Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks

Abstract

With the advancement of technology, the application of Wireless Sensor Networks (WSNs) has increased in various fields, such as; military, medical and business. WSNs have the ability to control geographic areas and obtaining data and processing it in different environments. Sensor nodes independently sample local information and if necessary send this information to neighboring sensors and eventually send it to the well. These networks are independent and autonomous and humans have no interference in it. In particular, all nodes are identical, and in practice they work together to meet the overall purpose of the network. Due to inherent constraints in the resources and computing power of sensor nodes, security in WSNs has different challenges in comparison with security in traditional computer networks. Low-cost sensor networks allow the expansion of sensor groups in a variety of environments which are capable of operating in military fields and in urban areas. On the other hand, unreliable communication channels in many applications make it more difficult to provide information security in these networks. One of the common attacks in WSNs is a wormhole attack. In this paper, we will review and evaluate paper related to the wormhole attack.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

References

  1. 1.

    Krishna, K. H., Babu, Y. S., & Kumar, T. (2016). Wireless network topological routing in wireless sensor networks. Procedia Computer Science, 79, 817–826.

    Article  Google Scholar 

  2. 2.

    Sharma, M. K., & Joshi, B. K. (2016). A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks. In International Conference on ICT in Business Industry & Government (ICTBIG), IEEE (pp. 1–6).

  3. 3.

    Buch, D., & Jinwala, D. (2011). Detection of wormhole attacks in wireless sensor network. In 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011) (pp. 7–14).

  4. 4.

    Ma, R., Chen, S., Ma, K., Hu, C., & Wang, X. (2017). Defenses against wormhole attacks in wireless sensor networks. In International Conference on Network and System Security (pp. 413–426).

  5. 5.

    Modirkhazeni, A., Ithnin, N., Kadhum, M. M., & Mantoro, T. (2012). Mitigation of wormhole attack in wireless sensor networks. Trustworthy Ubiquitous Computing, Part of the Atlantis Ambient and Pervasive Intelligence book series ATLANTISAPI, 6, 109–147.

    Article  Google Scholar 

  6. 6.

    Zhang, T., He, J., & Zhang, Y. (2012). Secure DV-hop localization against wormhole attacks in wireless sensor networks. In Soft Computing in Information Communication Technology (pp. 33–38).

  7. 7.

    Yadav, J., & Kumar, M. (2016). Detection of wormhole attack in wireless sensor networks. In: Proceedings of International Conference on ICT for Sustainable Development (pp. 243–250).

  8. 8.

    Obado, V., Djouani, K., & Hamam, Y. (2012). Hidden Markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Procedia Computer Science, 10, 1010–1017.

    Article  Google Scholar 

  9. 9.

    Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science, 79, 700–707.

    Article  Google Scholar 

  10. 10.

    Kong, F. R., Li, C. W., Ding, Q. Q., Cui, G. Z., & Cui, B. Y. (2009). WAPN: A distributed wormhole attack detection approach for wireless sensor networks. Journal of Zhejiang University SCIENCE A, 10(2), 279–289.

    Article  MATH  Google Scholar 

  11. 11.

    Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.

    Article  Google Scholar 

  12. 12.

    Labraoui, N., Gueroui, M., & Aliouat, M. (2001). Proactive defense-based secure localization scheme in wireless sensor networks. In International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2011: Digital Information and Communication Technology and Its Applications (pp. 603–618).

  13. 13.

    Chen, H., Lou, W., & Wang, Z. (2009). A consistency-based secure localization scheme against wormhole attacks in WSNs. In International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009: Wireless Algorithms, Systems, and Applications, pp. 368–377.

  14. 14.

    Tian, B., Li, Q., Yang, Y. X., Li, D., & Xin, Y. (2012). A ranging based scheme for detecting the wormhole attack in wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 19(Supplement 1), 6–10.

    Article  Google Scholar 

  15. 15.

    Chen, H., Lou, W., & Wang, Z. (2009). Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In International Conference on Ubiquitous Intelligence and Computing, UIC 2009: Ubiquitous Intelligence and Computing (pp. 296–309).

