Survey of Wormhole Attack in Wireless Sensor Networks
Survey of Wormhole Attack in Wireless Sensor Networks
Corresponding Author:
Umashankar Ghugar
Department of Computer Science
Berhampur University
Brahmapur, Odisha 760007, India
Email: [email protected]
1. INTRODUCTION
Wireless sensor network (WSN) built a network, which is a spread, automatic governing network and
it corresponding with several sensor nodes in specific environment. Nodes are observed by the natural
conditions, such as humidity, compression, heat, wave and direction at different areas [1]. It is a tiny device
which has a limited measurement resource. They are gradually arranged in a wireless sensor environment [2].
WSN are broadly utilized on different applications such as, area observing, defense surveillance, health care
system, home affirmation and satellite communication.WSN suffers from various security issue because
usually it is deployed in hazardous environment. Sensor node has some limitation such as limited lifetime, less
computing capability and low memory space [3, 4]. Based on these limitations, they are arranged in noisy
environment, it is highly affected and sensitive to several types of attacks [5]. Basically, sensor nodes are
category by four sub-systems [6-13, 14]. Processor and memory, transceiver, sensor and battery. Here we have
discussed the several types of attacks.Mainly attacks are classified by two parts. First part is the attack against
security mechanism and another is routing mechanism. Numbers of attacks are listed as below but we are
focuses on wormhole attack.
Wormhole Attack
Sybil Attack
Blackhole Attack
Hello flood Attack
Sinkhole Attack
Denial of Service
Thus, these survey papers basically focus on various approaches to detect wormhole attacks. In
Section 2 discussed the intrusion detection system in WSN; In Section 3 discussed the wormhole attack in
wireless sensor networks; In Section 4 discussed various detection approaches of the wormhole attack in
wireless sensor networks with summary. Finally in Section 5, we have discussed the future research challenges
and conclusion.
3. WORMHOLE ATTACK
The wormhole attacks are most brutal in nature. Generally, more than two malicious nodes create a
secrete route is called tunnel. Here the attackers are built a connection to each node, so that they can
communicate at a high speed over the networks with other nodes. A wormhole attacks can be freely carried out
across routing in the sensor networks. Routing protocols has no mechanism to prevent against it [11]. In other
words, when the wormhole attacks occurs, it dropping all the packets and cause network interruption.
Wormhole attack is also used in the form of merging of selective forward and Sybil attack [12]. In Figure 1,
the data packet accepted Node D from Node A and vice versa.
number. Basically the sequence number is used even number for the active network and odd number for
inactivate network. When the routing information circulated among inactive node, at that time occurs more
sending troubles [22].
A backup node, which is always maintain update records for successful transaction so that if the
primary designated node crash can be replaced immediately. At the time of regular process, each node
repeatedly floods updated messages to neighboring nodes of every node. This message indicates its status and
provides the cost for topological database. When flooding message are proved acknowledgement that means
system is reliable. A node can check whether the incoming link is older or newer using sequence number.
When the cost is change then it sends all these messages. Database Messages provide the sequence number for
the entire channel, which is held by sender. When the value is comparing with the sender, then receiver can
resolve the most current values. When a line is delivering then this message is fully used in the system as the
result of this algorithm is that each pair of neighboring nodes detects the most recent data and new information
is transmitted on this way [25, 26].
transmission. The receiver analyze now on comparing this information can detect whether the packet has
forwarded through wormhole attacks or not. Here the packet limitation is known by temporal leashes, which
is determining the distance it can cover the most. In this technique the position of node is not that important
rather than time factor plays an important role. It can access the time calculation and its comparison up to an
order of nanosecond. On each packet, the sender mention an authorized time bar, which is compared by the
receiver and the packet forwarding distance is simply given by the product of velocity of lights and transmission
time. In case of a large time difference it indicates the presence of wormhole. In [29], the authors put forward
a “graph theoretical” approach to prevent wormhole attacks. This concept is purely established on the “location
aware guard node” (LAGNs).When the key establishment process is used for detecting wormhole attack and it
also used the decoded message. If same message is heard from one guard or two LAGNs are heard from
different far away LAGNs then wormhole is detected.
