Main Article Content
Wireless sensor networks are developing technology paradigm consisting of small, low-power devices that consist of limited computation, sensing and radio communication capabilities.
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. We have presented several existing methods to detect wormhole attack in wireless sensor networks.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Ritesh Maheshwari, Jie Gao and Samir R Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information” in ICNP, 2007.
Elena Pagnin, Gerhard hancke, Aikaterini Mitrokotsa, “Using Distance Bounding protocol to Securely Verify the Proximity of Two-Hop Neighbours” IEEE Communications Letters, Vol. 19, No. 7, July 2015.
Guoxing Luo, Zhigang Han, Li Lu, Muhammad Jawad Hussain, “Real time and Passive Wormhole Detection for Wireless Sensor Networks” International Journal of Distributed Sensor Networks , 2015.
Parminder Singh, Damandeep Kaur, “An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode” International Journal of Computer Applications (0975 - 8887) Volume 73 - No. 20, July 2013.
Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks,” in Proc. of IEEEINFOCOM, 2003, pp. 1976-1986, vol.3.
L. X. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” in Proc. IEEE Symp. Network and Distributed System, Security (NDSS 04), San Diego; February 2004.
Bayrem TRIKI, Slim REKHIS, and Noureddine BOUDRIGA “Digital Investigation of Wormhole Attacks in Wireless Sensor Networks” Eighth IEEE International Symposium on Network Computing and Applications, 2009, pp. 179-186 .
Hyeon Myeong Choi, Su Man Nam, Tae Ho Cho, “A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks” Scientific Research on Wireless Sensor Network, March 2013, 5, 33-40.
K.B. Rasmussen and S. Capkun, “Implications of radio fingerprinting on the security of sensor networks” Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331-340, Sep. 2007.
Zhibin Zhao; Bo Wei; Xiaomei Dong; Lan Yao; Fuxiang Gao; “Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis” International Conference on Information Engineering(ICIE), 2010, pp. 251-254.
Zaw Tun and Ni Lar Thein; “Round trip time based wormhole attack detection” IEEE Wireless Communications and Networking Conference - WCNC 2008.
Lijun Qian, Ning Song, Xiangfang Li; “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach” Journal of Network and Computer Applications, 2005.
Levente Buttyan, Laszlo Dora, and Istvan Vajda, “Statistical Wormhole Detection in Sensor Networks” SAS 2005, Springer, pp. 128–141.
Sanjay Madria, Jian Yin, “SeRWA : A secure routing protocol against wormhole attacks in sensor networks” Journal of Ad Hoc Networks, September 2008.
W. Wang and B. Bhargava; “Visualization of wormholes in sensor networks” WiSe’04, Proceeding of the 2004 ACM workshop on Wireless Security, ACM Press, pp. 51-60, 2004.
Honglong Chen, Wendong Chen, Zhibo Wang, Yanjun Li, “Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks” International Journal on Distributed Sensor Networks, Vol. 2014, 10 pages.
S.Subha; U.Gowri Sankar; "Message Authentication And Wormhole Detection Mechanism In Wireless Sensor Network" IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015.