Advertisement

Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks

  • Ghasem FarjamniaEmail author
  • Yusif Gasimov
  • Cavanshir Kazimov
Article
  • 8 Downloads

Abstract

With the advancement of technology, the application of Wireless Sensor Networks (WSNs) has increased in various fields, such as; military, medical and business. WSNs have the ability to control geographic areas and obtaining data and processing it in different environments. Sensor nodes independently sample local information and if necessary send this information to neighboring sensors and eventually send it to the well. These networks are independent and autonomous and humans have no interference in it. In particular, all nodes are identical, and in practice they work together to meet the overall purpose of the network. Due to inherent constraints in the resources and computing power of sensor nodes, security in WSNs has different challenges in comparison with security in traditional computer networks. Low-cost sensor networks allow the expansion of sensor groups in a variety of environments which are capable of operating in military fields and in urban areas. On the other hand, unreliable communication channels in many applications make it more difficult to provide information security in these networks. One of the common attacks in WSNs is a wormhole attack. In this paper, we will review and evaluate paper related to the wormhole attack.

Keywords

Wireless Sensor Networks Security Wormhole attack 

Notes

References

  1. 1.
    Krishna, K. H., Babu, Y. S., & Kumar, T. (2016). Wireless network topological routing in wireless sensor networks. Procedia Computer Science, 79, 817–826.CrossRefGoogle Scholar
  2. 2.
    Sharma, M. K., & Joshi, B. K. (2016). A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks. In International Conference on ICT in Business Industry & Government (ICTBIG), IEEE (pp. 1–6).Google Scholar
  3. 3.
    Buch, D., & Jinwala, D. (2011). Detection of wormhole attacks in wireless sensor network. In 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011) (pp. 7–14).Google Scholar
  4. 4.
    Ma, R., Chen, S., Ma, K., Hu, C., & Wang, X. (2017). Defenses against wormhole attacks in wireless sensor networks. In International Conference on Network and System Security (pp. 413–426).Google Scholar
  5. 5.
    Modirkhazeni, A., Ithnin, N., Kadhum, M. M., & Mantoro, T. (2012). Mitigation of wormhole attack in wireless sensor networks. Trustworthy Ubiquitous Computing, Part of the Atlantis Ambient and Pervasive Intelligence book series ATLANTISAPI, 6, 109–147.CrossRefGoogle Scholar
  6. 6.
    Zhang, T., He, J., & Zhang, Y. (2012). Secure DV-hop localization against wormhole attacks in wireless sensor networks. In Soft Computing in Information Communication Technology (pp. 33–38).Google Scholar
  7. 7.
    Yadav, J., & Kumar, M. (2016). Detection of wormhole attack in wireless sensor networks. In: Proceedings of International Conference on ICT for Sustainable Development (pp. 243–250).Google Scholar
  8. 8.
    Obado, V., Djouani, K., & Hamam, Y. (2012). Hidden Markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Procedia Computer Science, 10, 1010–1017.CrossRefGoogle Scholar
  9. 9.
    Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science, 79, 700–707.CrossRefGoogle Scholar
  10. 10.
    Kong, F. R., Li, C. W., Ding, Q. Q., Cui, G. Z., & Cui, B. Y. (2009). WAPN: A distributed wormhole attack detection approach for wireless sensor networks. Journal of Zhejiang University SCIENCE A, 10(2), 279–289.CrossRefzbMATHGoogle Scholar
  11. 11.
    Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.CrossRefGoogle Scholar
  12. 12.
    Labraoui, N., Gueroui, M., & Aliouat, M. (2001). Proactive defense-based secure localization scheme in wireless sensor networks. In International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2011: Digital Information and Communication Technology and Its Applications (pp. 603–618).Google Scholar
  13. 13.
    Chen, H., Lou, W., & Wang, Z. (2009). A consistency-based secure localization scheme against wormhole attacks in WSNs. In International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009: Wireless Algorithms, Systems, and Applications, pp. 368–377.Google Scholar
  14. 14.
