With the advancement of technology, the application of Wireless Sensor Networks (WSNs) has increased in various fields, such as; military, medical and business. WSNs have the ability to control geographic areas and obtaining data and processing it in different environments. Sensor nodes independently sample local information and if necessary send this information to neighboring sensors and eventually send it to the well. These networks are independent and autonomous and humans have no interference in it. In particular, all nodes are identical, and in practice they work together to meet the overall purpose of the network. Due to inherent constraints in the resources and computing power of sensor nodes, security in WSNs has different challenges in comparison with security in traditional computer networks. Low-cost sensor networks allow the expansion of sensor groups in a variety of environments which are capable of operating in military fields and in urban areas. On the other hand, unreliable communication channels in many applications make it more difficult to provide information security in these networks. One of the common attacks in WSNs is a wormhole attack. In this paper, we will review and evaluate paper related to the wormhole attack.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Krishna, K. H., Babu, Y. S., & Kumar, T. (2016). Wireless network topological routing in wireless sensor networks. Procedia Computer Science, 79, 817–826.
Sharma, M. K., & Joshi, B. K. (2016). A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks. In International Conference on ICT in Business Industry & Government (ICTBIG), IEEE (pp. 1–6).
Buch, D., & Jinwala, D. (2011). Detection of wormhole attacks in wireless sensor network. In 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011) (pp. 7–14).
Ma, R., Chen, S., Ma, K., Hu, C., & Wang, X. (2017). Defenses against wormhole attacks in wireless sensor networks. In International Conference on Network and System Security (pp. 413–426).
Modirkhazeni, A., Ithnin, N., Kadhum, M. M., & Mantoro, T. (2012). Mitigation of wormhole attack in wireless sensor networks. Trustworthy Ubiquitous Computing, Part of the Atlantis Ambient and Pervasive Intelligence book series ATLANTISAPI, 6, 109–147.
Zhang, T., He, J., & Zhang, Y. (2012). Secure DV-hop localization against wormhole attacks in wireless sensor networks. In Soft Computing in Information Communication Technology (pp. 33–38).
Yadav, J., & Kumar, M. (2016). Detection of wormhole attack in wireless sensor networks. In: Proceedings of International Conference on ICT for Sustainable Development (pp. 243–250).
Obado, V., Djouani, K., & Hamam, Y. (2012). Hidden Markov model for shortest paths testing to detect a wormhole attack in a localized wireless sensor network. Procedia Computer Science, 10, 1010–1017.
Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science, 79, 700–707.
Kong, F. R., Li, C. W., Ding, Q. Q., Cui, G. Z., & Cui, B. Y. (2009). WAPN: A distributed wormhole attack detection approach for wireless sensor networks. Journal of Zhejiang University SCIENCE A, 10(2), 279–289.
Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.
Labraoui, N., Gueroui, M., & Aliouat, M. (2001). Proactive defense-based secure localization scheme in wireless sensor networks. In International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2011: Digital Information and Communication Technology and Its Applications (pp. 603–618).
Chen, H., Lou, W., & Wang, Z. (2009). A consistency-based secure localization scheme against wormhole attacks in WSNs. In International Conference on Wireless Algorithms, Systems, and Applications, WASA 2009: Wireless Algorithms, Systems, and Applications, pp. 368–377.
Tian, B., Li, Q., Yang, Y. X., Li, D., & Xin, Y. (2012). A ranging based scheme for detecting the wormhole attack in wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 19(Supplement 1), 6–10.
Chen, H., Lou, W., & Wang, Z. (2009). Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In International Conference on Ubiquitous Intelligence and Computing, UIC 2009: Ubiquitous Intelligence and Computing (pp. 296–309).
Xu, Y., Chen, G., Ford, J., & Makedon, F. (2007) Detecting wormhole attacks in wireless sensor networks, international conference on critical infrastructure protection. In ICCIP 2007: Critical Infrastructure Protection (pp. 267–279).
Wang, H., & Li, T. (2012). Distributed detection approach for wormhole attack in wireless sensor networks. In Advances in Computer Science and Information Engineering, pp. 379–384.
Graaf, R. D., Hegazy, I. J., Horton, & Naini, R. S. (2010). Distributed detection of wormhole attacks in wireless sensor networks. In International Conference on Ad Hoc Networks, ADHOCNETS 2009: Ad Hoc Networks (pp. 208–223).
Khalil, I., Bagchi, S., & Shroff, N. B. (2007). LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. Computer Networks, 51(13), 3750–3772.
Naidu, S. M., & Himaja, V. B. (2017). Handling wormhole attacks in WSNs using location based approach. In Proceedings of the First International Conference on Computational Intelligence and Informatics (pp. 43–51).
Chen, H., Lou, W., Wang, Z., Wu, J., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22–35.
Karapistoli, E., Sarigiannidis, P., Economides, A. A. (2015) Visual-assisted wormhole attack detection for wireless sensor networks. In International Conference on Security and Privacy in Communication Systems, International Conference on Security and Privacy in Communication Networks (pp. 222–238).
Yun, J. H., Kim, I. H., Lim, J. H. & Seo, S. W. (2007). WODEM: Wormhole attack defense mechanism in wireless sensor networks. In Ubiquitous Convergence Technology (pp. 200–209).
Dimitriou, T., & Giannetsos, A. (2010). Wormholes no more? Localized wormhole detection and prevention in wireless networks. In International Conference on Distributed Computing in Sensor Systems, DCOSS 2010: Distributed Computing in Sensor Systems (pp. 334–347).
