Abstract
Security is an important parameter for wireless sensor network because of the characteristics of a wireless sensor network which includes deployment in unattended environment, remote management, and nodes are easily captured. The major applications include military, health, monitoring environment, etc. The major possible attacks are wormhole, sinkhole, denial of service, selective forwarding, etc. Among all possible attacks, wormhole is a dangerous attack because after launching wormhole tunnel, an attacker can create many other attacks. Two nodes located in two different areas can create tunnel for disturbing routing. In this paper, we have discussed three variants of wormhole, namely, sinkhole-based wormhole, denial of service-based wormhole, black hole-based wormhole, and their countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B.K. Mishra, M.C. Nikam, P. Lakkadwala, Security against black hole attack in wireless sensor network–a review, in 4th IEEE International Conference on Communication Systems and Network Technologies (2014)
F. Ahmed, Y.-B. Ko, Mitigation of black hole attacks in routing protocol for low power and lossy networks. J. Secur. Commun. Netw. (2016) Wiley, New York
P. Dewal, G.S. Narula, V. Jain, Detection and prevention of black hole attacks in cluster based wireless sensor networks, in 3rd IEEE International Conference on Computing for Sustainable Global Development (2016)
C. Tumrongwittayapak, R. Varakulsiripunth, Detecting sinkhole attack and selective forwarding attack in wireless sensor networks, in 7th International Conference on Information, Communications and Signal Processing (ICICS) (2009), pp. 1–5
S.A. Salehi, M.A. Razzaque, P. Naraei, A. Farrokhtala, Detection of sinkhole attack in wireless sensor networks, in IEEE International Conference on Space Science and Communication (2013), pp. 361–365
M.A. Rassam, A. Zainal, M.A. Maarof, M. Al-Shaboti, A sinkhole attack detection scheme in mintroute wireless sensor networks, in International Symposium on Telecommunication Technologies (2012), pp. 71–75
C.H.E. Ngai, J. Liu, M.R. Lyu, On the intruder detection for sinkhole attack in wireless sensor networks, in IEEE International Conference on Communications, vol. 8 (2006), pp. 3383–3389
Y. Zhang, X. Li, Y. Liu, The detection and defence of DoS attack for wireless sensor network. J. China Univer. Posts Telecommun. 19, 52–56 (2012). Elsevier
D. Mansouri, L. Mokddad, J. Ben-othman, M. Ioualalen, Preventing denial of service attacks in wireless sensor networks. in IEEE Mobile and Wireless Networking Symposium (2015)
P.P. Joby, P. Sengottuvelan, A localised clustering scheme to detect attacks in wireless sensor network. Int. J. Electron. Secur. Digit. Forensics 7(3) (2015)
M. Gunasekaran, S. Periakaruppan, A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. Int. J. Electron. Taylor Francis 1362–3060 (2017). ISSN: 0020–7217 (Print)
S. Fouchal, D. Mansouri, L. Mokdad, M. Iouallalen, Recursive-clustering-based approach for denial of service (DoS) attacks in wireless sensors networks. Int. J. Commun Syst. 28, 309–324 (2015)
K. Mazur, B. Ksiezopolski, R. Nielek, Multilevel modeling of distributed denial of service attacks in wireless sensor networks. J. Sens. 2016. Article ID 5017248, 13
K.K. Oo, K.Z. Ye, H. Tun, K.Z. Lin, E.M. Portnov, Enhancement of preventing application layer based on DDOS attacks by using hidden semi-markov model, in 9th International Conference on Genetic and Evolutionary Computing (2015)
M. Motamedi, N. Yazdani, Detection of black hole attack in wireless sensor network using UAV, in 7th IEEE International Conference on Information and Knowledge Technology (2015)
M. Tripathi, M.S. Gaur, V. Laxmi, P. Sharma, Detection and countermeasure of node misbehaviour in clustered wireless sensor network. ISRN Sens. Netw. 2013. Article ID 843626, 9
G. Kaur, M. Singh, Detection of black hole in wireless sensor network based on data mining, in 5th IEEE International Conference Confluence The Next Generation Information Technology Summit (2014)
M. Wazid, A. Katal, R. Singh, Detection and prevention mechanism for blackhole attack in wireless sensor network, in International Conference on Communication and Signal Processing (India, 2013)
B. Yu, B. Xiao, Detecting selective forwarding attacks in wireless sensor networks, in Proceedings 20th IEEE International Parallel and Distributed Processing Symposium (2006)
S. Kaplantzis, A. Shilton, N. Mani, Y.A. Sekercioglu, Detecting selective forwarding attacks in wireless sensor networks using support vector machines, in 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (2007), pp. 335–340
S.J. Lee, I.G. Chun, W.T. Kim, S.M. Park, Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks, in International Conference on Information and Communication Technology Convergence (ICTC) (2010), pp. 537–538
T.H. Hai, E.-N. Huh, Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge, in Seventh IEEE International Symposium on Network Computing and Applications (2008), pp. 325–331
F. Gara, L.B. Saad, R.B. Ayed, An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs, in 13th International Wireless Communications and Mobile Computing Conference (IWCMC) (2017), pp. 276–281
Q. Yaseen, F. AlBalas, Y. Jararweh, M. Al-Ayyoub, A fog computing based system for selective forwarding detection in mobile wireless sensor networks, in IEEE 1st International Workshops on Foundations and Applications of Self Systems (2016), pp. 256–262
M. Stehlik, V. Matyas, A. Stetsko, Towards better selective forwarding and delay attacks detection in wireless sensor networks, in IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC) (2016), pp. 1–6
J. Ren, Y. Zhang, K. Zhang, X. Shen, Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Trans. Wirel. Commun. 15(5), 3718–3731 (2016)
S. Lim, L. Huie, Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks, in International Conference on Computing, Networking and Communications (ICNC) (2015), pp. 315–319
P.C. Geethu, A.R. Mohammed, Defense mechanism against selective forwarding attack in wireless sensor networks, in Fourth International Conference on Computing, Communications and Networking Technologies (2013), pp. 1– 4
D.-Y. Zhang, C. Xu, L. Siyuan, Detecting selective forwarding attacks in WSNs using watermark, in International Conference onWireless Communications and Signal Processing (2011), pp. 1–4
Y.B. Reddy, S. Srivathsan, Game theory model for selective forward attacks in wireless sensor networks, in 17th Mediterranean Conference on Control and Automation (2009), pp. 458–463
M. Tiwari, K.V. Arya, R. Choudhari, K.S. Choudhary, Designing intrusion detection to detect black hole and selective forwarding attack in wsn based on local information, in Fourth International Conference on Computer Sciences and Convergence Information Technology (2009), pp. 824–828
S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay, P. Bose, A. Bakshi, Detection of selective forwarding attack in wireless ad hoc networks using binary search, in Third International Conference on Emerging Applications of Information Technology (2012), pp. 382–386
J. Brown, X. Du, Detection of selective forwarding attacks in heterogeneous sensor networks, in IEEE International Conference on Communications (2008), pp. 1583–1587
Y.K. Kim, H. Lee, K. Cho, D.H. Lee, CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks, in Third International Conference on Convergence and Hybrid Information Technology, vol. 2 (2008), pp. 416–422
G. Li, X. Liu, C. Wang, A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks, in International Conference on Networking, Sensing and Control (2010), pp. 554–558
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, M., Aggarwal, A., Chaubey, N. (2020). Countermeasures Against Variants of Wormhole in Wireless Sensor Networks: A Review. In: Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K. (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0633-8_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-0633-8_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0632-1
Online ISBN: 978-981-15-0633-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)