Wormhole attack detection techniques in ad-hoc network: A systematic review
Author:
Gupta Chitvan12, Singh Laxman3, Tiwari Rajdev4
Affiliation:
1. Department of Computer Science & Engineering, Dr. A.P.J. Abdul Kalam Technical University , Lucknow , U.P. , India 2. G.L. Bajaj Institute of Technology and Management , Greater Noida , India 3. Department of Electronics and Comm., Noida Institute of Engineering & Technology , Greater Noida , U.P. , India 4. CEEKH Edunix Pvt. Ltd. , Noida , Uttar Pradesh , India
Abstract
Abstract
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topological area for more flexibility and accurate results.
Publisher
Walter de Gruyter GmbH
Subject
General Computer Science
Reference203 articles.
1. N. Song, L. Qian, and X. Li, “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach,” In: 19th IEEE International Parallel and Distributed Processing Symposium, Denver, 2005, p. 8. 2. M. Masoud, Y. Jaradat, A. Manasrah, and I. Jannoud, “Sensors of smart devices in the internet of everything (IoE) era: big opportunities and massive doubts,” J. Sens., vol. 2019, p. 26, 2019. 3. X. Liu, Z. Li, P. Yang, and Y. Dong, “Information-centric mobile ad hoc networks and content routing: A survey,” Ad Hoc Netw., vol. 58, pp. 255–268, 2017. 4. H. Kim, M. Bae, W. Lee, and H. Kim, “Adaptive decision of wireless access network for higher user satisfaction,” Wirel. Commun. Mob. Comput., vol. 2018, p. 19, 2018. 5. F. A. Khan, M. Imran, H. Abbas, and M. H. Durad, “A detection and prevention system against collaborative attacks in mobile ad hoc networks,” Future Gener. Computer Syst., vol. 68, pp. 416–427, 2017.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|