AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks

The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole att...

Full description

Saved in:
Bibliographic Details
Published inElectronics (Basel) Vol. 11; no. 15; p. 2324
Main Authors Hanif, Maria, Ashraf, Humaira, Jalil, Zakia, Jhanjhi, Noor Zaman, Humayun, Mamoona, Saeed, Saqib, Almuhaideb, Abdullah M.
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.08.2022
Subjects
Online AccessGet full text
ISSN2079-9292
2079-9292
DOI10.3390/electronics11152324

Cover

Abstract The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the subject of the detection and mitigation of wormhole attacks in wireless sensor networks. The existing surveys are also explored to find gaps in the literature. Several existing schemes based on different methods are also evaluated critically in terms of throughput, detection rate, low energy consumption, packet delivery ratio, and end-to-end delay. As artificial intelligence and machine learning have massive potential for the efficient management of sensor networks, this paper provides AI- and ML-based schemes as optimal solutions for the identified state-of-the-art problems in wormhole attack detection. As per the author’s knowledge, this is the first in-depth review of AI- and ML-based techniques in wireless sensor networks for wormhole attack detection. Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks.
AbstractList The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the subject of the detection and mitigation of wormhole attacks in wireless sensor networks. The existing surveys are also explored to find gaps in the literature. Several existing schemes based on different methods are also evaluated critically in terms of throughput, detection rate, low energy consumption, packet delivery ratio, and end-to-end delay. As artificial intelligence and machine learning have massive potential for the efficient management of sensor networks, this paper provides AI- and ML-based schemes as optimal solutions for the identified state-of-the-art problems in wormhole attack detection. As per the author’s knowledge, this is the first in-depth review of AI- and ML-based techniques in wireless sensor networks for wormhole attack detection. Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks.
Author Ashraf, Humaira
Humayun, Mamoona
Almuhaideb, Abdullah M.
Saeed, Saqib
Jhanjhi, Noor Zaman
Jalil, Zakia
Hanif, Maria
Author_xml – sequence: 1
  givenname: Maria
  surname: Hanif
  fullname: Hanif, Maria
– sequence: 2
  givenname: Humaira
  orcidid: 0000-0001-5067-3172
  surname: Ashraf
  fullname: Ashraf, Humaira
– sequence: 3
  givenname: Zakia
  surname: Jalil
  fullname: Jalil, Zakia
– sequence: 4
  givenname: Noor Zaman
  orcidid: 0000-0001-8116-4733
  surname: Jhanjhi
  fullname: Jhanjhi, Noor Zaman
– sequence: 5
  givenname: Mamoona
  orcidid: 0000-0001-6339-2257
  surname: Humayun
  fullname: Humayun, Mamoona
– sequence: 6
  givenname: Saqib
  orcidid: 0000-0001-7136-3480
  surname: Saeed
  fullname: Saeed, Saqib
– sequence: 7
  givenname: Abdullah M.
  orcidid: 0000-0002-2004-5324
  surname: Almuhaideb
  fullname: Almuhaideb, Abdullah M.
