AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole att...
Saved in:
Published in | Electronics (Basel) Vol. 11; no. 15; p. 2324 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.08.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 2079-9292 2079-9292 |
DOI | 10.3390/electronics11152324 |
Cover
Abstract | The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the subject of the detection and mitigation of wormhole attacks in wireless sensor networks. The existing surveys are also explored to find gaps in the literature. Several existing schemes based on different methods are also evaluated critically in terms of throughput, detection rate, low energy consumption, packet delivery ratio, and end-to-end delay. As artificial intelligence and machine learning have massive potential for the efficient management of sensor networks, this paper provides AI- and ML-based schemes as optimal solutions for the identified state-of-the-art problems in wormhole attack detection. As per the author’s knowledge, this is the first in-depth review of AI- and ML-based techniques in wireless sensor networks for wormhole attack detection. Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks. |
---|---|
AbstractList | The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats. These sensor nodes make a wireless network vulnerable to denial-of-service attacks. One of them is a wormhole attack that uses a low latency link between two malicious sensor nodes and affects the routing paths of the entire network. This attack is brutal as it is resistant to many cryptographic schemes and hard to observe within the network. This paper provides a comprehensive review of the literature on the subject of the detection and mitigation of wormhole attacks in wireless sensor networks. The existing surveys are also explored to find gaps in the literature. Several existing schemes based on different methods are also evaluated critically in terms of throughput, detection rate, low energy consumption, packet delivery ratio, and end-to-end delay. As artificial intelligence and machine learning have massive potential for the efficient management of sensor networks, this paper provides AI- and ML-based schemes as optimal solutions for the identified state-of-the-art problems in wormhole attack detection. As per the author’s knowledge, this is the first in-depth review of AI- and ML-based techniques in wireless sensor networks for wormhole attack detection. Finally, our paper explored the open research challenges for detecting and mitigating wormhole attacks in wireless networks. |
Author | Ashraf, Humaira Humayun, Mamoona Almuhaideb, Abdullah M. Saeed, Saqib Jhanjhi, Noor Zaman Jalil, Zakia Hanif, Maria |
Author_xml | – sequence: 1 givenname: Maria surname: Hanif fullname: Hanif, Maria – sequence: 2 givenname: Humaira orcidid: 0000-0001-5067-3172 surname: Ashraf fullname: Ashraf, Humaira – sequence: 3 givenname: Zakia surname: Jalil fullname: Jalil, Zakia – sequence: 4 givenname: Noor Zaman orcidid: 0000-0001-8116-4733 surname: Jhanjhi fullname: Jhanjhi, Noor Zaman – sequence: 5 givenname: Mamoona orcidid: 0000-0001-6339-2257 surname: Humayun fullname: Humayun, Mamoona – sequence: 6 givenname: Saqib orcidid: 0000-0001-7136-3480 surname: Saeed fullname: Saeed, Saqib – sequence: 7 givenname: Abdullah M. orcidid: 0000-0002-2004-5324 surname: Almuhaideb fullname: Almuhaideb, Abdullah M. |
BookMark | eNp9kE9PAjEQxRuDiYh8Ai9NPK-2nd3t9oj4j4ToQQzHTekOobC02JYYv71L8GCMcS4zh_d7b_LOSc95h4RccnYNoNgNtmhS8M6ayDkvBIj8hPQFkypTQonej_uMDGNcs24UhwpYn0xGk-xWR2zo3IftyrdIRylps6F3mDpf6x2doVk5-77HSK2jcxu6xBjpK7roA33G9OHDJl6Q06VuIw6_94C8PdzPxk_Z9OVxMh5NMwNCpExyBaLk0EgslVlWXKLhkC-kKXneQFMy0EoprBqhNS94viilKqtcC9RG6RIG5Orouwv-8FOq134fXBdZC8lYAYUE6FRwVJngYwy4rHfBbnX4rDmrD7XVf9TWUeoXZWzShxJS0Lb9l_0CdUV33Q |
CitedBy_id | crossref_primary_10_1007_s11277_024_10999_3 crossref_primary_10_1109_ACCESS_2024_3372187 crossref_primary_10_1002_cpe_8067 crossref_primary_10_4018_IJSWIS_345934 crossref_primary_10_3390_app14125220 crossref_primary_10_1145_3706583 crossref_primary_10_1016_j_future_2023_01_017 crossref_primary_10_1109_ACCESS_2024_3365634 crossref_primary_10_1186_s13677_024_00609_9 crossref_primary_10_1007_s11277_024_10913_x crossref_primary_10_1016_j_vehcom_2024_100826 crossref_primary_10_1109_ACCESS_2024_3476388 crossref_primary_10_1007_s11277_024_11566_6 crossref_primary_10_3390_electronics12051095 |