In [30], the authors proposed that wormhole attacks in stationary sensor network are investigated using
network visualization. In this method, the signal strength determines the distance. Each sensor conveys all the
gathered information to the main station. The controller computes the networks physical topology using sensor
predicted distance. If a wormhole attack is present then it is seen that a string pulling the network terminals, if
not then the topology is flat. In [31], the authors adopted lightweight countermeasure for wormhole attack
called LITEWORP and this result has advantages of very quick detection of wormhole attacks and the loss of
fraction of packets is very less. In [32], here the author’s emphasis on the “round –trip travel time” (RTT)
message, which provides the maximum times require for the transmission. When this time is multiplied with
speed of lights it gives the distanced travelled. Now this distance is to be compared with the predicted distance.
If there is a large difference then it threat wormhole attacks. In [33], the authors describe that, wormhole attacks
in found in multipath routing. In case of new root requirements source excess by using route request (RREQ)
in the network and then the response is waited. The intermediate node only pass away this route request
(RREQ).On the same time the receiver will wait to get route after getting route request (RREQ).Statistical
Analysis of Multi-path (SAM) is introduced, that use Pmax and .which are higher if wormhole attack is
present.Pmax gives the probability of the routes out of all possible route and (theta) is the difference between
top two frequently papered links. If a wormholes attack is more than PMF (probability mass function) then it
gives high frequency. Here authors also analysis the multipath routing and DSR with fine comparisons.
In [34] a ”hello control message” is used to detect wormhole attacks as consent with OLSR in
particular. He used the aggregate of hello message time interval (HMTI) that lie within a jitter. A ranger= [T-
α, T+∞] is coated. In range HMTI are considered valid or else it is out of set of rules. In case of unusual HMTI
secondary checks are done. In addition to this an untrue positive alarm in negated in case of weak working
node which has many packets but this is not the case of and attacking node. In [35], the authors implemented
delay per hop indication (DelPHI) to detect wormhole attacks. It is also work on the same principle of
comparison of path time distance and predicted distance. This process works in two phases, first is collection
of route path by the receivers and senders include a DREQ packets similar to the concept of SAM and sign it
before sending. On the getting the packet the receiver has to add its ID and 1 hop count is incremented. The
minimum delay and hope count information are utilized for the minimum detection. In the second phase, “round
–trip travel time” (RTT) is used to calculate the time difference between the total number of sent information
and acknowledgement received. In this process the delay per hop value (DPH) is calculated as RTT/2h, where
h is the hop count to the definite consecutive. In normal case tiny hops have tiny RTT where as in case of
wormhole attack the tiny hops are giant RTT. If one delay per hop value (DPH) crosses the threshold value
then all paths next to this treated as under wormholes attacks In [36], the authors used a unique technique of
radio finger printing. It initiates with the radio signal receiving by the fingerprinting device and then the signal
is converted to the digital form. The signal passing is positioned and its characteristics are described. A set of
characters from fingerprints is later used for apparatus identification. In [37], the authors proposed a method,
when a sender send a RREQ message to receiver, then it waits for the RREP. Out of the number of RREP
received by the source, the RREP with highest frequency is compare with the predefined value. If the packet
drop ratio is larger than packet sent ration then it implies that wormhole is present. In [38], the authors proposed
that, two plot nodes are connected by tunnel such as they are neighbors.
The route request (RREQ) and topology control messages (TCM) are convey among these plot nodes
through tunnels. By using the extra tunnel nodes, these nodes have the shortest path. After the link is
establishing, the attacker select one another as multipoint relays (MRPs). As result few topologies control
messages and data packets are leaked through the tunnel. As consequence false topology information is spread
through the networks. In [39], the author’s proposed a trust based model for detection in wireless sensor
networks. In trust based system, each node has some values, which is called trust value. By using this trust
values the source node is calculated the actual route to the destination. When the transmission occurs over
network, in which number of packets drop ratio is high means trust value is less and wormhole attacks is present
in the network. If the trust value is high means, all the packets which is received by the destination, it indicates
that the trust value is high on the neighboring node of source node between the source to destination. In [40],
the author’s proposed a distributed intelligent agent-based system. Here the ambition is the use of generalized
intrusion detection system (IDS) framework which is so lightweight that it can run on the sensors node and it
identifies the wormhole attacks along with its attackers. When that attacker’s node is found in the network,
then it is informed with an indication message. After that each node makes their conclusion on the base of
consecutive node repeat. In [41], it is assumed that behaviors of a node are control by its consecutive nodes. A
node uses its neighbor node to send route request (RREQ) message to the destination node. If the sender didn’t
get route reply (RREP) message within predicted time, then sender conclude the presence of wormholes attack
and enclose this route in the list of wormhole attacks list. A conjugative node that is managed by every node
that consists of RREQ sequence number, Neighbors node ID, sending & receiving time of RREQ.The
maximum time limit equal to WPT/2 is waited by the sender if RREQ is delayed more than thus it indicates
the wormhole attacks and entirely it doesn’t support DSR Routing protocol.
