Skip to main content

Countermeasures Against Variants of Wormhole in Wireless Sensor Networks: A Review

  • Conference paper
  • First Online:
International Conference on Intelligent Computing and Smart Communication 2019

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 1707 Accesses

Abstract

Security is an important parameter for wireless sensor network because of the characteristics of a wireless sensor network which includes deployment in unattended environment, remote management, and nodes are easily captured. The major applications include military, health, monitoring environment, etc. The major possible attacks are wormhole, sinkhole, denial of service, selective forwarding, etc. Among all possible attacks, wormhole is a dangerous attack because after launching wormhole tunnel, an attacker can create many other attacks. Two nodes located in two different areas can create tunnel for disturbing routing. In this paper, we have discussed three variants of wormhole, namely, sinkhole-based wormhole, denial of service-based wormhole, black hole-based wormhole, and their countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. B.K. Mishra, M.C. Nikam, P. Lakkadwala, Security against black hole attack in wireless sensor network–a review, in 4th IEEE International Conference on Communication Systems and Network Technologies (2014)

    Google Scholar 

  2. F. Ahmed, Y.-B. Ko, Mitigation of black hole attacks in routing protocol for low power and lossy networks. J. Secur. Commun. Netw. (2016) Wiley, New York

    Google Scholar 

  3. P. Dewal, G.S. Narula, V. Jain, Detection and prevention of black hole attacks in cluster based wireless sensor networks, in 3rd IEEE International Conference on Computing for Sustainable Global Development (2016)

    Google Scholar 

  4. C. Tumrongwittayapak, R. Varakulsiripunth, Detecting sinkhole attack and selective forwarding attack in wireless sensor networks, in 7th International Conference on Information, Communications and Signal Processing (ICICS) (2009), pp. 1–5

    Google Scholar 

  5. S.A. Salehi, M.A. Razzaque, P. Naraei, A. Farrokhtala, Detection of sinkhole attack in wireless sensor networks, in IEEE International Conference on Space Science and Communication (2013), pp. 361–365

    Google Scholar 

  6. M.A. Rassam, A. Zainal, M.A. Maarof, M. Al-Shaboti, A sinkhole attack detection scheme in mintroute wireless sensor networks, in International Symposium on Telecommunication Technologies (2012), pp. 71–75

    Google Scholar 

  7. C.H.E. Ngai, J. Liu, M.R. Lyu, On the intruder detection for sinkhole attack in wireless sensor networks, in IEEE International Conference on Communications, vol. 8 (2006), pp. 3383–3389

    Google Scholar 

  8. Y. Zhang, X. Li, Y. Liu, The detection and defence of DoS attack for wireless sensor network. J. China Univer. Posts Telecommun. 19, 52–56 (2012). Elsevier

    Google Scholar 

  9. D. Mansouri, L. Mokddad, J. Ben-othman, M. Ioualalen, Preventing denial of service attacks in wireless sensor networks. in IEEE Mobile and Wireless Networking Symposium (2015)

    Google Scholar 

  10. P.P. Joby, P. Sengottuvelan, A localised clustering scheme to detect attacks in wireless sensor network. Int. J. Electron. Secur. Digit. Forensics 7(3) (2015)

    Google Scholar 

  11. M. Gunasekaran, S. Periakaruppan, A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. Int. J. Electron. Taylor Francis 1362–3060 (2017). ISSN: 0020–7217 (Print)

    Google Scholar 

  12. S. Fouchal, D. Mansouri, L. Mokdad, M. Iouallalen, Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks. Int. J. Commun Syst. 28, 309–324 (2015)

    Article  Google Scholar 

  13. K. Mazur, B. Ksiezopolski, R. Nielek, Multilevel modeling of distributed denial of service attacks in wireless sensor networks. J. Sens. 2016. Article ID 5017248, 13

    Google Scholar 

  14. K.K. Oo, K.Z. Ye, H. Tun, K.Z. Lin, E.M. Portnov, Enhancement of preventing application layer based on DDOS attacks by using hidden semi-markov model, in 9th International Conference on Genetic and Evolutionary Computing (2015)

    Google Scholar 

  15. M. Motamedi, N. Yazdani, Detection of black hole attack in wireless sensor network using UAV, in 7th IEEE International Conference on Information and Knowledge Technology (2015)