Cites_doi | 10.1007/978-981-13-0344-9_39 10.1016/j.jesit.2017.02.002 10.1007/978-981-15-5258-8_29 10.1109/ACCESS.2019.2894637 10.1049/iet-wss.2017.0075 10.1109/ICCSDET.2018.8821160 10.1016/j.comnet.2019.01.008 10.1007/s11277-021-08327-0 10.1109/I2CT.2018.8529426 10.1016/j.inffus.2020.07.005 10.3390/asi3010014 10.1007/s11277-019-06160-0 10.1007/s11277-020-07365-4 10.1109/SEGE.2018.8499473 10.1002/cpe.5017 10.1109/TIFS.2016.2570740 10.1016/j.promfg.2019.02.292 10.1007/s11276-018-1734-z 10.1007/978-981-10-7901-6_92 10.1108/IJPCC-10-2020-0162 10.1109/ICISC.2018.8398917 10.3390/fi9040077 10.1007/s11277-021-09395-y 10.1007/s11277-021-08647-1 10.1007/s00500-022-06915-1 10.1007/s11277-021-08277-7 10.1109/ICPEDC47771.2019.9036536 10.1016/j.asoc.2021.107099 10.1016/j.comnet.2020.107376 10.1109/ICACCAF.2017.8344730 10.1007/s13201-020-01276-2 10.1016/j.future.2017.10.026 10.11591/csit.v2i1.p33-42 10.1109/ACCESS.2019.2924283 10.1109/ICCWorkshops50388.2021.9473770 10.1109/FIOT.2018.8325596 10.3390/s20082311 10.1109/ICoDT252288.2021.9441515 10.1016/j.jnca.2021.103118 10.1016/j.micpro.2020.103278 10.1109/TNSE.2018.2881152 10.1080/13614576.2016.1247741 10.21817/ijet/2017/v9i3/1709030342 10.1016/j.cose.2018.02.004 10.1109/ISCISC.2018.8546943 10.1109/ICIRCA.2018.8597366 10.3390/s19092144 10.1109/ACCESS.2020.2983438 10.1109/ACCESS.2020.2983091 10.1109/ICE348803.2020.9122944 10.1109/ICEECCOT43722.2018.9001597 10.1109/ICICV50876.2021.9388540 10.1016/j.compeleceng.2017.12.022 10.35833/MPCE.2020.000159 10.1007/s10586-018-1825-8 |
ContentType | Journal Article |
Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7SP 8FD 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L7M P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
DOI | 10.3390/electronics11152324 |
DatabaseName | CrossRef Electronics & Communications Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central SciTech Premium Collection Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database (Proquest) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Technology Collection Technology Research Database ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic Advanced Technologies Database with Aerospace ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2079-9292 |
ExternalDocumentID | 10_3390_electronics11152324 |
GroupedDBID | 5VS 8FE 8FG AAYXX ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BGLVJ CCPQU CITATION HCIFZ IAO ITC KQ8 MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC 7SP 8FD ABUWG AZQEC DWQXO L7M PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c322t-71932613d7e69cf817ec134b7c614d3d603a999e8d2aa1514b679684a2eac9a63 |
IEDL.DBID | 8FG |
ISSN | 2079-9292 |
IngestDate | Fri Jul 25 03:10:32 EDT 2025 Thu Apr 24 23:02:33 EDT 2025 Tue Jul 01 01:47:31 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 15 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c322t-71932613d7e69cf817ec134b7c614d3d603a999e8d2aa1514b679684a2eac9a63 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-7136-3480 0000-0001-5067-3172 0000-0001-8116-4733 0000-0001-6339-2257 0000-0002-2004-5324 |
OpenAccessLink | https://www.proquest.com/docview/2700535733?pq-origsite=%requestingapplication% |
PQID | 2700535733 |
PQPubID | 2032404 |
ParticipantIDs | proquest_journals_2700535733 crossref_primary_10_3390_electronics11152324 crossref_citationtrail_10_3390_electronics11152324 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-08-01 |
PublicationDateYYYYMMDD | 2022-08-01 |
PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Electronics (Basel) |
PublicationYear | 2022 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Ahutu (ref_12) 2020; 8 Chezhiyan (ref_70) 2013; 1 Yap (ref_74) 2020; 8 ref_14 Abdan (ref_31) 2021; 2021 Govindasamy (ref_47) 2018; 5 Memon (ref_25) 2021; 4 ref_56 ref_55 Li (ref_62) 2018; 8 ref_53 ref_18 ref_17 ref_16 ref_15 Sonavane (ref_54) 2019; 32 Shahraki (ref_5) 2020; 180 Gulganwa (ref_33) 2022; 14 Purkar (ref_75) 2017; 9 Kaur (ref_63) 2021; 119 Farjamnia (ref_19) 2019; 105 Luo (ref_37) 2019; 7 ref_61 Numan (ref_6) 2020; 8 ref_68 Roy (ref_50) 2020; 12 ref_22 ref_21 Kori (ref_52) 2019; 11 Patel (ref_42) 2019; Volume 760 Jamali (ref_26) 2016; 21 ref_29 Elsayed (ref_2) 2018; 70 ref_28 Bai (ref_41) 2019; 150 Murugaboopathi (ref_13) 2020; 32 ref_27 Kambalimath (ref_72) 2020; 10 ref_71 Scholar (ref_59) 2020; 6 Tiruvakadu (ref_46) 2018; 76 Scholar (ref_58) 2019; 5 ref_36 Karthigadevi (ref_51) 2018; 7 ref_35 Zardari (ref_48) 2021; 8 ref_32 Athmani (ref_65) 2019; 92 ref_30 Liu (ref_24) 2016; 11 Chatla (ref_60) 2021; 12 ref_39 Bhosale (ref_64) 2021; 124 Ali (ref_34) 2022; 14 ref_38 Jagadeesan (ref_69) 2019; 22 Sah (ref_3) 2020; 63 Vo (ref_40) 2019; 25 Premkumar (ref_9) 2020; 79 Liu (ref_10) 2018; 7 Ghugar (ref_20) 2020; 2 Aliady (ref_43) 2019; 7 Tamilarasi (ref_57) 2020; 114 Gupta (ref_73) 2021; 102 ref_45 ref_44 Shukla (ref_67) 2021; 121 Ahlawat (ref_66) 2021; 33 ref_1 Yousefpoor (ref_11) 2021; 190 Padmapriya (ref_23) 2018; 5 ref_49 ref_8 ref_4 ref_7 |