In [42], Al the sender’s nodes wait for acknowledgment (ACK) message. If ACK message is not
received then the next node is attack, which is wormhole attacks. ACK message should not retrace the path
and sent between the separation by two hops. Now Time to Live (TTL) plays a great role since the path is
different. If the ACK message is not received within TTL then wormhole attacks is detected. In [43], the authors
used two step mechanism for the detecting the wormhole attacks. The first steps consist of two methods. In the
first method, the node and his next node are identified by using round-trip-time (RTT) and in the second method
their list is made and if the destination node is not in that list then it is doubt full in nature. In the second step
mechanism, after detection of doubt full link the attack is concluded using RTS/CTS method. In [44], the
authors used AODV and DSR routing protocol. Here also a Trust based security model is used for detecting
intrusion. This model has been introduced to identify the attacks, which is called statically method. If any
connection gets doubtful, then the trust value is calculated to determine the wormhole attacks. In the trust
model, nodes monitored their neighbouring on the basis of packet drop pattern. If any node is found to be doubt
then stock trust is identified by the node, whether the node is affected by wormhole attack or not. In [45], the
authors proposed Digital investigation to detect wormhole attacks in WSNs. WSN are explained that add
generation and protects flow of evidences about sensors node characteristics in the network. A group of
detective nodes are spread over the networks to controls the topology and datagram passing by sensor nodes.
Observation node and base station node jointly forms different WSN networks called observation network.
Frequency bands are used to establish link between observers and the base station but this is not supported by
sensors node. The detection sensitivity of sensor node is less than the observer. In [46], the authors proposed a
'conflicting-set' for each node is made to filtering the false measurement of distance but its biggest limitation
was that, it works only where there is no packet loss but when attackers attacks then the Packet drops is certain
to happen. So the system is under a wormhole attacks.
In [47], the authors proposed a model, which create a cluster using no of nodes in MANET. In this
paper various data structure are explained and algorithm is also proposed. Here two layers are mention in the
cluster, where one node is treated as cluster head among several nodes. When a node is affected by a wormhole
attack in the layer1, then which informs to the cluster head of layer1.After that cluster head of layer1 will
indicates the cluster head of layer2 about the abnormal node. So that cluster head of layer2 indicate the message
to all the cluster head of layer1, then the cluster head of layer1 inform the messages to their respective node
within their cluster. In [48], the authors proposed localization-based systems, which are vulnerable to wormhole
attacks as they manipulate the localization method To prevent the wormhole attack, a 'distance-consistency-
based secure location' scheme was implemented, This works on the detection, exact location and trapping of
wormhole attacks In [49], the authors used techniques that identify the wormhole attacks. In the first way
algorithm uses hop counting method, rebuilt local maps at every nodes and then a diameter features to identify
by the problems due to wormhole attacks. The evaluated round trip times (RTT) between the consecutive nodes
are used to compare in the second way. Its major advantages is not required additional hardware and consume
less energy. In [50], the authors proposed that attackers may record the location of packets in WSN and send
them to one more location and again transmit them in to the network. When it found the roots, the wormhole
detection process is going on, which counts difference between the neighbour nodes to another node? If the
difference is more than the destination node detect the wormholes. In [51], the authors proposed the statistical
analysis to identify the wormhole attacks in WSN.The proposed algorithm is categories by three parts.i.e.
Statistical analysis method, which is used for routing information for detecting the wormhole attacks.
Determination of the vulnerable wormholes.
Time constraints is used for validation in wormhole attacks.
It uses multi-path routing, time constraints and statistical analysis to verify the vulnerable connection.