    Tian, B., Li, Q., Yang, Y. X., Li, D., & Xin, Y. (2012). A ranging based scheme for detecting the wormhole attack in wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 19(Supplement 1), 6–10.CrossRefGoogle Scholar
  15. 15.
    Chen, H., Lou, W., & Wang, Z. (2009). Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In International Conference on Ubiquitous Intelligence and Computing, UIC 2009: Ubiquitous Intelligence and Computing (pp. 296–309).Google Scholar
  16. 16.
    Xu, Y., Chen, G., Ford, J., & Makedon, F. (2007) Detecting wormhole attacks in wireless sensor networks, international conference on critical infrastructure protection. In ICCIP 2007: Critical Infrastructure Protection (pp. 267–279).Google Scholar
  17. 17.
    Wang, H., & Li, T. (2012). Distributed detection approach for wormhole attack in wireless sensor networks. In Advances in Computer Science and Information Engineering, pp. 379–384.Google Scholar
  18. 18.
    Graaf, R. D., Hegazy, I. J., Horton, & Naini, R. S. (2010). Distributed detection of wormhole attacks in wireless sensor networks. In International Conference on Ad Hoc Networks, ADHOCNETS 2009: Ad Hoc Networks (pp. 208–223).Google Scholar
  19. 19.
    Khalil, I., Bagchi, S., & Shroff, N. B. (2007). LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750–3772.CrossRefzbMATHGoogle Scholar
  20. 20.
    Naidu, S. M., & Himaja, V. B. (2017). Handling wormhole attacks in WSNs using location based approach. In Proceedings of the First International Conference on Computational Intelligence and Informatics (pp. 43–51).Google Scholar
  21. 21.
    Chen, H., Lou, W., Wang, Z., Wu, J., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22–35.CrossRefGoogle Scholar
  22. 22.
    Karapistoli, E., Sarigiannidis, P., Economides, A. A. (2015) Visual-assisted wormhole attack detection for wireless sensor networks. In International Conference on Security and Privacy in Communication Systems, International Conference on Security and Privacy in Communication Networks (pp. 222–238).Google Scholar
  23. 23.
    Yun, J. H., Kim, I. H., Lim, J. H. & Seo, S. W. (2007). WODEM: Wormhole attack defense mechanism in wireless sensor networks. In Ubiquitous Convergence Technology (pp. 200–209).Google Scholar
  24. 24.
    Dimitriou, T., & Giannetsos, A. (2010). Wormholes no more? Localized wormhole detection and prevention in wireless networks. In International Conference on Distributed Computing in Sensor Systems, DCOSS 2010: Distributed Computing in Sensor Systems (pp. 334–347).Google Scholar
  25. 25.
    Buttyan, L., Dora, I., & Vajda, I. (2005). Statistical wormhole detection in sensor networks, european workshop on security in ad hoc and sensor networks. In ESAS 2005: Security and Privacy in Ad hoc and Sensor Networks ( pp. 128–141).Google Scholar
  26. 26.
    Otero, M. G., & Hernandez, A. P. (2012). Detection of wormhole attacks in wireless sensor networks using range-free localization. In IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 21–25.Google Scholar
  27. 27.
    Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2015). Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In 2015 International Conference on Smart Sensors and Application (ICSSA) (pp. 56–59).Google Scholar
  28. 28.
    Bhagat, S., & Panse, T. (2016). A detection and prevention of wormhole attack in homogeneous Wireless Sensor Network. In: International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1–6).Google Scholar
  29. 29.
    Louazani, A., Sekhri, L., & Kechar, B. (2013). A time Petri net model for wormhole attack detection in wireless sensor networks. International Conference on Smart Communications in Network Technologies (SaCoNeT), 1, 1–6.Google Scholar
  30. 30.
    Bendjima, M., & Feham, M. (2016). Wormhole attack detection in wireless sensor networks. In SAI Computing Conference (SAI) (pp. 1319–1326).Google Scholar
  31. 31.
    Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98, 2037–2077.CrossRefGoogle Scholar
  32. 32.
    Cui, J., Shao, L., Zhong, H., Xu, Y., & Liu, L. (2017). Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications, 11, 1–16.Google Scholar
  33. 33.
    Patel, M., Aggarwal, A., & Chaubey, N. (2018). Variants of wormhole attacks and their impact in wireless sensor networks. In Progress in Computing, Analytics and Networking (pp. 637–642).Google Scholar
  34. 34.