BookMark eNp9kE9PAjEQxRuDiYh8Ai9NPK-2nd3t9oj4j4ToQQzHTekOobC02JYYv71L8GCMcS4zh_d7b_LOSc95h4RccnYNoNgNtmhS8M6ayDkvBIj8hPQFkypTQonej_uMDGNcs24UhwpYn0xGk-xWR2zo3IftyrdIRylps6F3mDpf6x2doVk5-77HSK2jcxu6xBjpK7roA33G9OHDJl6Q06VuIw6_94C8PdzPxk_Z9OVxMh5NMwNCpExyBaLk0EgslVlWXKLhkC-kKXneQFMy0EoprBqhNS94viilKqtcC9RG6RIG5Orouwv-8FOq134fXBdZC8lYAYUE6FRwVJngYwy4rHfBbnX4rDmrD7XVf9TWUeoXZWzShxJS0Lb9l_0CdUV33Q
CitedBy_id crossref_primary_10_1007_s11277_024_10999_3
crossref_primary_10_1109_ACCESS_2024_3372187
crossref_primary_10_1002_cpe_8067
crossref_primary_10_4018_IJSWIS_345934
crossref_primary_10_3390_app14125220
crossref_primary_10_1145_3706583
crossref_primary_10_1016_j_future_2023_01_017
crossref_primary_10_1109_ACCESS_2024_3365634
crossref_primary_10_1186_s13677_024_00609_9
crossref_primary_10_1007_s11277_024_10913_x
crossref_primary_10_1016_j_vehcom_2024_100826
crossref_primary_10_1109_ACCESS_2024_3476388
crossref_primary_10_1007_s11277_024_11566_6
crossref_primary_10_3390_electronics12051095
Cites_doi 10.1007/978-981-13-0344-9_39
10.1016/j.jesit.2017.02.002
10.1007/978-981-15-5258-8_29
10.1109/ACCESS.2019.2894637
10.1049/iet-wss.2017.0075
10.1109/ICCSDET.2018.8821160
10.1016/j.comnet.2019.01.008
10.1007/s11277-021-08327-0
10.1109/I2CT.2018.8529426
10.1016/j.inffus.2020.07.005
10.3390/asi3010014
10.1007/s11277-019-06160-0
10.1007/s11277-020-07365-4
10.1109/SEGE.2018.8499473
10.1002/cpe.5017
10.1109/TIFS.2016.2570740
10.1016/j.promfg.2019.02.292
10.1007/s11276-018-1734-z
10.1007/978-981-10-7901-6_92
10.1108/IJPCC-10-2020-0162
10.1109/ICISC.2018.8398917
10.3390/fi9040077
10.1007/s11277-021-09395-y
10.1007/s11277-021-08647-1
10.1007/s00500-022-06915-1
10.1007/s11277-021-08277-7
10.1109/ICPEDC47771.2019.9036536
10.1016/j.asoc.2021.107099
10.1016/j.comnet.2020.107376
10.1109/ICACCAF.2017.8344730
10.1007/s13201-020-01276-2
10.1016/j.future.2017.10.026
10.11591/csit.v2i1.p33-42
10.1109/ACCESS.2019.2924283
10.1109/ICCWorkshops50388.2021.9473770
10.1109/FIOT.2018.8325596
10.3390/s20082311
10.1109/ICoDT252288.2021.9441515
10.1016/j.jnca.2021.103118
10.1016/j.micpro.2020.103278
10.1109/TNSE.2018.2881152
10.1080/13614576.2016.1247741
10.21817/ijet/2017/v9i3/1709030342
10.1016/j.cose.2018.02.004
10.1109/ISCISC.2018.8546943
10.1109/ICIRCA.2018.8597366
10.3390/s19092144
10.1109/ACCESS.2020.2983438
10.1109/ACCESS.2020.2983091
10.1109/ICE348803.2020.9122944
10.1109/ICEECCOT43722.2018.9001597
10.1109/ICICV50876.2021.9388540
10.1016/j.compeleceng.2017.12.022
10.35833/MPCE.2020.000159
10.1007/s10586-018-1825-8
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SP
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L7M
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.3390/electronics11152324
DatabaseName CrossRef
Electronics & Communications Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One
ProQuest Central
SciTech Premium Collection
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database (Proquest)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
Advanced Technologies Database with Aerospace
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2079-9292
ExternalDocumentID 10_3390_electronics11152324
GroupedDBID 5VS
8FE
8FG
AAYXX
ADMLS
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
IAO
ITC
KQ8
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
7SP
8FD
ABUWG
AZQEC
DWQXO
L7M