It doesn’t need time synchronisation, directional antenna and GPS. In this method it can wormhole attacks with
high quality of accuracy. In [52], the authors propose the security emerges as a centrally in MANET. The
applications of MANET were deployed in various fields. Wormhole attack is a severe destructive in nature,
which is smoothly resolved in networks but tough to observe. It is visible even if the intruder has not negotiated
at any situation and rest of all communication gives security, novelty, authenticity and confidently. In [53], the
author’s presents different types of sensor nodes and many layer wise attacks must be present in the network.
Wormhole attacks are used in this paper in attack model, which is smoothly resolved in networks but tough to
observe. Here the authors proposed a method, which is used the Mint route protocol. In [54], the authors address
the multiple –hop Mobile ad hoc networks, where each node acts as a host and router in the route. Author
proposed a technique, which is identify the attacks without using synchronization requirements. The basic thing
is to find another way from source to next hop and finally it calculates the no of hops for detecting wormholes
attacks. In [55], it uses packet encapsulation technique. Here packets are encapsulated in AODV protocol. In
this technique, less hop count is created and it is compared to other normal links. MLDW maintain a big
structure, which is divided by 04 parts, i.e:
Examination layer.
Disclosure layer.
Reorganization layer.
Segregation layer.
Here the First 03 layers work as a Detector and last layer works as a Preventer for wormhole attacks
in MANET using AODV protocol. In [56] ,the author’s proposed a technique, which is gives secure data
transmission using neighbour node analysis concept to identify the wormhole attacks in MANET. This
technique analyze the neighbouring nodes .so that it checks the reliability of the nodes for data transmission
on the network, According to this technique, a node send a request to its neighbour nodes and it maintain the
request and response system. Here node maintains a table for tracing the time out. If a node doesn’t get the
reply time that means attacks occurs in the network. The entire node from source to destination is analyzed to
detect the wormholes attack using AODV protocol in MANET. In [57], the authors propose a technique, which
is liable to detect wormholes attacks in MANET using analysis of the misbehaving nodes concept. According
to the authors, it concentrates on the detection of the abnormal nodes and prevention of the wormhole attacks.
The route discovery process is used, which is a sender node want to data sending process with another node in
the network, it has to go through its route cache. In case of unavailability of routes between the receiver and
sender than route is discarded and it broadcast RREP. The RREP is generated, when the receiver node or any
intermediate node has got the recent route to the receiver node. Another important is that DSR protocol is used
to detect the nodes where the misbehaving nodes are simple discarded and not including into the routing table
of DSR. In DSR, parameter is used for evaluating the network performance i.e jitter, throughput and delay. In
[58], here the authors used a general mechanism, which is used without hardware. It explains the details about
packet detection technique. That packet holds the information of localization and clock synchronization for
detecting affected node in MANET. Detection Packet has four fields: total hop count, processing bit, count to
reach next hop and timestamp .This fields are added to the header of detection packet. In [59], the authors
proposed a normalized wormhole local intrusion detection algorithm, which is up gradation version of local
intrusion detection routing security in MANET. In this technique an intermediate neighbor nodes are uses
discovery mechanism process and packet drop calculator. Based on the isolation technique, at the time of
transmission over the network, where each node received packet for the confirmed Wormhole nodes.
In [60], the authors proposed technique, which is based on Hash based compression function (HCF).
It is basically used for secure hash function to calculate the value of hash field for route request (RREQ) passes
over the networks. Here AODV routing protocol is used .As per the authors. Source node starts the route
discovery process for searching the destination node. Then the source node compute the HCF and also compute
the value of hash field with RREQ and it passes to his neighboring node. If the value of neighboring node is
same to the value of destination node .At that situation the destination node receives the no of RREQ. Finally
the destination node implement the HCF concept. Otherwise the others intermediate node between source to
destination, they will implement HCF hash fields and passes to its next node. If the calculated hash value is
compared to append hash value and gets the same result then the destination node send back RREP message
to the source. Otherwise if calculate the hash value is not same with the append hash value then the destination
node detects the RREQ and it treated as affected node by wormhole attackers.
