AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks

Author:

Hanif Maria,Ashraf HumairaORCID,Jalil Zakia,Jhanjhi Noor ZamanORCID,Humayun MamoonaORCID,Saeed Saqib,Almuhaideb Abdullah M.ORCID

Abstract

The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the subject of the detection and mitigation of wormhole attacks in wireless sensor networks. The existing surveys are also explored to find gaps in the literature. Several existing schemes based on different methods are also evaluated critically in terms of throughput, detection rate, low energy consumption, packet delivery ratio, and end-to-end delay. As artificial intelligence and machine learning have massive potential for the efficient management of sensor networks, this paper provides AI- and ML-based schemes as optimal solutions for the identified state-of-the-art problems in wormhole attack detection. As per the author’s knowledge, this is the first in-depth review of AI- and ML-based techniques in wireless sensor networks for wormhole attack detection. Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks.

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference75 articles.

1. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks

2. Self-maintenance model for Wireless Sensor Networks

3. Renewable energy harvesting schemes in wireless sensor networks: A Survey

4. Analysis of LEACH Routing Protocol in Wireless Sensor Network with Wormhole Attack;Sampoornam;Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV),2021

5. Clustering objectives in wireless sensor networks: A survey and research direction analysis

Cited by 16 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Explainable AI in Military Training Applications;Advances in Explainable AI Applications for Smart Cities;2024-01-18

2. The Need for Explainable AI in Industry 5.0;Advances in Explainable AI Applications for Smart Cities;2024-01-18

3. DDoS Attack Detection in WSN Using Modified BGRU With MFO Model;Advanced Applications of Generative AI and Natural Language Processing Models;2023-12-21

4. Attack prediction using machine learning in Wireless Sensor networks;2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE);2023-11-01

5. Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks;Peer-to-Peer Networking and Applications;2023-10-06

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3