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c322t-71932613d7e69cf817ec134b7c614d3d603a999e8d2aa1514b679684a2eac9a63
IEDL.DBID 8FG
ISSN 2079-9292
IngestDate Fri Jul 25 03:10:32 EDT 2025
Thu Apr 24 23:02:33 EDT 2025
Tue Jul 01 01:47:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 15
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c322t-71932613d7e69cf817ec134b7c614d3d603a999e8d2aa1514b679684a2eac9a63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-7136-3480
0000-0001-5067-3172
0000-0001-8116-4733
0000-0001-6339-2257
0000-0002-2004-5324
OpenAccessLink https://www.proquest.com/docview/2700535733?pq-origsite=%requestingapplication%
PQID 2700535733
PQPubID 2032404
ParticipantIDs proquest_journals_2700535733
crossref_primary_10_3390_electronics11152324
crossref_citationtrail_10_3390_electronics11152324
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Electronics (Basel)
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Ahutu (ref_12) 2020; 8
Chezhiyan (ref_70) 2013; 1
Yap (ref_74) 2020; 8
ref_14
Abdan (ref_31) 2021; 2021
Govindasamy (ref_47) 2018; 5
Memon (ref_25) 2021; 4
ref_56
ref_55
Li (ref_62) 2018; 8
ref_53
ref_18
ref_17
ref_16
ref_15
Sonavane (ref_54) 2019; 32
Shahraki (ref_5) 2020; 180
Gulganwa (ref_33) 2022; 14
Purkar (ref_75) 2017; 9
Kaur (ref_63) 2021; 119
Farjamnia (ref_19) 2019; 105
Luo (ref_37) 2019; 7
ref_61
Numan (ref_6) 2020; 8
ref_68
Roy (ref_50) 2020; 12
ref_22
ref_21
Kori (ref_52) 2019; 11
Patel (ref_42) 2019; Volume 760
Jamali (ref_26) 2016; 21
ref_29
Elsayed (ref_2) 2018; 70
ref_28
Bai (ref_41) 2019; 150
Murugaboopathi (ref_13) 2020; 32
ref_27
Kambalimath (ref_72) 2020; 10
ref_71
Scholar (ref_59) 2020; 6
Tiruvakadu (ref_46) 2018; 76
Scholar (ref_58) 2019; 5
ref_36
Karthigadevi (ref_51) 2018; 7
ref_35
Zardari (ref_48) 2021; 8
ref_32
Athmani (ref_65) 2019; 92
ref_30
Liu (ref_24) 2016; 11
Chatla (ref_60) 2021; 12
ref_39
Bhosale (ref_64) 2021; 124
Ali (ref_34) 2022; 14
ref_38
Jagadeesan (ref_69) 2019; 22
Sah (ref_3) 2020; 63
Vo (ref_40) 2019; 25
Premkumar (ref_9) 2020; 79
Liu (ref_10) 2018; 7
Ghugar (ref_20) 2020; 2
Aliady (ref_43) 2019; 7
Tamilarasi (ref_57) 2020; 114
Gupta (ref_73) 2021; 102
ref_45
ref_44
Shukla (ref_67) 2021; 121
Ahlawat (ref_66) 2021; 33
ref_1
Yousefpoor (ref_11) 2021; 190
Padmapriya (ref_23) 2018; 5
ref_49
ref_8
ref_4
ref_7
References_xml – volume: Volume 760
  start-page: 463
  year: 2019
  ident: ref_42
  article-title: Detection of Wormhole Attack in Static Wireless Sensor Networks
  publication-title: Advances in Computer Communication and Computational Sciences
  doi: 10.1007/978-981-13-0344-9_39
– volume: 5
  start-page: 735
  year: 2018
  ident: ref_47
  article-title: A comparative study of reactive, proactive, and hybrid routing protocol in wireless sensor networks under wormhole attack
  publication-title: J. Electr. Syst. Inf. Technol.
  doi: 10.1016/j.jesit.2017.02.002
– ident: ref_28
  doi: 10.1007/978-981-15-5258-8_29
– volume: 7
  start-page: 18194
  year: 2019
  ident: ref_37
  article-title: CREDND: A novel secure neighbor discovery algorithm for wormhole attack
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2894637
– volume: 8
  start-page: 68
  year: 2018
  ident: ref_62
  article-title: Security DV-hop localization algorithm against wormhole attack in wireless sensor network
  publication-title: IET Wirel. Sens. Syst.