In [61], the authors used a hybrid technique “wormhole resistant hybrid technique (WRHT)”. It based on
watchdog and Delhi Concept. It gives information about the packet drop and the delay per each hops and used
for the full phase route process in wireless sensor network. Here the authors build up method which is used for
wormhole detection in every sensor devices with low costs. WHRT is an extension version AODV routing
protocol. The proposed method is to allow for calculating the wormhole presence probability (WPP) for a path
in addition to hop count information in the source node over the sensor networks. During the route discovery
process, per hop time delay probability (TDPH) and time delay probability (TDPP) is calculated for detecting
wormhole attacks. In the next part of the WHRT, another parameter is calculated, which is called per hop
packet loss probability (PLPP). The values of PLPP and TDPP are used for decision making ,whether a path P
is affected by wormhole attacks or not. So that the routing protocol AODV is taking correct way for the
transmission over the sensors networks. We presented several wormholes attacks in WSN.Finally, by
evaluating the positive and negative aspects of all existing techniques, till date open research challenges studied
are required for detection wormhole attacks. In Tables 1, the most important detection methods and
requirements are elaborated in sequentially with respect to year.
Tables 1. The most important detection methods and requirements are elaborated in sequentially
with respect to year
Researcher Year Method Tools Protocol Requirements/Commentary
H. Lu, D. 2003 Directional - Directional Directional antennas on each node with
Evans [27] Antenna neighbor discovery GPS
protocol
Y.C. Hu and D.B. 2003 Packet leashes NS2 TIK protocol GPS Coordinator and Loosely
Jhanson [28] and end-to-end Synchronized clock.
L.lazos, 2004 Localization - - Based on location aware ‘guard
R. Poovendram [29] nodes’(LAGNs), not applicable to MANET
W. Wang and B. 2004 Network - - Centralized control, seems promising,
Bhargava [30] visualization works based on dense networks, mobility is
not studied
Issa Khalil, Saurabh 2005 LITEWORP NS2 Key management Applicable only in static networks,
Bagchi, Ness B. Shroff protocol
[31]
A. Baruch, R. Curmola, 2005 Time of flight NS2 ODSBR Hardware enabling one-bit messages and
C. Nita-Rotaru, D. immediate reply without CPU involvement
Holmer, H. Rubens [32]
N. Song, L. Qian, X. Li. 2005 Statistical NS2 MR and DSR Works only with multipath on demand
[33] Approaches protocol
H.S. Chiu and K. Lui [35] 2006 Delphi NS2 AODV Not considered
K.B. Rasmussen and S. 2007 Radio - - Fingerprinting Devices is needed.
Capkun, [36] Fingerprinting
Khin Sandar Win. [37] 2008 DAW NS2 DSR, LF analysis Delay Parameter
S. Choi, D. Kim, D. Lee, 2008 WAP CBR DSR Maximum transmission distance is
J. Jung [41] calculated
H. Vu, A. Kulkarni, K. 2008 WORMEROS - - Time synchronization is required.
Sarac, N. Mittal [43] Topological change is not considered
M.S. Sankaran, S. 2009 SAW - AODV Not considered
Poddar,
P. Das, [44]
H. Chen, W. Lou, X. Sun, 2010 Secure NS2 Conflicting the set-based resistance
and Z. Wang [48] localization localization,
Distributed detection system
Gupta S, Kar S, 2011 WHOP NS2 WHOP, AODV Not required any hard support and clock
Dharmaraja [50] synchronization
C.P. vandana, A.F.S. 2013 MLDW NS2 AODV Not required any specialized hard support
Devraj [55] and clock synchronization
R. singh, J, singh, 2016 WRHT NS2 AODV It based on the combination of two
Ravindar singh [61] techniques, i.e. Watchdog and Delphi.
5. CONCLUSION
Wormhole attacks in WSNs are one of the brutal attacks that can be implemented easily in sensors
networks. In this paper numbers of methodologies is discussed for detecting wormhole attack. However, it is
not less information. Therefore we believe that the analysis on this paper is helping us for developing the new
method to detect wormhole.
REFERENCES
[1] M. Tiwari, K. Veer Arya, R. Choudhari, K. Sidharth Choudhary. “Designing Intrusion Detection to Detect Black hole and Selective
Forwarding Attack in WSN based on local Information.” Fourth International Conference on Computer Sciences and Convergence
Information Technology” 2009.
[2] E. Nam Huh and T. Hong Hai. “Lightweight Intrusion Detection for Wireless Sensor Networks” iTech.2011.
[3] J. Du, J. Li, “A Study of Security Routing Protocol for Wireless Sensor Network.” International Conference on Instrumentation,
Measurement, Computer, Communication and Control, 2011.
[4] F. Bao, I. Ray Chen, M. Jeong Chang, and J.-Hee Cho. “Hierarchical Trust Management for Wireless Sensor Networks and its
Applications to Trust-Based Routing and Intrusion Detection.” IEEE Transactions on Network and Service Management, vol. 9,
no. 2, pp. 169-183, June 2012.
[5] M. A. Rassam, M.A. Maarof and A. Zainal. “A Survey of Intrusion Detection Schemes in Wireless Sensor Networks.” American
Journal of Applied Sciences, vol. 9, no. 10, pp. 1636-1652, January 2012.
[6] W. Ribeiro Pires J´unior, T. H. de Paula Figueiredo H. Chi Wong, A. A.F. Loureiro. “Malicious Node Detection in Wireless Sensor
Networks.” Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04), IEEE, 2004.
[7] V. K. Jatav, M. Tripathi, M S Gaur and V. Laxmi. “Wireless Sensor Networks: Attack Models and Detection.” IACSIT Hong Kong
Conferences IPCSIT, IACSIT Press, Singapore, vol. 3, 2012.
A. Paula R. da Silva, M.H.T. Martins Bruno, P.S. Rocha, A. A.F. Loureiro, L. B. Ruiz, H. Chi Wong. “Decentralized intrusion detection
in wireless sensor networks.” Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless
and Mobile Networks, 2005.
[8] G. Saravanan, P. R. Patil, M.R. Kumar. “Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing.”
IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 26-31, 2014.
[9] U Ghugar, J Pradhan, M Biswal. “A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor
Network using AODV Protocol.” IJCSN International Journal of Computer Science and Network, vol. 5, no. 4, August 2016.
[10] Y. Sabri, N. El Kamoun. “GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor
Networks.” Communications on Applied Electronics (CAE), pp. 2394–4714, 2016.
[11] Singh, M., Das, R. Sahoo. “A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network.”
International Journal of Scientific and Engineering Research. vol. 3, no. 10, 2012.
A. Bharathidasan and V. A. S. Ponduru. “Sensor Networks: An Overview.” Technical Report, Dept. of Computer Science, University
of California at Davis, 2002.
[12] M. Tubaishat and S. Madria. “Sensor networks: an overview.” IEEE Potentials, vol. 22, pp. 20-23, 2003.
[13] Priya Maidamwar and Nekita Chavhan. “A Survey on Security Issues to detect wormhole Attack in Wireless Sensor network.”
International Journal on Ad Hoc Networking Systems (IJANS), vol. 2, no. 4, October 2012.
[14] R.H. Khokhar, Md. A. Ngadi, S. Manda. “A Review of Current Routing Attacks in Mobile Ad Hoc Networks.” International
Journal of Computer Science and Security, vol. 2, no. 3, pp. 18-29, 2008.
[15] Jali, Kamarularifin Abd, Jamalul-Lail Ab Manan Zaid Ahmad. “Mitigation of Black Hole Attacks for Aodv Routing Protocol.”
International Journal of New Computer Architectures and Their Applications, vol. 1, pp. 336-343, 2011.
[16] Kumar, V. “Simulation and Comparison of AODV and DSR Routing Protocols in MANETs.” Master Thesis, 2009.
[17] S. Lu, L. Li, K. Lam and L. Jia. “SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.” 2009 International
Conference on Computational Intelligence and Security, Beijing, pp. 421-425, 2009.
[18] Manel Guerrero Zapata,” Secure Ad hoc On-Demand Distance Vector Routing.” in ACM SIGMOBILE Mobile Computing and
Communications Review, vol. 6, no. 3, pp. 106-107, June 2002.
[19] Chunhui Zhu, Myung J. Lee, Tarek Saadaw. “RTT-Based Optimal Waiting Time for Best Route Selection In Ad Hoc Routing
Protocols.” IEEE Military Communication Conference, vol. 2, pp1054-1059, Oct 2003.
[20] K.U.R Khan, A.V. Reddy, R.U. Zaman, K.A Reddy, T.S Harsha. “An Efficient DSDV RoutingProtocol for WirelessMobile Ad
Hoc Networks and its Performance Comparison.” SecondUKSIM European Symposium on Computer Modeling and Simulation,
India, pp. 506-511, 2008.
[21] B Kannhavong, H Nakayama, Y Nemoto, N Kato. “A Survey of Routing Attacks In Mobile Ad Hoc Networks.” IEEE Wireless
Communication, vol. 14, no. 5, October 2007.
[22] Abhishek Verma and Neha Bhardwaj. “A Review on Routing Information Protocol (RIP) and Open Shortest Path First (OSPF)
Routing Protocol.” International Journal of Future Generation Communication and Networking.vol. 9, pp. 161-170, 2016.
[23] https://en.wikipedia.org/wiki/Open_Shortest_Path_First.
[24] E Kaffashi, Ai Mousavi, H Rahvard. “A new attack on link-state database in open shortest path first routing protocol.” Journal of
Electrical and Electronic Engineering, vol. 3, no. 2-1, pp. 39-45, 2015.
[25] L. Hu, D. Evans. “Using Directional Antennas to Prevent Wormhole Attacks.” 14 Proceedings of the 11th Network and Distributed
System Security Symposium, pp. 2003.
[26] Y. C. Hu, A. Perrig, and D. B. Johnson. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks.” In Proc.,
of IEEE -INFOCOM, vol.3, pp. 1976-1986, 2003.
[27] Lazos, Loukas & Poovendran, Radha. “SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks.” ACM
Transactions on Sensor Networks, vol. 1, pp. 21-30, 2004.
[28] [30] W. Wang, B. Bhargava. “Visualization of wormholes in sensor networks.” Proceedings of the 2004 ACM workshop on Wireless
Security, pp. 51-60, 2004.
[29] Khalil, Saurabh Bagchi and N. B. Shroff. “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless
networks.” 2005 International Conference on Dependable Systems and Networks (DSN'05), Yokohama, Japan, pp. 612-621, 2005.
[30] B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens and C. Nita-Rotaru. “On the Survivability of Routing Protocols in Ad Hoc
Wireless Networks.” First International Conference on Security and Privacy for Emerging Areas in Communications Networks
(SECURECOMM'05), Athens, pp. 327-338, 2005.
[31] N. Song, L. Qian, X. Li. “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach”. In
Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.
[32] M.A. Gorlatova, P.C. Mason, M. Wang, L. Lamont, R. Liscano. “Detecting Wormhole Attacks in Mobile Ad Hoc Networks through
Protocol Breaking and Packet Timing Analysis.” In IEEE Military Communications Conference, pp. 1-7, 2006.
[33] H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International
Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
[34] K.B. Rasmussen and S. Capkun. “Implications of radio fingerprinting on the security of sensor networks.” Third International
Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331-340, Sep. 2007.
[35] Khin Sandar Win. “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and
Technology, vol. 48, pp. 422-428, 2008.
[36] F. Nait-Abdesselam, B. Bensaou and T. Taleb. “Detecting and avoiding wormhole attacks in wireless ad hoc networks.” in IEEE
Communications Magazine, vol. 46, no. 4, pp. 127-133, April 2008.
[37] S. Özdemir, M. Meghdadi, and Ý. Güler. “A time and trust-based wormhole detection algorithm for wireless sensor net- works.”
(manuscript in Turkish), in 3rd Information Security and Cryptology.
[38] Krontiris, T. Giannetsos, and T. Dimitriou. “Lidea: A distributed lightweight intrusion detection architecture for sensor networks.”
in SECURECOMM ’08: Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey,
September 22- 25 2008.
[39] S. Choi, D. Kim, D. Lee, J. Jung. “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks.” In International
Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.
[40] S Özdemir, M Meghdadi, Ý Güler. “Detection algorithm for wireless sensor networks” in 3rd Information Security and Cryptology
Conference (ISC’08).
[41] H. Vu, A. Kulkarni, K. Sarac, N. Mittal. “WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless
Ad Hoc Networks.” In Proceedings of International Confernce on Wireless Algorithms Systems and Applications, LNCS 5258, pp.
491-502, 2008.
[42] M.S. Sankaran, S. Poddar, P.S. Das, S. Selvakumar. “A Novel Security Model SaW: Security against Wormhole attack in Wireless
Sensor Networks.” In Proceedings of International Conference on PDCN, 2009.
[43] B. Triki, S. Rekhis, and N. Boudriga. “Digital Investigation of Wormhole Attacks in Wireless SensorNetworks.” Eighth IEEE
International Symposium on Network Computing and Applications, 2009.
[44] H. Chen, W. Lou, and Z. Wang. “Conflicting-set-based worm- hole attack resistant localization in wireless sensor networks." Book
Chapter Lecture Notes in Computer Science−Ubiquitous Intelligence and Computing, vol. 5585/2009, pp. 296−309, 2009.
[45] D.Barman Roy, R. Chaki, N. Chaki,” A New Cluster-based Wormhole Intrusion Detection algorithm for Mobile Adhoc Networks”,
International Journal of Network Security & Its Applications (IJNSA), vol 1, no 1, April 2009.
[46] H. Chen, W. Lou, X. Sun, and Z. Wang. “A secure localization approach against wormhole attacks using distance consistency.”
EURASIP Journal on Wireless Communication and Net- working- Special Issue on Wireless Network Algorithms, Systems and
Applications, vol. 1, pp.22−32, 2010.
[47] Prasannajit B, Venkatesh, Anupama S, Vindhykumari K, Subhashini S R, Vinitha G. “An approach towards Detection of Wormhole
Attack in Sensor Networks.” First International Conference on Integrated Intelligent Computing (ICIIC), pp.283-289, 2010.
[48] S. Gupta, S. Kar and S. Dharmaraja. “WHOP: Wormhole attack detection protocol using hound packet.” 2011 International
Conference on Innovations in Information Technology, Abu Dhabi, pp. 226-231, 2011.
[49] Z. Zhao, B. Wei, X. Dong, L. Yao and F. Gao. “Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical
Analysis.” 2010 WASE International Conference on Information Engineering, Beidaihe, Hebei, pp. 251-254, 2010.
[50] Bintu Kadhiwala and Harsh Shah. “Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-
hoc Networks.” IJCA Proceedings on International Conference on Recent Trends in Information Technology and Computer Science
2012 ICRTITCS, no. 9, pp. 1-6, February 2013.
[51] K. Patel, T. Manoranjitham. “Detection of wormhole attack in wireless sensor network.” International Journal of Engineering
Research & Technology (IJERT), 2013.
[52] D.S Kushwaha, A. Khare, J. L. Rana. “Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET.” International
Journal of Computer Applications, vol. 62, no. 7, pp. 21-25, January 2013.
[53] C.P. Vandana, A.F.S. Devraj. “MLDW-a Multilayered Detection mechanism for Wormhole attack in AODV based MANET.”
International Journal of Security, Privacy and Trust Management, vol. 2, no. 3, pp. 29-41, June 2013.
[54] S. Goyal, H. Rohil, “Securing MANET against Wormhole Attack using Neighbor Node Analysis.” International Journal of
Computer Applications, vol. 81, no. 18, pp. 44-48, November 2013.
[55] Y. Singh, A. Khatkar, P. Rani, “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, Third International
Conference on Advanced Computing & Communication Technologies, Rohtak, 6-7 April 2013.
[56] P. Nayak, A. Sahay, Y. Pandey. “Detection and Prevention of Wormhole Attacks in MANETs using Detection Packet.”
International Journal of Scientific & Engineering Research, vol. 4, no. 6, June-2013.
[57] N. Choudhary, S. Agrawal. “Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol.” SSRG International
Journal of Electronics and Communication Engineering (SSRG-IJECE), vol. 1, no. 10, Dec 2014.
A. Patel, N. Patel and R. Patel. “Defending against Wormhole Attack in MANET.” 2015 Fifth International Conference on
Communication Systems and Network Technologies, Gwalior, pp. 674-678, 2015.
[58] R. Singh, J, singh, Ravindar singh. “WHRT: A Hybrid Technique for Detecting of Wormhole Attack in Wireless Sensor Networks.”
Mobile Information Systems, Hindawi publishing Corpoartion, vol. 2016, no. 13, pp. 1-13, 2013.