  16. 16.

    Xu, Y., Chen, G., Ford, J., & Makedon, F. (2007) Detecting wormhole attacks in wireless sensor networks, international conference on critical infrastructure protection. In ICCIP 2007: Critical Infrastructure Protection (pp. 267–279).

  17. 17.

    Wang, H., & Li, T. (2012). Distributed detection approach for wormhole attack in wireless sensor networks. In Advances in Computer Science and Information Engineering, pp. 379–384.

  18. 18.

    Graaf, R. D., Hegazy, I. J., Horton, & Naini, R. S. (2010). Distributed detection of wormhole attacks in wireless sensor networks. In International Conference on Ad Hoc Networks, ADHOCNETS 2009: Ad Hoc Networks (pp. 208–223).

  19. 19.

    Khalil, I., Bagchi, S., & Shroff, N. B. (2007). LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750–3772.

    Article  MATH  Google Scholar 

  20. 20.

    Naidu, S. M., & Himaja, V. B. (2017). Handling wormhole attacks in WSNs using location based approach. In Proceedings of the First International Conference on Computational Intelligence and Informatics (pp. 43–51).

  21. 21.

    Chen, H., Lou, W., Wang, Z., Wu, J., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22–35.

    Article  Google Scholar 

  22. 22.

    Karapistoli, E., Sarigiannidis, P., Economides, A. A. (2015) Visual-assisted wormhole attack detection for wireless sensor networks. In International Conference on Security and Privacy in Communication Systems, International Conference on Security and Privacy in Communication Networks (pp. 222–238).

  23. 23.

    Yun, J. H., Kim, I. H., Lim, J. H. & Seo, S. W. (2007). WODEM: Wormhole attack defense mechanism in wireless sensor networks. In Ubiquitous Convergence Technology (pp. 200–209).

  24. 24.

    Dimitriou, T., & Giannetsos, A. (2010). Wormholes no more? Localized wormhole detection and prevention in wireless networks. In International Conference on Distributed Computing in Sensor Systems, DCOSS 2010: Distributed Computing in Sensor Systems (pp. 334–347).

  25. 25.

    Buttyan, L., Dora, I., & Vajda, I. (2005). Statistical wormhole detection in sensor networks, european workshop on security in ad hoc and sensor networks. In ESAS 2005: Security and Privacy in Ad hoc and Sensor Networks ( pp. 128–141).

  26. 26.

    Otero, M. G., & Hernandez, A. P. (2012). Detection of wormhole attacks in wireless sensor networks using range-free localization. In IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 21–25.

  27. 27.

    Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2015). Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In 2015 International Conference on Smart Sensors and Application (ICSSA) (pp. 56–59).

  28. 28.

    Bhagat, S., & Panse, T. (2016). A detection and prevention of wormhole attack in homogeneous Wireless Sensor Network. In: International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1–6).

  29. 29.

    Louazani, A., Sekhri, L., & Kechar, B. (2013). A time Petri net model for wormhole attack detection in wireless sensor networks. International Conference on Smart Communications in Network Technologies (SaCoNeT), 1, 1–6.

    Google Scholar 

  30. 30.

    Bendjima, M., & Feham, M. (2016). Wormhole attack detection in wireless sensor networks. In SAI Computing Conference (SAI) (pp. 1319–1326).

  31. 31.

    Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98, 2037–2077.

    Article  Google Scholar 

  32. 32.

    Cui, J., Shao, L., Zhong, H., Xu, Y., & Liu, L. (2017). Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications, 11, 1–16.

    Google Scholar 

  33. 33.

    Patel, M., Aggarwal, A., & Chaubey, N. (2018). Variants of wormhole attacks and their impact in wireless sensor networks. In Progress in Computing, Analytics and Networking (pp. 637–642).

  34. 34.

    Khandare, P., Sharma, Y., & Sakhare, S. R. (2017). Countermeasures for selective forwarding and wormhole attack in WSN. In International Conference on Inventive Systems and Control (ICISC) (pp. 1–7).

