CFP last date
20 January 2025
Reseach Article

A Survey Article on Wormhole Attack Detection and Security in Wireless Sensor Networks

by Harpal, Gaurav Tejpal, Sonal Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 2
Year of Publication: 2017
Authors: Harpal, Gaurav Tejpal, Sonal Sharma
10.5120/ijca2017915666

Harpal, Gaurav Tejpal, Sonal Sharma . A Survey Article on Wormhole Attack Detection and Security in Wireless Sensor Networks. International Journal of Computer Applications. 177, 2 ( Nov 2017), 5-8. DOI=10.5120/ijca2017915666

@article{ 10.5120/ijca2017915666,
author = { Harpal, Gaurav Tejpal, Sonal Sharma },
title = { A Survey Article on Wormhole Attack Detection and Security in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 177 },
number = { 2 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number2/28596-2017915666/ },
doi = { 10.5120/ijca2017915666 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:44.774574+05:30
%A Harpal
%A Gaurav Tejpal
%A Sonal Sharma
%T A Survey Article on Wormhole Attack Detection and Security in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 2
%P 5-8
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For the duration of multihop portable methods, including ad-hoc and also indicator / probe sites, the prerequisite for co-operation amongst nodes in order to trade one another's offers shows the crooks to numerous security attacks. A particularly damaging attack is called your wormhole attack, where the harmful node documents command and also data traffic at 1 place and also routes that to the colluding node, which replays that locally. This could have a damaging result about Class Company by simply defending against nodes through obtaining tracks which will are far more than 2 trips away. During this paper, we active a light countermeasure for the wormhole attack, known as LITEWORP, which does not involve specific hardware. LITEWORP is quite suitable for resource-constrained multihop portable sites, including indicator / probe networks. Our own selection permits finding of one's wormhole, with rural location of one's harmful nodes. Simulators ultimate effects demonstrate that pretty much every wormhole is available and also remote in very a quick time period greater than a huge selection of scenarios. The final effects also demonstrate your portion with offers missing consequently of wormhole as soon as LITEWORP is used is negligible than the reduction encountered as soon as the tactic is just not applied.

References
  1. Khalil, Issa, Saurabh Bagchi, and Ness B. Shroff. "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks." Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. IEEE, 2005.
  2. Eriksson, Jakob, Srikanth V. Krishnamurthy, and Michalis Faloutsos. "Truelink: A practical countermeasure to the wormhole attack in wireless networks." Network Protocols, 2006. ICNP'06. Proceedings of the 2006 14th IEEE International Conference on. IEEE, 2006.
  3. Choi, Sun, et al. "WAP: Wormhole attack prevention algorithm in mobile ad hoc networks." Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. IEEE, 2008.
  4. Poovendran, Radha, and Loukas Lazos. "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks." Wireless Networks 13.1 (2007): 27-59.
  5. Wang, Xia, and Johnny Wong. "An end-to-end detection of wormhole attack in wireless ad-hoc networks." Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International. Vol. 1. IEEE, 2007.
  6. Win, Khin Sandar. "Analysis of detecting wormhole attack in wireless networks." World Academy of Science, Engineering and Technology. 2008.
  7. Jhaveri, Rutvij H., et al. "MANET routing protocols and wormhole attack against AODV." International Journal of Computer Science and Network Security 10.4 (2010): 12-18.
  8. Jain, Mohit, and Himanshu Kandwal. "A survey on complex wormhole attack in wireless ad hoc networks." Proceedings of International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT’09). 2009.
  9. Khabbazian, Majid, Hugues Mercier, and Vijay K. Bhargava. "Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks." IEEE Transactions on Wireless Communications 8.2 (2009): 736-745.
  10. Khalil, Issa, Saurabh Bagchi, and Ness B. Shroff. "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks." Computer networks 51.13 (2007): 3750-3772.
  11. Gupta, Saurabh, Subrat Kar, and S. Dharmaraja. "WHOP: Wormhole attack detection protocol using hound packet." Innovations in information technology (IIT), 2011 international conference on. IEEE, 2011.
  12. Tun, Zaw, and Aung Htein Maw. "Wormhole attack detection in wireless sensor networks." World Academy of Science, Engineering and Technology46 (2008): 2008.
  13. Hu, Lingxuan, and David Evans. "Using Directional Antennas to Prevent Wormhole Attacks." NDSS. 2004.
  14. Lee, Gunhee, Jungtaek Seo, and Dong-kyoo Kim. "An approach to mitigate wormhole attack in wireless ad hoc networks." Information Security and Assurance, 2008. ISA 2008. International Conference on. IEEE, 2008.
  15. Sadeghi, Mohammad, and Saadiah Yahya. "Analysis of Wormhole attack on MANETs using different MANET routing protocols." Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on. IEEE, 2012.
  16. Arora, Mani, Rama Krishna Challa, and Divya Bansal. "Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks." Computer and Network Technology (ICCNT), 2010 Second International Conference on. IEEE, 2010.
  17. Jain, Shalini, and Satbir Jain. "Detection and prevention of wormhole attack in mobile adhoc networks." International Journal of Computer Theory and Engineering 2.1 (2010): 78.
  18. Chen, Honglong, Wei Lou, and Zhi Wang. "Conflicting-set-based wormhole attack resistant localization in wireless sensor networks." Ubiquitous Intelligence and Computing (2009): 296-309.
  19. Chiu, Hon Sun, and King-Shan Lui. "DelPHI: wormhole detection mechanism for ad hoc wireless networks." Wireless pervasive computing, 2006 1st international symposium on. IEEE, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Attack Security Wireless Ad-hoc Networks.