    Google Scholar 

  16. M. Tripathi, M.S. Gaur, V. Laxmi, P. Sharma, Detection and countermeasure of node misbehaviour in clustered wireless sensor network. ISRN Sens. Netw. 2013. Article ID 843626, 9

    Google Scholar 

  17. G. Kaur, M. Singh, Detection of black hole in wireless sensor network based on data mining, in 5th IEEE International Conference Confluence The Next Generation Information Technology Summit (2014)

    Google Scholar 

  18. M. Wazid, A. Katal, R. Singh, Detection and prevention mechanism for blackhole attack in wireless sensor network, in International Conference on Communication and Signal Processing (India, 2013)

    Google Scholar 

  19. B. Yu, B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, in Proceedings 20th IEEE International Parallel and Distributed Processing Symposium (2006)

    Google Scholar 

  20. S. Kaplantzis, A. Shilton, N. Mani, Y.A. Sekercioglu, Detecting selective forwarding attacks in wireless sensor networks using support vector machines, in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (2007), pp. 335–340

    Google Scholar 

  21. S.J. Lee, I.G. Chun, W.T. Kim, S.M. Park, Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks, in International Conference on Information and Communication Technology Convergence (ICTC) (2010), pp. 537–538

    Google Scholar 

  22. T.H. Hai, E.-N. Huh, Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge, in Seventh IEEE International Symposium on Network Computing and Applications (2008), pp. 325–331

    Google Scholar 

  23. F. Gara, L.B. Saad, R.B. Ayed, An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs, in 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (2017), pp. 276–281

    Google Scholar 

  24. Q. Yaseen, F. AlBalas, Y. Jararweh, M. Al-Ayyoub, A fog computing based system for selective forwarding detection in mobile wireless sensor networks, in IEEE 1st International Workshops on Foundations and Applications of Self Systems (2016), pp. 256–262

    Google Scholar 

  25. M. Stehlik, V. Matyas, A. Stetsko, Towards better selective forwarding and delay attacks detection in wireless sensor networks, in IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC) (2016), pp. 1–6

    Google Scholar 

  26. J. Ren, Y. Zhang, K. Zhang, X. Shen, Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans. Wirel. Commun. 15(5), 3718–3731 (2016)

    Google Scholar 

  27. S. Lim, L. Huie, Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks, in International Conference on Computing, Networking and Communications (ICNC) (2015), pp. 315–319

    Google Scholar 

  28. P.C. Geethu, A.R. Mohammed, Defense mechanism against selective forwarding attack in wireless sensor networks, in Fourth International Conference on Computing, Communications and Networking Technologies (2013), pp. 1– 4

    Google Scholar 

  29. D.-Y. Zhang, C. Xu, L. Siyuan, Detecting selective forwarding attacks in WSNs using watermark, in International Conference onWireless Communications and Signal Processing (2011), pp. 1–4

    Google Scholar 

  30. Y.B. Reddy, S. Srivathsan, Game theory model for selective forward attacks in wireless sensor networks, in 17th Mediterranean Conference on Control and Automation (2009), pp. 458–463

    Google Scholar 

  31. M. Tiwari, K.V. Arya, R. Choudhari, K.S. Choudhary, Designing intrusion detection to detect black hole and selective forwarding attack in wsn based on local information, in Fourth International Conference on Computer Sciences and Convergence Information Technology (2009), pp. 824–828

    Google Scholar 

  32. S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi, Detection of selective forwarding attack in wireless ad hoc networks using binary search, in Third International Conference on Emerging Applications of Information Technology (2012), pp. 382–386

    Google Scholar 

  33. J. Brown, X. Du, Detection of selective forwarding attacks in heterogeneous sensor networks, in IEEE International Conference on Communications (2008), pp. 1583–1587

    Google Scholar 

  34. Y.K. Kim, H. Lee, K. Cho, D.H. Lee, CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks, in Third International Conference on Convergence and Hybrid Information Technology, vol. 2 (2008), pp. 416–422

    Google Scholar 

  35. G. Li, X. Liu, C. Wang, A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks, in International Conference on Networking, Sensing and Control (2010), pp. 554–558

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, M., Aggarwal, A., Chaubey, N. (2020). Countermeasures Against Variants of Wormhole in Wireless Sensor Networks: A Review. In: Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K. (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0633-8_11

Download citation

Publish with us

Policies and ethics