    Khandare, P., Sharma, Y., & Sakhare, S. R. (2017). Countermeasures for selective forwarding and wormhole attack in WSN. In International Conference on Inventive Systems and Control (ICISC) (pp. 1–7).Google Scholar
  35. 35.
    Mahajan, M., Reddy, K. T. V., & Rajput, M. (2016). Design and simulation of a blacklisting technique for detection of hello flood attack on LEACH protocol. Procedia Computer Science, 79, 675–682.CrossRefGoogle Scholar
  36. 36.
    Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31–40.CrossRefGoogle Scholar
  37. 37.
    Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers & Security, 76, 32–49.CrossRefGoogle Scholar
  38. 38.
    Jao, M. H., Hsieh, M. H., He, K. H., Liu, D. H., Kuo, S. Y., Chu, T. H., & Chou, Y. H. (2015). A wormhole attacks detection using a QTS algorithm with MA in WSN. IN IEEE International Conference on Systems, Man, and Cybernetics (pp. 20–25).Google Scholar
  39. 39.
    Goyal, S., Bhatia, T., & Verma, A. K. (2015). Wormhole and Sybil attack in WSN: A review. In 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 1463–1468).Google Scholar
  40. 40.
    Marian, S., & Mircea, P. (2015). Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme. In IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (pp. 121–124).Google Scholar
  41. 41.
    Wang, X., Qian, L., & Jiang, H. (2009). Tolerant majority-colluding attacks for secure localization in wireless sensor networks. In 5th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).Google Scholar
  42. 42.
    Li, J., Wang, D., & Wang, Y. (2018). Security DV-hop localisation algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68–75.CrossRefGoogle Scholar
  43. 43.
    Guan, Y., Wei, Y., & Yu, Z. (2009). DAR: A dynamic anchor regrouping scheme for securing localization service against wormhole attacks in Wireless Sensor Networks. In Sixth International Conference on Networked Sensing Systems (INSS) (pp. 1–4).Google Scholar
  44. 44.
    Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the 2003 IEEE International Workshop on Sensor Network Protocols and Applications, IEEE (pp. 113–127).Google Scholar
  45. 45.
    Newsome, J., Shi, E., Song, D., & Perrig, A. (2007). The sybil attack in sensor networks: Analysis and defenses. In Proceedings of international symposium on information processing in sensor networks (IPSN) (pp. 259–268).Google Scholar
  46. 46.
    Vasudeva, A., & Sood, M. (2018). Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, 120, 78–118.CrossRefGoogle Scholar
  47. 47.
    Tripathi, M., Gaur, M. S., & Laxmi, V. (2013). Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Computer Science, 19, 1101–1107.CrossRefGoogle Scholar
  48. 48.
    Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. IEEE Computer Magazine, 35(10), 54–62.CrossRefGoogle Scholar
  49. 49.
    Patil, A., & Gaikwad, R. (2015). Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Computer Science, 48, 387–393.CrossRefGoogle Scholar
  50. 50.
    Dongare, S. P., & Mangrulkar, R. S. (2016). Optimal cluster head selection based energy efficient technique for defending against gray hole and black hole attacks in wireless sensor networks. Procedia Computer Science, 78, 423–430.CrossRefGoogle Scholar
  51. 51.
    Nanda, R., & Krishna, P. V. (2011). Mitigating denial of service attacks in hierarchical wireless sensor networks. Network Security, 2011(10), 14–18.CrossRefGoogle Scholar
  52. 52.
    Anchugam, C. V., & Thangadurai, K. (2016). Security in Wireless Sensor Networks (WSNs) and their applications. Information Fusion for Cyber-Security Analytics, 691, 195–228.CrossRefGoogle Scholar
  53. 53.
    Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS attack detection architecture for reliable data transmission over Wireless Sensor Network. Wireless Personal Communications, 90(2), 847–859.CrossRefGoogle Scholar
  54. 54.
    Anigol, A., Ahmed, R., & Biradar, R. C. (2013). Design of security schemes for Wireless Sensor Networks based on attack behavior: proactive approach. In Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013) (pp. 425–433).Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  • Ghasem Farjamnia
    • 1
    Email author
  • Yusif Gasimov
    • 1
  • Cavanshir Kazimov
    • 1
  1. 1.Institute of Applied MathematicsBaku State UniversityBakuAzerbaijan

Personalised recommendations