  35. 35.

    Mahajan, M., Reddy, K. T. V., & Rajput, M. (2016). Design and simulation of a blacklisting technique for detection of hello flood attack on LEACH protocol. Procedia Computer Science, 79, 675–682.

    Article  Google Scholar 

  36. 36.

    Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31–40.

    Article  Google Scholar 

  37. 37.

    Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers & Security, 76, 32–49.

    Article  Google Scholar 

  38. 38.

    Jao, M. H., Hsieh, M. H., He, K. H., Liu, D. H., Kuo, S. Y., Chu, T. H., & Chou, Y. H. (2015). A wormhole attacks detection using a QTS algorithm with MA in WSN. IN IEEE International Conference on Systems, Man, and Cybernetics (pp. 20–25).

  39. 39.

    Goyal, S., Bhatia, T., & Verma, A. K. (2015). Wormhole and Sybil attack in WSN: A review. In 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 1463–1468).

  40. 40.

    Marian, S., & Mircea, P. (2015). Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme. In IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (pp. 121–124).

  41. 41.

    Wang, X., Qian, L., & Jiang, H. (2009). Tolerant majority-colluding attacks for secure localization in wireless sensor networks. In 5th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).

  42. 42.

    Li, J., Wang, D., & Wang, Y. (2018). Security DV-hop localisation algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68–75.

    Article  Google Scholar 

  43. 43.

    Guan, Y., Wei, Y., & Yu, Z. (2009). DAR: A dynamic anchor regrouping scheme for securing localization service against wormhole attacks in Wireless Sensor Networks. In Sixth International Conference on Networked Sensing Systems (INSS) (pp. 1–4).

  44. 44.

    Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the 2003 IEEE International Workshop on Sensor Network Protocols and Applications, IEEE (pp. 113–127).

  45. 45.

    Newsome, J., Shi, E., Song, D., & Perrig, A. (2007). The sybil attack in sensor networks: Analysis and defenses. In Proceedings of international symposium on information processing in sensor networks (IPSN) (pp. 259–268).

  46. 46.

    Vasudeva, A., & Sood, M. (2018). Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, 120, 78–118.

    Article  Google Scholar 

  47. 47.

    Tripathi, M., Gaur, M. S., & Laxmi, V. (2013). Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Computer Science, 19, 1101–1107.

    Article  Google Scholar 

  48. 48.

    Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. IEEE Computer Magazine, 35(10), 54–62.

    Article  Google Scholar 

  49. 49.

    Patil, A., & Gaikwad, R. (2015). Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Computer Science, 48, 387–393.

    Article  Google Scholar 

  50. 50.

    Dongare, S. P., & Mangrulkar, R. S. (2016). Optimal cluster head selection based energy efficient technique for defending against gray hole and black hole attacks in wireless sensor networks. Procedia Computer Science, 78, 423–430.

    Article  Google Scholar 

  51. 51.

    Nanda, R., & Krishna, P. V. (2011). Mitigating denial of service attacks in hierarchical wireless sensor networks. Network Security, 2011(10), 14–18.

    Article  Google Scholar 

  52. 52.

    Anchugam, C. V., & Thangadurai, K. (2016). Security in Wireless Sensor Networks (WSNs) and their applications. Information Fusion for Cyber-Security Analytics, 691, 195–228.

    Article  Google Scholar 

  53. 53.

    Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS attack detection architecture for reliable data transmission over Wireless Sensor Network. Wireless Personal Communications, 90(2), 847–859.

    Article  Google Scholar 

  54. 54.

    Anigol, A., Ahmed, R., & Biradar, R. C. (2013). Design of security schemes for Wireless Sensor Networks based on attack behavior: proactive approach. In Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013) (pp. 425–433).

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Ghasem Farjamnia.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Farjamnia, G., Gasimov, Y. & Kazimov, C. Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks. Wireless Pers Commun 105, 1561–1584 (2019). https://doi.org/10.1007/s11277-019-06160-0

Download citation

Keywords

  • Wireless Sensor Networks
  • Security
  • Wormhole attack