Review of the Techniques Against the Wormhole Attacks on Wireless Sensor Networks

With the advancement of technology, the application of Wireless Sensor Networks (WSNs) has increased in various fields, such as; military, medical and business. WSNs have the ability to control geographic areas and obtaining data and processing it in different environments. Sensor nodes independently sample local information and if necessary send this information to neighboring sensors and eventually send it to the well. These networks are independent and autonomous and humans have no interference in it. In particular, all nodes are identical, and in practice they work together to meet the overall purpose of the network. Due to inherent constraints in the resources and computing power of sensor nodes, security in WSNs has different challenges in comparison with security in traditional computer networks. Low-cost sensor networks allow the expansion of sensor groups in a variety of environments which are capable of operating in military fields and in urban areas. On the other hand, unreliable communication channels in many applications make it more difficult to provide information security in these networks. One of the common attacks in WSNs is a wormhole attack. In this paper, we will review and evaluate paper related to the wormhole attack.

[1]  Brijendra Kumar Joshi,et al.  A mitigation technique for high transmission power based wormhole attack in Wireless Sensor Networks , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[2]  Yskandar Hamam,et al.  Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network , 2012, ANT/MobiWIS.

[3]  Honglong Chen,et al.  Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.

[4]  K. Thangadurai,et al.  Security in Wireless Sensor Networks (WSNs) and Their Applications , 2017 .

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Manu Sood,et al.  Survey on sybil attack defense mechanisms in wireless ad hoc networks , 2018, J. Netw. Comput. Appl..

[7]  Anastasios A. Economides,et al.  Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks , 2014, SecureComm.

[8]  Honglong Chen,et al.  A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs , 2009, WASA.

[9]  Yurong Xu,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2007, Critical Infrastructure Protection.

[10]  R. K. Gnanamurthy,et al.  Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network , 2016, Wirel. Pers. Commun..

[11]  Rajashekhar C. Biradar,et al.  Design of Security Schemes for Wireless Sensor Networks Based on Attack Behavior: Proactive Approach , 2013 .

[12]  Mohammed Feham,et al.  Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).

[13]  Yixian Yang,et al.  A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .

[14]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[15]  Salavat Marian,et al.  Sybil attack type detection in Wireless Sensor networks based on received signal strength indicator detection scheme , 2015, 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics.

[16]  Mariano García Otero,et al.  Detection of wormhole attacks in wireless sensor networks using range-free localization , 2012, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[17]  Aihua Xia,et al.  Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..

[18]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[19]  Devesh C. Jinwala,et al.  Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.

[20]  P. Venkata Krishna,et al.  Mitigating denial of service attacks in hierarchical wireless sensor networks , 2011, Netw. Secur..

[21]  Issa M. Khalil,et al.  LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.

[22]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[23]  Y. Suresh Babu,et al.  Wireless Network Topological Routing in Wireless Sensor Networks , 2016 .

[24]  Divya Sai Keerthi Tiruvakadu,et al.  Confirmation of wormhole attack in MANETs using honeypot , 2018 .

[25]  Tassos Dimitriou,et al.  Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.

[26]  Xiong Li,et al.  An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[27]  Jie Cui,et al.  Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks , 2017, Peer-to-Peer Networking and Applications.

[28]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.

[29]  Seung-Woo Seo,et al.  WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.

[30]  Shu-Yu Kuo,et al.  A Wormhole Attacks Detection Using a QTS Algorithm with MA in WSN , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[31]  Yogesh Sharma,et al.  Countermeasures for selective forwarding and wormhole attack in WSN , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).

[32]  Yi Mu,et al.  Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks , 2018, J. Inf. Secur. Appl..

[33]  Manita Rajput,et al.  Design and Simulation of a Blacklisting Technique for Detection of Hello flood Attack on LEACH Protocol , 2016 .

[34]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[35]  Akshai Aggarwal,et al.  Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks , 2018 .

[36]  Swarna Mahesh Naidu,et al.  Handling Wormhole Attacks in WSNs Using Location Based Approach , 2017 .

[37]  Bouabdellah Kechar,et al.  A time Petri net model for wormhole attack detection in wireless sensor networks , 2013, 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT).

[38]  Zhen Yu,et al.  DAR: A dynamic anchor regrouping scheme for securing localization service against wormhole attacks in Wireless Sensor Networks , 2009, 2009 Sixth International Conference on Networked Sensing Systems (INSS).

[39]  Guang-zhao Cui,et al.  WAPN: a distributed wormhole attack detection approach for wireless sensor networks , 2009 .

[40]  Reihaneh Safavi-Naini,et al.  Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.

[41]  Makhlouf Aliouat,et al.  Proactive Defense-Based Secure Localization Scheme in Wireless Sensor Networks , 2011, DICTAP.

[42]  Haofei Wang,et al.  Distributed Detection Approach for Wormhole Attack in Wireless Sensor Networks , 2012 .

[43]  Swati Bhagat,et al.  A detection and prevention of wormhole attack in homogeneous Wireless sensor Network , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[44]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[45]  Teddy Mantoro,et al.  Mitigation of Wormhole Attack in Wireless Sensor Networks , 2012 .

[46]  Snehal P. Dongare,et al.  Optimal Cluster Head Selection Based Energy Efficient Technique for Defending against Gray Hole and Black Hole Attacks in Wireless Sensor Networks , 2016 .

[47]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.

[48]  Changzhen Hu,et al.  Defenses Against Wormhole Attacks in Wireless Sensor Networks , 2017, NSS.

[49]  Dong Wang,et al.  Security DV-hop localisation algorithm against wormhole attack in wireless sensor network , 2017, IET Wirel. Sens. Syst..

[50]  Tarunpreet Bhatia,et al.  Wormhole and Sybil attack in WSN: A review , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[51]  Mukesh Kumar,et al.  Detection of Wormhole Attack in Wireless Sensor Networks , 2016 .

[52]  Ashish Patil,et al.  Comparative Analysis of the Prevention Techniques of Denial of Service Attacks in Wireless Sensor Network , 2015 .

[53]  Haiqing Jiang,et al.  Tolerant Majority-Colluding Attacks for Secure Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[54]  Shunfu Jin,et al.  Non-saturated throughput analysis of IEEE 802.11-based cognitive radio networks , 2012 .

[55]  Abdul Hanan Abdullah,et al.  Enhanced trust aware routing against wormhole attacks in wireless sensor networks , 2015, 2015 International Conference on Smart Sensors and Application (ICSSA).