Wormhole attack detection techniques in ad-hoc network: A systematic review

被引:4
作者
Gupta, Chitvan [2 ,3 ]
Singh, Laxman [1 ]
Tiwari, Rajdev [4 ]
机构
[1] Noida Inst Engn & Technol, Dept Elect & Comm, Greater Noida, UP, India
[2] Dr APJ Abdul Kalam Tech Univ, Dept Comp Sci & Engn, Lucknow, Uttar Pradesh, India
[3] GL Bajaj Inst Technol & Management, Greater Noida, India
[4] CEEKH Edunix Pvt Ltd, Noida, Uttar Pradesh, India
关键词
mobile ad-hoc network; artificial immune system; round trip time; machine learning; supervized learning; BLACK-HOLE ATTACK; INTRUSION DETECTION SYSTEM; DETECTION ALGORITHM; TRAVERSAL TIME; SECURITY; COMMUNICATION; PREVENTION; CHALLENGES; SCHEME; COUNTERMEASURES;
D O I
10.1515/comp-2022-0245
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topological area for more flexibility and accurate results.
引用
收藏
页码:260 / 288
页数:29
相关论文
共 196 条
[21]  
Barani F, 2014, 2014 IRANIAN CONFERENCE ON INTELLIGENT SYSTEMS (ICIS)
[22]   Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks [J].
Bhushan, Bharat ;
Sahoo, Gadadhar .
WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) :2037-2077
[23]   A ranging based scheme for detecting the wormhole attack in wireless sensor networks [J].
Tian, Bin ;
Li, Qi ;
Yang, Yi-Xian ;
Li, Dong ;
Xin, Yang .
Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1) :6-10
[24]   A comprehensive survey on machine learning for networking: evolution, applications and research opportunities [J].
Boutaba, Raouf ;
Salahuddin, Mohammad A. ;
Limam, Noura ;
Ayoubi, Sara ;
Shahriar, Nashid ;
Estrada-Solano, Felipe ;
Caicedo, Oscar M. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2018, 9 (01)
[25]  
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[26]   An Overview of Trust-Based Routing Design Under Adversarial Mobile Ad Hoc Network Environment [J].
Cai, Ruo Jun ;
Tan, Wesley Chee-Wah ;
Chong, Peter Han Joo .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) :3923-3946
[27]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[28]   Securing DV-Hop localization against wormhole attacks in wireless sensor networks [J].
Chen, Honglong ;
Lou, Wei ;
Wang, Zhi ;
Wu, Junfeng ;
Wang, Zhibo ;
Xia, Aihua .
PERVASIVE AND MOBILE COMPUTING, 2015, 16 :22-35
[29]   TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks [J].
Chen, Hsing-Chung .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :449-459
[30]  
Chiu HS, 2006, INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, P149