Skip to main content

Wormhole Attack in Wireless Sensor Networks: A Critical Review

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 702))

Abstract

A Wireless sensor network (WSN) consisting of spatially distributed autonomous devices using sensors is prone to numerous kinds of threats and attacks due to various reasons such as unattended nature of deployment in an un-trusted environment, limited network resources, easy network access as well as range of radio transmission. Wormhole attack is one such attack where an intruder establishes a low latency link between two sensor nodes so as to misguide the nodes and exhaust network resources by gaining access to sensitive information. This paper outlines the wormhole attack in WSN and provides a critical review on the techniques to deal with it. Various wormhole detection techniques and prevention mechanisms that can be used to counter the wormhole attack in WSN are compared and analyzed briefly in this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bendjima, M., Feham, M.: Wormhole attack detection in wireless sensor networks. In: Proceedings of SAI Computing Conference, London, UK, 13–15 July 2016

    Google Scholar 

  2. Maidamwar, P., Chavhan, N.: A survey on security issues to detect wormhole attack in wireless sensor network. Int. J. AdHoc Netw. Syst. 2(4), 37–50 (2012)

    Article  Google Scholar 

  3. Pawar, R.B., Patil, P.U., Bombale, G., Zalani, A.: Wormhole attack and it’s variants in wireless sensor network: a survey. Int. J. Eng. Res. Technol. 3(8), 1176–1179 (2014)

    Google Scholar 

  4. Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. Mobile Inf. Syst. 8354930, 13 (2016)

    Google Scholar 

  5. Poonam, M.: Wormhole attack in wireless sensor network: a survey. Int. J. Adv. Res. Sci. Eng. 5(2), 110–117 (2016)

    Google Scholar 

  6. Gupta, A., Gupta, A.K.: A survey: detection and prevention of wormhole attack in wireless sensor networks. Glob. J. Comput. Sci. Technol.: E Netw. Web Secur. 14(1), 23–31 (2014)

    Google Scholar 

  7. Ladva, M.M., Lathigara, A.M.: Wormhole attack detection and prevention technique in mobile ad-hoc network: a review. Int. J. Innov. Emerg. Res. Eng. 2(2), 83–88 (2015)

    Google Scholar 

  8. Ughade, S., Kapoor, R.K., Pandey, A.: An overview on wormhole attack in wireless sensor network: challenges, impact and detection approach. Int. J. Recent Develop. Eng. Technol. 2(4), 105–110 (2014)

    Google Scholar 

  9. Sharma, N., Singh, U.: Various approaches to detect wormhole attack in wireless sensor network. Int. J. Comput. Sci. Mobile Comput. 3(2), 29–33 (2014)

    Google Scholar 

  10. Xu, Y.,Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: Goetz, E., Shenoi, S. (eds) Critical Infrastructure Protection. International Federation for Information Processing, pp. 267–279. Springer Series in Computer Science, Springer, Berlin (2008)

    Google Scholar 

  11. Shaon, M.N.A., Ferens, K.: Wireless sensor network wormhole detection using an artificial neural network. In: International Conference of Wireless Networks, pp. 115–120, Las Vegas, USA (2015)

    Google Scholar 

  12. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Google Scholar 

  13. Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of 3rd ACM workshop on wireless security (WiSe’04), pp. 51–60. Philadelphia, USA (2004)

    Google Scholar 

  14. Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA (2004)

    Google Scholar 

  15. Wu, G., Chen, X., Yao, L., Lee, Y., Yim, K.: An efficient wormhole attack detection method in wireless sensor networks. Comput. Sci. Inf. Syst. 11(3), 1127–1141 (2014)

    Article  Google Scholar 

  16. Parmar, A., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. In: Proceedings of 7th International Conference on Communication, Computing and Virtualization, vol. 79, pp. 700–707. Mumbai, India (2016)

    Google Scholar 

  17. Tun, Z., Maw, A.H.: Wormhole attack detection in wireless sensor networks. World Acad. Sci. Eng. Technol. 46, 545–550 (2008)

    Google Scholar 

  18. García-Otero, M., Población-Hernández, A.: Detection of wormhole attacks in wireless sensor networks using range-free localization. In: Proceedings of 17th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), pp. 21–25, Barcelona, Spain (2012)

    Google Scholar 

  19. Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings of 26th IEEE International Conference on Computer Communications, Barcelona, Spain (2007)

    Google Scholar 

  20. Buch, D., Jinwala, D.: Detection of wormhole attacks in wireless sensor network. In: Proceedings of International Conference on Advances in Recent Technologies in Communication and Computing, pp. 7–14, Bangalore, India (2011)

    Google Scholar 

  21. Patel, M., Aggarwal, A.: Detection of hidden wormhole attack in wireless sensor networks using neighbourhood and connectivity information. Int. J. Ad hoc Netw. Syst. 6(1) (2016)

    Article  Google Scholar 

  22. Johnson, M.O., Siddiqui, A., Karami, A.: A wormhole attack detection and prevention technique in wireless sensor network. Int. J. Comput. Appl. 174(4), 1–8 (2017)

    Google Scholar 

  23. Minohara, T., Nishiyama, K.: Poster: detection of Wormhole attack on wireless sensor networks in duty-cycling operation. In: Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, pp. 281–282. Graz, Austria (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moirangthem Marjit Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dutta, N., Singh, M.M. (2019). Wormhole Attack in Wireless Sensor Networks: A Critical Review. In: Mandal, J., Bhattacharyya, D., Auluck, N. (eds) Advanced Computing and Communication Technologies. Advances in Intelligent Systems and Computing, vol 702. Springer, Singapore. https://doi.org/10.1007/978-981-13-0680-8_14

Download citation

Publish with us

Policies and ethics