  doi: 10.1049/iet-wss.2017.0075
– volume: 33
  start-page: 268
  year: 2021
  ident: ref_66
  article-title: An attack resistant key predistribution scheme for wireless sensor networks
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– ident: ref_18
  doi: 10.1109/ICCSDET.2018.8821160
– volume: 150
  start-page: 190
  year: 2019
  ident: ref_41
  article-title: Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2019.01.008
– volume: 14
  start-page: 159
  year: 2022
  ident: ref_34
  article-title: Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme
  publication-title: J. Inf. Technol. Manag.
– volume: 119
  start-page: 1
  year: 2021
  ident: ref_63
  article-title: Performance Evaluation of the Proposed Wormhole Detection Scheme with Existing Schemes
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-021-08327-0
– ident: ref_38
  doi: 10.1109/I2CT.2018.8529426
– volume: 63
  start-page: 223
  year: 2020
  ident: ref_3
  article-title: Renewable energy harvesting schemes in wireless sensor networks: A survey
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2020.07.005
– ident: ref_7
  doi: 10.3390/asi3010014
– volume: 11
  start-page: 20
  year: 2019
  ident: ref_52
  article-title: Distributed Wormhole Attack Mitigation Technique in WSNs
  publication-title: Int. J. Comput. Netw. Inf. Secure
– volume: 105
  start-page: 1561
  year: 2019
  ident: ref_19
  article-title: Review of the techniques against the wormhole attacks on wireless sensor networks
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-019-06160-0
– volume: 114
  start-page: 329
  year: 2020
  ident: ref_57
  article-title: Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-020-07365-4
– volume: 4
  start-page: 100225
  year: 2021
  ident: ref_25
  article-title: A survey on 802.11 MAC protocols industrial standards, architecture elements for providing QoS guarantee, supporting emergency traffic, and security: Future directions
  publication-title: J. Ind. Inf. Integr.
– ident: ref_45
  doi: 10.1109/SEGE.2018.8499473
– volume: 32
  start-page: e5017
  year: 2020
  ident: ref_13
  article-title: Modified secure AODV protocol to prevent wormhole attacks in MANET
  publication-title: Concurr. Comput. Pract. Exp.
  doi: 10.1002/cpe.5017
– volume: 11
  start-page: 2013
  year: 2016
  ident: ref_24
  article-title: ActiveTrust: Secure and trustable routing in wireless sensor networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2016.2570740
– volume: 32
  start-page: 840
  year: 2019
  ident: ref_54
  article-title: A real-time intrusion detection system for wormhole attack in the RPL-based Internet of Things
  publication-title: Procedia Manuf.
  doi: 10.1016/j.promfg.2019.02.292
– volume: 25
  start-page: 4115
  year: 2019
  ident: ref_40
  article-title: MLAMAN: A novel multi-level authentication model and protocol for preventing wormhole attacks in mobile ad hoc networks
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-018-1734-z
– ident: ref_22
  doi: 10.1007/978-981-10-7901-6_92
– ident: ref_29
  doi: 10.1108/IJPCC-10-2020-0162
– volume: 14
  start-page: 135
  year: 2022
  ident: ref_33
  article-title: EES-WCA: Energy-efficient and secure weighted clustering for WSN using machine learning approach
  publication-title: Int. J. Inf. Technol.
– ident: ref_55
  doi: 10.1109/ICISC.2018.8398917
– ident: ref_27
– ident: ref_8
  doi: 10.3390/fi9040077
– volume: 124
  start-page: 1081
  year: 2021
  ident: ref_64
  article-title: Wormhole Attack Detection System for IoT Network: A Hybrid Approach
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-021-09395-y
– volume: 121
  start-page: 1
  year: 2021
  ident: ref_67
  article-title: Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-021-08647-1
– volume: 8
  start-page: e2
  year: 2021
  ident: ref_48
  article-title: A lightweight technique for detection and prevention of wormhole attacks in MANET
  publication-title: EAI Endorsed Trans. Scalable Inf. Syst.
– ident: ref_32
  doi: 10.1007/s00500-022-06915-1
– volume: 2021
  start-page: 2375702
  year: 2021
  ident: ref_31
  article-title: Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad-Hoc Network (MANET)
  publication-title: Wirel. Commun. Mob. Comput.
– ident: ref_35
  doi: 10.1007/s11277-021-08277-7
– ident: ref_53
  doi: 10.1109/ICPEDC47771.2019.9036536
– volume: 102
  start-page: 107099
  year: 2021
  ident: ref_73
  article-title: On robust asymmetric Lagrangian ν-twin support vector regression using pinball loss function
  publication-title: Appl. Soft. Comput.
  doi: 10.1016/j.asoc.2021.107099
– volume: 180
  start-page: 107376
  year: 2020
  ident: ref_5
  article-title: Clustering objectives in wireless sensor networks: A survey and research direction analysis
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2020.107376
– ident: ref_17
– ident: ref_61
  doi: 10.1109/ICACCAF.2017.8344730
– volume: 10
  start-page: 1
  year: 2020
  ident: ref_72
  article-title: A basic review of fuzzy logic applications in hydrology and water resources
  publication-title: Appl. Water Sci.
  doi: 10.1007/s13201-020-01276-2
– volume: 92
  start-page: 789
  year: 2019
  ident: ref_65
  article-title: EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.10.026
– volume: 2
  start-page: 33
  year: 2020
  ident: ref_20
  article-title: Survey of wormhole attack in wireless sensor networks
  publication-title: Comput. Sci. Inf. Technol.
  doi: 10.11591/csit.v2i1.p33-42
– volume: 7
  start-page: 84132
  year: 2019
  ident: ref_43
  article-title: Energy preserving secure measure against wormhole attack in wireless sensor networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2924283
– ident: ref_14
  doi: 10.1109/ICCWorkshops50388.2021.9473770
– ident: ref_56
  doi: 10.1109/FIOT.2018.8325596
– ident: ref_1
  doi: 10.3390/s20082311
– ident: ref_15
  doi: 10.1109/ICoDT252288.2021.9441515
– ident: ref_30
– volume: 1
  start-page: 60562730
  year: 2013
  ident: ref_70
  article-title: Measurement-based analysis of reactive protocols in manet
  publication-title: Int. J. Wired Wirel. Commun.
– volume: 5
  start-page: 1937
  year: 2019
  ident: ref_58
  article-title: Predication and Root Selection of Worm Hole Attack in WSN
  publication-title: Int. J. Sci. Res. Eng. Trends
– volume: 190
  start-page: 103118
  year: 2021
  ident: ref_11
  article-title: Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2021.103118
– volume: 79
  start-page: 103278
  year: 2020
  ident: ref_9
  article-title: DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks
  publication-title: Microprocess. Microsyst.
  doi: 10.1016/j.micpro.2020.103278
– volume: 7
  start-page: 356
  year: 2018
  ident: ref_10
  article-title: Design and analysis of probing route to defense sinkhole attacks for Internet of Things security
  publication-title: IEEE Trans. Netw. Sci. Eng.
  doi: 10.1109/TNSE.2018.2881152
– volume: 21
  start-page: 79
  year: 2016
  ident: ref_26
  article-title: Defending against Wormhole Attack in MANET Using an Artificial Immune System
  publication-title: New Rev. Inf. Netw.
  doi: 10.1080/13614576.2016.1247741
– volume: 9
  start-page: 2514
  year: 2017
  ident: ref_75
  article-title: A review on energy-efficient clustering protocols of heterogeneous wireless sensor network
  publication-title: Int. J. Eng. Technol.
  doi: 10.21817/ijet/2017/v9i3/1709030342
– volume: 76
  start-page: 32
  year: 2018
  ident: ref_46
  article-title: Confirmation of wormhole attack in MANETs using honeypot
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2018.02.004
– ident: ref_44
– ident: ref_39
  doi: 10.1109/ISCISC.2018.8546943
– ident: ref_21
– ident: ref_68
  doi: 10.1109/ICIRCA.2018.8597366
– volume: 12
  start-page: 1
  year: 2020
  ident: ref_50
  article-title: RTT-based wormhole detection for wireless mesh networks
  publication-title: Int. J. Inf. Technol.