Buttyan, L., Dora, I., & Vajda, I. (2005). Statistical wormhole detection in sensor networks, european workshop on security in ad hoc and sensor networks. In ESAS 2005: Security and Privacy in Ad hoc and Sensor Networks ( pp. 128–141).
Otero, M. G., & Hernandez, A. P. (2012). Detection of wormhole attacks in wireless sensor networks using range-free localization. In IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 21–25.
Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., & Qureshi, K. N. (2015). Enhanced trust aware routing against wormhole attacks in wireless sensor networks. In 2015 International Conference on Smart Sensors and Application (ICSSA) (pp. 56–59).
Bhagat, S., & Panse, T. (2016). A detection and prevention of wormhole attack in homogeneous Wireless Sensor Network. In: International Conference on ICT in Business Industry & Government (ICTBIG) (pp. 1–6).
Louazani, A., Sekhri, L., & Kechar, B. (2013). A time Petri net model for wormhole attack detection in wireless sensor networks. International Conference on Smart Communications in Network Technologies (SaCoNeT), 1, 1–6.
Bendjima, M., & Feham, M. (2016). Wormhole attack detection in wireless sensor networks. In SAI Computing Conference (SAI) (pp. 1319–1326).
Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98, 2037–2077.
Cui, J., Shao, L., Zhong, H., Xu, Y., & Liu, L. (2017). Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications, 11, 1–16.
Patel, M., Aggarwal, A., & Chaubey, N. (2018). Variants of wormhole attacks and their impact in wireless sensor networks. In Progress in Computing, Analytics and Networking (pp. 637–642).
Khandare, P., Sharma, Y., & Sakhare, S. R. (2017). Countermeasures for selective forwarding and wormhole attack in WSN. In International Conference on Inventive Systems and Control (ICISC) (pp. 1–7).
Mahajan, M., Reddy, K. T. V., & Rajput, M. (2016). Design and simulation of a blacklisting technique for detection of hello flood attack on LEACH protocol. Procedia Computer Science, 79, 675–682.
Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31–40.
Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers & Security, 76, 32–49.
Jao, M. H., Hsieh, M. H., He, K. H., Liu, D. H., Kuo, S. Y., Chu, T. H., & Chou, Y. H. (2015). A wormhole attacks detection using a QTS algorithm with MA in WSN. IN IEEE International Conference on Systems, Man, and Cybernetics (pp. 20–25).
Goyal, S., Bhatia, T., & Verma, A. K. (2015). Wormhole and Sybil attack in WSN: A review. In 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 1463–1468).
Marian, S., & Mircea, P. (2015). Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme. In IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (pp. 121–124).
Wang, X., Qian, L., & Jiang, H. (2009). Tolerant majority-colluding attacks for secure localization in wireless sensor networks. In 5th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1–5).
Li, J., Wang, D., & Wang, Y. (2018). Security DV-hop localisation algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68–75.
Guan, Y., Wei, Y., & Yu, Z. (2009). DAR: A dynamic anchor regrouping scheme for securing localization service against wormhole attacks in Wireless Sensor Networks. In Sixth International Conference on Networked Sensing Systems (INSS) (pp. 1–4).
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the 2003 IEEE International Workshop on Sensor Network Protocols and Applications, IEEE (pp. 113–127).
Newsome, J., Shi, E., Song, D., & Perrig, A. (2007). The sybil attack in sensor networks: Analysis and defenses. In Proceedings of international symposium on information processing in sensor networks (IPSN) (pp. 259–268).
Vasudeva, A., & Sood, M. (2018). Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications, 120, 78–118.
Tripathi, M., Gaur, M. S., & Laxmi, V. (2013). Comparing the impact of black hole and gray hole attack on LEACH in WSN. Procedia Computer Science, 19, 1101–1107.
Wood, A., & Stankovic, J. (2002). Denial of service in sensor networks. IEEE Computer Magazine, 35(10), 54–62.
Patil, A., & Gaikwad, R. (2015). Comparative analysis of the prevention techniques of denial of service attacks in wireless sensor network. Procedia Computer Science, 48, 387–393.
Dongare, S. P., & Mangrulkar, R. S. (2016). Optimal cluster head selection based energy efficient technique for defending against gray hole and black hole attacks in wireless sensor networks. Procedia Computer Science, 78, 423–430.
Nanda, R., & Krishna, P. V. (2011). Mitigating denial of service attacks in hierarchical wireless sensor networks. Network Security, 2011(10), 14–18.
Anchugam, C. V., & Thangadurai, K. (2016). Security in Wireless Sensor Networks (WSNs) and their applications. Information Fusion for Cyber-Security Analytics, 691, 195–228.
Anand, C., & Gnanamurthy, R. K. (2016). Localized DoS attack detection architecture for reliable data transmission over Wireless Sensor Network. Wireless Personal Communications, 90(2), 847–859.
Anigol, A., Ahmed, R., & Biradar, R. C. (2013). Design of security schemes for Wireless Sensor Networks based on attack behavior: proactive approach. In Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals & Systems and Networking (VCASAN-2013) (pp. 425–433).
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Farjamnia, G., Gasimov, Y. & Kazimov, C. Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks. Wireless Pers Commun 105, 1561–1584 (2019). https://doi.org/10.1007/s11277-019-06160-0
- Wireless Sensor Networks
- Wormhole attack