Wormhole attack detection techniques in ad-hoc network: A systematic review

被引:4
作者
Gupta, Chitvan [2 ,3 ]
Singh, Laxman [1 ]
Tiwari, Rajdev [4 ]
机构
[1] Noida Inst Engn & Technol, Dept Elect & Comm, Greater Noida, UP, India
[2] Dr APJ Abdul Kalam Tech Univ, Dept Comp Sci & Engn, Lucknow, Uttar Pradesh, India
[3] GL Bajaj Inst Technol & Management, Greater Noida, India
[4] CEEKH Edunix Pvt Ltd, Noida, Uttar Pradesh, India
关键词
mobile ad-hoc network; artificial immune system; round trip time; machine learning; supervized learning; BLACK-HOLE ATTACK; INTRUSION DETECTION SYSTEM; DETECTION ALGORITHM; TRAVERSAL TIME; SECURITY; COMMUNICATION; PREVENTION; CHALLENGES; SCHEME; COUNTERMEASURES;
D O I
10.1515/comp-2022-0245
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topological area for more flexibility and accurate results.
引用
收藏
页码:260 / 288
页数:29
相关论文
共 196 条
[1]   Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET) [J].
Abdan, Masoud ;
Seno, Seyed Amin Hosseini .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
[2]  
Abu Zant M., 2019, HINDAWI SECURITY COM, V2019
[3]  
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[4]  
Al Farraj O., 2018, J AMBIENT INTELL HUM, V33
[5]   Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks [J].
Alajlan, Abrar M. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03) :4241-4259
[6]   Distance-based confidence generation and aggregation of classifier for unstructured road detection [J].
Alam, Altaf ;
Singh, Laxman ;
Jaffery, Zainul Abdin ;
Verma, Yogesh Kumar ;
Diwakar, Manoj .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) :8727-8738
[7]   Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks [J].
Aliady, Wateen A. ;
Al-Ahmadi, Saad A. .
IEEE ACCESS, 2019, 7 :84132-84141
[8]  
Aluvala S., 2016, PERSPECT SCI, V8, P680, DOI [10.1016/J.PISC.2016.06.057, DOI 10.1016/J.PISC.2016.06.057]
[9]   Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol [J].
Amish, Parmar ;
Vaghela, V. B. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :700-707
[10]   Efficient energy optimization in mobile ad hoc network (MANET) using better-quality AODV protocol [J].
Anand, M. ;
Sasikala, T. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5) :12681-12687