– ident: ref_71
  doi: 10.3390/s19092144
– volume: 8
  start-page: 63270
  year: 2020
  ident: ref_12
  article-title: Centralized routing protocol for detecting wormhole attacks in wireless sensor networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2983438
– volume: 12
  start-page: 2763
  year: 2021
  ident: ref_60
  article-title: Trust-Based Secure Network For Detection Of Attacks (Wormhole And Black Hole) Due To Malicious Nodes In Ad Hoc Wireless Sensor Network
  publication-title: Turk. J. Comput. Math. Educ. TURCOMAT
– volume: 8
  start-page: 65450
  year: 2020
  ident: ref_6
  article-title: A systematic review on clone node detection in static wireless sensor networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2983091
– ident: ref_16
  doi: 10.1109/ICE348803.2020.9122944
– ident: ref_49
  doi: 10.1109/ICEECCOT43722.2018.9001597
– volume: 7
  start-page: 215
  year: 2018
  ident: ref_51
  article-title: Wormhole attack detection and prevention using EIGRP protocol based on round trip time
  publication-title: J. Cyber Secure. Mobil.
– volume: 6
  start-page: 212
  year: 2020
  ident: ref_59
  article-title: Collaborative Decision for Wormhole Attack Prevention in WSN
  publication-title: Int. J. Sci. Res. Eng. Trends
– ident: ref_4
  doi: 10.1109/ICICV50876.2021.9388540
– ident: ref_36
– volume: 70
  start-page: 799
  year: 2018
  ident: ref_2
  article-title: Self-maintenance model for wireless sensor networks
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2017.12.022
– volume: 8
  start-page: 1043
  year: 2020
  ident: ref_74
  article-title: Artificial Intelligence Based MPPT Techniques for Solar Power System: A review
  publication-title: J. Mod. Power Syst. Clean Energy
  doi: 10.35833/MPCE.2020.000159
– volume: 5
  start-page: 2120
  year: 2018
  ident: ref_23
  article-title: A Survey: Techniques and Challenges to Detect Wormhole Attack in Wireless Sensor Network
  publication-title: J. Appl. Sci. Comput.
– volume: 22
  start-page: 299
  year: 2019
  ident: ref_69
  article-title: Design and implement a cross-layer verification framework (CLVF) for detecting and preventing black hole and wormhole attack in wireless ad-hoc networks for cloud environment
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-018-1825-8
SSID ssj0000913830
Score 2.473579
SecondaryResourceType review_article
Snippet The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 2324
SubjectTerms Artificial intelligence
Cloning
Communications systems
Cryptography
Denial of service attacks
Energy consumption
Literature reviews
Machine learning
Network latency
Nodes
Sensors
Systematic review
Wireless communications
