976–1986, 2003.

    Google Scholar 

  14. Maliheh Shahryari, Hamid Reza Naj, A cluster based approach for wormhole attack detection in wireless sensor networks, Journal of Advanced Computer Science & Technology, 4 (1) (2015) 95–102.

    Google Scholar 

  15. Kehkasa Mirza, Vaidehi Shah, Using Cluster Based Approach Wormhole Attack Detection in Wireless Sensor Network: A Survey, International Journal of Innovative Research in Science, Engineering and Technology, Vol. 4, Issue 12, December 2015.

    Google Scholar 

  16. Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, Yanjun Li, Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks, International Journal of Distributed Sensor Networks, vol. 2014, pp. 1, 2014, ISSN 1550-1329.

    Google Scholar 

  17. Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash Kak, DAWN: Defending against wormhole attacks in wireless network coding systems, INFOCOM 2014 Proceedings IEEE, pp. 664–672, 2014.

    Google Scholar 

  18. Saswati Mukherjee, Matangini Chattopadhyay, Samiran Chattopadhyay, Pragma Kar, Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network, Journal of Computer Networks and Communications, vol. 2016, pp. 1, 2016, ISSN 2090-7141.

    Google Scholar 

  19. Priya Maidamwar and Nekita Chavhan, Research on Qualitative Analysis of LEACH with Wormhole attack in Wireless Sensor Network, International Journal of Advanced Computer Research (ISSN) Volume-3 Number-1 Issue-8 March-2013, https://doi.org/10.5121/ijns.2012.2404.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Diksha Giri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Giri, D., Borah, S., Pradhan, R. (2018). Approaches and Measures to Detect Wormhole Attack in Wireless Sensor Networks: A Survey. In: Bera, R., Sarkar, S., Chakraborty, S. (eds) Advances in Communication, Devices and Networking. Lecture Notes in Electrical Engineering, vol 462. Springer, Singapore. https://doi.org/10.1007/978-981-10-7901-6_92

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7901-6_92

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7900-9

  • Online ISBN: 978-981-10-7901-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics