Survey of wormhole attack in wireless sensor networks

Umashankar Ghugar, Jayaram Pradhan


From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.


IDS; Manet expression; Sensor node; Wormhole attacks; WSN


M. Tiwari, K.Veer Arya, R. Choudhari, K. Sidharth Choudhary, “Designing Intrusion Detection to Detect Black hole and Selective Forwarding Attack in WSN based on local Information”,”Fourth International Conference on Computer Sciences and Convergence Information Technology” 2009.

E. Nam Huh and T. Hong Hai,“Lightweight Intrusion Detection for Wireless Sensor Networks”iTech.2011.

J. Du, J. Li, “A Study of Security Routing Protocol For Wireless Sensor Network”, International Conference on Instrumentation, Measurement, Computer, Communication and Control-2011”

F. Bao, I. Ray Chen, M. Jeong Chang, and J.-Hee Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection”, “IEEE Transactions on Network and Service Management, June 2012”

M. A. Rassam, M.A. Maarof and A. Zainal, “A Survey of Intrusion Detection Schemes in Wireless Sensor Networks”, “American Journal of Applied Sciences, 2012”

W. Ribeiro Pires J´unior, T. H. de Paula Figueiredo H. Chi Wong, A. A.F. Loureiro, “Malicious Node Detection in Wireless Sensor Networks”, “Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04),IEEE 2004”

V. K. Jatav, M. Tripathi , M S Gaur and V. Laxmi, “Wireless Sensor Networks: Attack Models and Detection”,IACSIT Hong Kong Conferences IPCSIT vol. 30,IACSIT Press, Singapore 2012.

A. Paula R. da Silva, M.H.T. Martins Bruno, P.S. Rocha, A. A.F. Loureiro, L. B. Ruiz, H. Chi Wong, “Decentralized intrusion detection in wireless sensor networks”, Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005.

G.Saravanan, P. R.Patil, M.R. Kumar, “Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing”,IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727,Volume 16, Issue 2, Ver. I (Mar-Apr. 2014), PP 26-31”.

U Ghugar,J Pradhan,M Biswal “A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol”,IJCSN International Journal of Computer Science and Network, Volume 5, Issue 4, August 2016.

Y.Sabri,N.El Kamoun” GRPW-MuS-s: A Secure Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks” Communications on Applied Electronics (CAE) - ISSN : 2394 – 4714.2016.

Singh, M., Das, R.sahoo,“A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network” . International Journal of Scientific and Engineering Research.2012.

A. Bharathidasan and V. A. S. Ponduru, "Sensor Networks: An Overview",Technical Report, "Dept. of Computer Science, University of California at Davis 2002.

M. Tubaishat and S. Madria, "Sensor networks: an overview", IEEE Potentials, vol. 22, pp. 20-23,2003.

Priya Maidamwar and Nekita Chavhan,” A Survey on Security Issues to Detect wormhole Attack in Wireless Sensor network” International Journal on Ad Hoc Networking Systems (IJANS). Vol. 2, No. 4, October 2012.

R.H. Khokhar, Md. A.Ngadi, S. Manda. “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, 2 (3), pp. 18-29, 2008.

K Abd. Jalil, Z. Ahmad, J. Lail Ab Manan , “Mitigation of Black Hole Attacks for AODV Routing Protocol”, International Journal on New Computer Architectures and Their Applications (IJNCAA) The Society of Digital Information and Wireless Communications, 2011.

Kumar, V.”Simulation and Comparison of AODV and DSR Routing Protocols in MANETs”, Master Thesis (2009).

Songbai Lu, Longxuan Li,“SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack”, International Conference on Computational Intelligence and Security-2009.

Manel Guerrero Zapata,” Secure Ad hoc On-Demand Distance Vector Routing”.

Chunhui Zhu, Myung J. Lee, Tarek Saadaw “RTT-Based Optimal Waiting Time For Best Route Selection In Ad Hoc Routing Protocols”.IEEE Military Communication Conference,Vol.2,pp1054-1059,oct 2003.

K.U.R Khan, A.V. Reddy, R.U. Zaman, K.A Reddy, T.S Harsha, An Efficient DSDV RoutingProtocol for WirelessMobile Ad Hoc Networks and its Performance Comparison, SecondUKSIM European Symposium on Computer Modeling and Simulation, India, pp. 506-511, 2008.

B Kannhavong, H Nakayama, Y Nemoto, N Kato,” A Survey Of Routing Attacks In Mobile Ad Hoc Networks” IEEE Wireless Communication Volume: 14,Issue-5, October 2007. [24] Abhishek Verma and Neha Bhardwaj” A Review on Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) Routing Protocol”. International Journal of Future Generation Communication and Networking.Vol. 9, No., pp. 161-170,2016.

E Kaffashi, Ai Mousavi ,H Rahvard2 ,“A new attack on link-state database in open shortest path first routing protocol”. Journal of Electrical and Electronic Engineering 2015; 3(2-1): 39-45.

L. Hu, D. Evans,”Using Directional Antennas to Prevent Wormhole Attacks”, 14 Proceedings of the 11th Network and Distributed System Security Symposium, pp. 2003.

Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks,” inProc. of IEEE -INFOCOM, 2003, pp. 1976-1986, vol.3

L. Lazos, R. Poovendran, Serloc: Secure Range-Independent Localization for 21- 30, Wireless Sensor Networks, Proceedings of the ACM Workshop on Wireless Security, pp. October 2004.

W. Wang, B. Bhargava., Visualization of wormholes in sensor networks, Proceedings of the 2004 ACM workshop on Wireless Security, pp. 51-60, 2004.

Issa Khalil, Saurabh Bagchi, Ness B. Shroff,” LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multi hop Wireless Networks” Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN’05).

A. Baruch, R. Curmola, C. Nita-Rotaru, D. Holmer, H. Rubens, “On the Survivability of Routing Protocols in Ad Hoc Wireless Networks”.Convergence on Security and Privacy for Emerging Areas Communications, Secure Comm 2005, September2005.

N. Song, L. Qian, X. Li. “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach”. In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.

M.A. Gorlatova, P.C. Mason, M. Wang, L. Lamont, R. Liscano, “Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis”. In IEEE Military Communications Conference, pp. 1-7, 2006.

H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.

K.B. Rasmussen and S. Capkun, “Implications of radio fingerprinting on the security of sensor networks” Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331-340, Sep. 2007.

Khin Sandar Win. “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology, 48, pp. 422-428, 2008.

F. Nait-Abdesselam, B. Bensaou, T. Taleb. “Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks”, IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.

S. Özdemir, M. Meghdadi, and Ý. Güler. "A time and trust based wormhole detection algorithm for wireless sensor net- works," (manuscript in Turkish), in 3rd Information Security and Cryptology.

I. Krontiris, T. Giannetsos, and T. Dimitriou, “Lidea: A distributed lightweight intrusion detection architecture for sensor networks,” in SECURECOMM ’08: Fourth International Conference on Security and Privacy for Communication Networks, Istanbul, Turkey, September 22- 25 2008.

S. Choi, D. Kim, D. Lee, J. Jung. “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”. In International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.

Detection algorithm for wireless sensor networks” in 3rd Information Security and Cryptology Conference (ISC’08).

H. Vu, A. Kulkarni, K. Sarac, N. Mittal. “WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks”. In Proceedings of International Confernce on Wireless Algorithms Systems and Applications, LNCS 5258, pp. 491-502, 2008.

M.S. Sankaran, S. Poddar, P.S. Das, S. Selvakumar. “A Novel Security model SaW: Security against Wormhole attack in Wireless Sensor Networks”. In Proceedings of International Conference on PDCN, 2009.

B.TRIKI, S.REKHIS, and N. BOUDRIGA “Digital Investigation of Wormhole Attacks in Wireless SensorNetworks” Eighth IEEE International Symposium on Network Computing and Applications, 2009.

H. Chen, W. Lou, and Z. Wang. "Conflicting-set-based worm- hole attack resistant localization in wireless sensor networks," Book Chapter Lecture Notes in Computer Science − Ubiquitous Intelligence and Computing, vol. 5585/2009, pp. 296−309, 2009.

D.Barman Roy, R.Chaki, N.Chaki,” A New Cluster-based Wormhole Intrusion Detection algorithm for Mobile Adhoc Networks”, International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.

H. Chen, W. Lou, X. Sun, and Z. Wang. "A secure localization approach against wormhole attacks using distance consistency," EURASIP Journal on Wireless Communication and Net- working- Special Issue on Wireless Network Algorithms, Systems and Applications, pp.22−32, 2010.

Prasannajit B, Venkatesh, Anupama S, Vindhykumari K, Subhashini S R, Vinitha G; “An approach towards Detection of Wormhole Attack in Sensor Networks” First International Conference on Integrated Intelligent Computing (ICIIC), 2010, pp.283-289.

Gupta S, Kar S, Dharmaraja.“WHOP: Wormhole Attack Detection Protocol using Hound Packet”, IEEE International Conference on Innovations in Information Technology (2011).

Z.Zhao; B.Wei,X.Dong; L.Yao, F.Gao; “Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis”,International Conference on Information Engineering(ICIE), 2010.

B. Kadhiwala, H.Shah ”Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks”, International Conference in Recent Trends in Information Technology and Computer Science(ICRTITCS-2012).

K.patel, T.Manoranjitham.”Detection of wormhole attack in wireless sensor network”, International Journal of Engineering Research & Technology (IJERT) 2013.

D.S Kushwaha, A.Khare, J. L.Rana “Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET”, International Journal of Computer Applications (0975 – 8887) Volume 62– No.7, January 2013.

C.P.vandana,A.F.S.Devraj.”MLDW-a Multilayered Detection mechanism for Wormhole attack in AODV based MANET”, International Journal of Security, Privacy and Trust Management.vol2, issue-03, june (2013).

S.Goyal, H.Rohil, “Securing MANET against Wormhole Attack using Neighbor Node Analysis”, International Journal of Computer Applications (0975 – 8887) Volume 81, Issue 18, November 2013.

Y. Singh, A.Khatkar, P.Rani, “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, Third International Conference on Advanced Computing & Communication Technologies, Rohtak, 6-7 April 2013.

P.Nayak, A.Sahay, Y.Pandey,“Detection and Prevention of Wormhole Attacks in MANETs using Detection Packet”, International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013.

N.Choudhary,S.Agrawal “Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol”, SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE), Dec 2014.

A.Patel,N.Patel,R.Patel,” Defending Against Wormhole Attack in MANET”, Fifth International Conference on Communication Systems and Network Technologies.2015.

R.singh,J,singh ,Ravindar singh”WHRT: A Hybrid Technique For Detecting Of Wormhole Attack in Wireless Sensor Networks”Mobile Information Systems,Hindawi publishing Corpoartion,volume 2016.



  • There are currently no refbacks.

Copyright (c) 2020 APTIKOM Journal on Computer Science and Information Technologies

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2528-2417, e-ISSN: 2528-2425

CSIT Stats


Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.