A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

α
Akanksha Gupta
Akanksha Gupta
σ
Anuj K. Gupta
Anuj K. Gupta
α RIMT College of Engineering & Technology, Mandi Gobindgarh, Fatehgarh Sahib, Punjab, India

Send Message

To: Author

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Article Fingerprint

ReserarchID

CSTNWS257PY

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network’s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack.

References

35 Cites in Article
  1. R Khokhar,A Md,S Ngadi,Manda (2008). A Review of Current Routing Attacks in Mobile Ad Hoc Networks.
  2. D Vivian,E Alchieri,C Westphall (2006). Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols.
  3. M Meghdadi,S Ozdemir (2011). A Survey of Wormholebased Attacks and their Counter measures in Wireless Sensor Networks.
  4. S Vijayalakshmi,S Rabara (2011). Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques -LP3 and NAWA2.
  5. R Jhaveri,S Jinwala,D (2012). DoS Attacks in Mobile Ad Hoc Networks: A Survey.
  6. Viren Mahajan,Maitreya Natu,Adarshpal Sethi (2008). Analysis of wormhole intrusion attacks in MANETS.
  7. H Chiu,K Lui (2006). Wormhole Detection Mechanism for Ad Hoc Wireless Networks.
  8. Reshmi Maulik,Nabendu Chaki (2010). A comprehensive review on wormhole attacks in MANET.
  9. Yih-Chun Hu,Adrian Perrig (2003). Packet leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks.
  10. Farid Nait-Abdesselam,Brahim Bensaou,Tarik Taleb (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks.
  11. John Baras,Svetlana Radosavac,George Theodorakopoulos,Dan Sterne,Peter Budulas,Richard Gopaul (2007). Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR.
  12. Y.-C Hu,A Perrig,D Johnson (2002). SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks.
  13. Rammurti Gupta, (2007). A Review on Trust and Security by using Intrusion Detection System in Mobile Ad Hoc Network.
  14. Yih-Chun Hu,Adrian Perrig,David Johnson (2005). Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks.
  15. Bounpadith Kannhavong,Hidehisa Nakayama,Yoshiaki Nemoto,Nei Kato,Abbas Jamalipour (2007). A survey of routing attacks in mobile ad hoc networks.
  16. Y-C Hu,A Perrig,D Johnson (2003). Packet leashes: a defense against wormhole attacks in wireless networks.
  17. L Lazos,R Poovendran,P Syverson,L Chang (2005). Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
  18. Honglong Chen,Wei Lou,Xice Sun,Zhi Wang (2010). A Secure Localization Approach against Wormhole Attacks Using Distance Consistency.
  19. R Graaf,I Hegazy,J Horton (2010). Detection of wormhole attacks in wireless sensor networks.
  20. A Vani,D Rao (2011). A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks.
  21. Viren Mahajan,Maitreya Natu,Adarshpal Sethi (2008). Analysis of wormhole intrusion attacks in MANETS.
  22. H Chiu,K Lui (2006). DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks.
  23. S Choi,D Kim,J Jung (2008). WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks.
  24. Shang-Ming Jen,Chi-Sung Laih,Wen-Chung Kuo (2009). A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
  25. Djamel Djenouri,Othmane Mahmoudi,Mohamed Bouamama,David Llewellyn-Jones,Madjid Merabti (2007). On Securing MANET Routing Protocol Against Control Packet Dropping.
  26. Maria Gorlatova,Peter Mason,Maoyu Wang,Louise Lamont,Ramiro Liscano (2006). Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis.
  27. N Song,L Qian,X Li (2005). Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach.
  28. D Roy,R Chaki,N Chaki (2009). Intrusion Detection in Wireless Ad-Hoc Networks.
  29. M Sankaran,P Das,S Selvakumar (2009). A Novel Security model SaW: Security against Wormhole attack in Wireless Sensor Networks.
  30. Khin Sandar,Win (2008). Analysis of Detecting Wormhole Attack in Wireless Networks.
  31. Hai Vu,Ajay Kulkarni,Kamil Sarac,Neeraj Mittal (2008). WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks.
  32. Reshmi Maulik,Nabendu Chaki (2010). A comprehensive review on wormhole attacks in MANET.
  33. Ian Akykildiz,Yogesh Sankarasubramaniam,Erdal Cayirci (2002). A Survey on Sensor Networks.
  34. Y Wang,G Attebury,B Ramamurthy (2006). A Survey of Security Issues in Wireless Sensor Networks.
  35. John Paul Walters,Zhengqiang Liang,Vipin Chaudhary (2006). Wireless Sensor Network Security: A Survey.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Akanksha Gupta. 2014. \u201cA Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 14 (GJCST Volume 14 Issue E1): .

Download Citation

Issue Cover
GJCST Volume 14 Issue E1
Pg. 23- 31
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date

March 29, 2014

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9302
Total Downloads: 2377
2026 Trends
Related Research

Published Article

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwork with intermediate nodes is necessary for nodes to forward the packets to other sensor nodes beyond their communication range. The network’s broadcasting character and transmission medium help the attacker to interrupt network. An attacker can transform the routing protocol and interrupt the network operations through mechanisms such as selective forwarding, packet drops, and data fabrication. One of the serious routing-disruption attacks is Wormhole Attack. The main emphasis of this paper is to study wormhole attack, its detection method and the different techniques to prevent the network from these attack.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks

Akanksha Gupta
Akanksha Gupta
Anuj K. Gupta
Anuj K. Gupta

Research Journals