Wireless networks
Wireless sensor networks
Wormholes
Title AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
URI https://www.proquest.com/docview/2700535733
Volume 11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEN4oXPRgfEYUyR48uoHtbh-cTBEQjBIjEL012-2SGElBWv-_M32AJIZTD-1eZjvzfTM7-w0ht9KTKOrNmQltzaTDFVNKQKoSShPNgCLbeYPsyBlM5dOH_VEU3JKirbKMiVmgjhYaa-RNPCC1Bar33S-_GU6NwtPVYoTGPqlyC7AWb4r3H9c1FtS89EQrFxsSkN03N7NlEnByG-nENiBtx-MMZPrH5Khgh9TPt_OE7Jn4lBz-0Qw8I0N_yDoAPRF9B7qJ022pn6ZKf9GuSbO-qphOSmHWhH7GFBtc5xDQ6BhS1sWKjvLO7-ScTPu9ycOAFfMQmAa3S5mbkS0uItc4bT3zuGs0FzJ0NWBsJCKnJRTwPeNFllKA5DLEIpEnlQXRta0ccUEq8SI2l3hTW8HeAC7ZLSFtGXohj4D4zcCduafbbo1YpVECXYiF48yKeQBJA1oy-MeSNXK3XrTMtTJ2f14vrR0UjpMEm22-2v36mhxYeBMh68Wrk0q6-jE3wA_SsJH9BA1S9bsvz2N4dnqj17df-H6-FQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT8JAEN0gHtSD8TOiqHvQmw1td_vBwRgUkQpyESK3ut0uiZEUpDXGP-VvdKalIInhxrkfh-nrmze7s28IueAuR1NvQ1OBJTVuG0ITgkGpEnAVDkAiW1mDbMdu9vhj3-oXyE9-FgbbKnNOTIk6HElcI6_gBqnF0L3vZvyh4dQo3F3NR2hksGip7y8o2eJrrw7f99I0G_fdu6Y2nSqgSQBvojmpZDFY6Ci7Kgeu4ShpMB44EjJVyEJbZwJUk3JDUwjIhzzApRaXCxM4qipsBu9dI-ucMYYthG7jYbamgx6bLtMzcyPGqnplPssmBlKxUL4sJsBF_k-TWmOHbE_VKK1l8NklBRXtka0_HoX7xKt52i2kupC-gLzFabq0liRCvtO6StI-roh2cyPYmL5FFBtqh0Cg9BlK5NGEdrJO8_iA9FYSqUNSjEaROsKT4QKwAHnQ0hm3eOAGRghCcwD0Ybiy6pSImQfFl1NzcpyRMfShSMFI-v9EskSuZg-NM2-O5beX82j70x819uewOl5--ZxsNLtPbb_tdVonZNPEUxBpH2CZFJPJpzoFbZIEZykgKHldNQJ_Aa_Y9oM
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8JAEN4gJkYPxmdEUfegNxtod_vgYAyKSMUQEyF6q9vtNjGSgrTG-Nf8dc70AZIYbpzb7mH67cw3uzPfEHLGHY6i3rqmfFNq3NKFJgSDVMXnKgiBIptZgWzP6gz4_Yv5UiI_RS8MllUWPjF11MFI4hl5DS9ITYbqfbUwL4t4bLWvxh8aTpDCm9ZinEYGka76_oL0Lb50W_Cvzw2jfdu_6Wj5hAFNApATzU7pi84CW1kNGTq6raTOuG9LiFoBC6w6E8CglBMYQkBs5D4euzhcGOCvGsJisO4KWbUZ7BPsUm_fTc93UG_TYfVM6IixRr02m2sTg4MxkcrMB8P5WJAGuPYW2cyZKW1mUNomJRXtkI0_eoW7xG262jWEvYA-A9XFybq0mSRCvtOWStKaroj2C1HYmL5FFItrh-BM6ROky6MJ7WVV5_EeGSzFUvukHI0idYBd4gJwATHRrDNuct_x9QBIZwiuRHdkw64QozCKJ3OhcpyXMfQgYUFLev9YskIuph-NM52Oxa9XC2t7-aaNvRnEDhc_PiVrgD3vwe11j8i6gQ0RaUlglZSTyac6BpqS-CcpHih5XTYAfwHRvvq2
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=AI-Based+Wormhole+Attack+Detection+Techniques+in+Wireless+Sensor+Networks&rft.jtitle=Electronics+%28Basel%29&rft.au=Hanif%2C+Maria&rft.au=Ashraf%2C+Humaira&rft.au=Jalil%2C+Zakia&rft.au=Noor+Zaman+Jhanjhi&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=2079-9292&rft.volume=11&rft.issue=15&rft.spage=2324&rft_id=info:doi/10.3390%2Felectronics11152324&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-9292&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-9292&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-9292&client=summon