References_xml | – volume: Volume 760 start-page: 463 year: 2019 ident: ref_42 article-title: Detection of Wormhole Attack in Static Wireless Sensor Networks publication-title: Advances in Computer Communication and Computational Sciences doi: 10.1007/978-981-13-0344-9_39 – volume: 5 start-page: 735 year: 2018 ident: ref_47 article-title: A comparative study of reactive, proactive, and hybrid routing protocol in wireless sensor networks under wormhole attack publication-title: J. Electr. Syst. Inf. Technol. doi: 10.1016/j.jesit.2017.02.002 – ident: ref_28 doi: 10.1007/978-981-15-5258-8_29 – volume: 7 start-page: 18194 year: 2019 ident: ref_37 article-title: CREDND: A novel secure neighbor discovery algorithm for wormhole attack publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2894637 – volume: 8 start-page: 68 year: 2018 ident: ref_62 article-title: Security DV-hop localization algorithm against wormhole attack in wireless sensor network publication-title: IET Wirel. Sens. Syst. doi: 10.1049/iet-wss.2017.0075 – volume: 33 start-page: 268 year: 2021 ident: ref_66 article-title: An attack resistant key predistribution scheme for wireless sensor networks publication-title: J. King Saud Univ. Comput. Inf. Sci. – ident: ref_18 doi: 10.1109/ICCSDET.2018.8821160 – volume: 150 start-page: 190 year: 2019 ident: ref_41 article-title: Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures publication-title: Comput. Netw. doi: 10.1016/j.comnet.2019.01.008 – volume: 14 start-page: 159 year: 2022 ident: ref_34 article-title: Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme publication-title: J. Inf. Technol. Manag. – volume: 119 start-page: 1 year: 2021 ident: ref_63 article-title: Performance Evaluation of the Proposed Wormhole Detection Scheme with Existing Schemes publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-021-08327-0 – ident: ref_38 doi: 10.1109/I2CT.2018.8529426 – volume: 63 start-page: 223 year: 2020 ident: ref_3 article-title: Renewable energy harvesting schemes in wireless sensor networks: A survey publication-title: Inf. Fusion doi: 10.1016/j.inffus.2020.07.005 – ident: ref_7 doi: 10.3390/asi3010014 – volume: 11 start-page: 20 year: 2019 ident: ref_52 article-title: Distributed Wormhole Attack Mitigation Technique in WSNs publication-title: Int. J. Comput. Netw. Inf. Secure – volume: 105 start-page: 1561 year: 2019 ident: ref_19 article-title: Review of the techniques against the wormhole attacks on wireless sensor networks publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-019-06160-0 – volume: 114 start-page: 329 year: 2020 ident: ref_57 article-title: Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-020-07365-4 – volume: 4 start-page: 100225 year: 2021 ident: ref_25 article-title: A survey on 802.11 MAC protocols industrial standards, architecture elements for providing QoS guarantee, supporting emergency traffic, and security: Future directions publication-title: J. Ind. Inf. Integr. – ident: ref_45 doi: 10.1109/SEGE.2018.8499473 – volume: 32 start-page: e5017 year: 2020 ident: ref_13 article-title: Modified secure AODV protocol to prevent wormhole attacks in MANET publication-title: Concurr. Comput. Pract. Exp. doi: 10.1002/cpe.5017 – volume: 11 start-page: 2013 year: 2016 ident: ref_24 article-title: ActiveTrust: Secure and trustable routing in wireless sensor networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2016.2570740 – volume: 32 start-page: 840 year: 2019 ident: ref_54 article-title: A real-time intrusion detection system for wormhole attack in the RPL-based Internet of Things publication-title: Procedia Manuf. doi: 10.1016/j.promfg.2019.02.292 – volume: 25 start-page: 4115 year: 2019 ident: ref_40 article-title: MLAMAN: A novel multi-level authentication model and protocol for preventing wormhole attacks in mobile ad hoc networks publication-title: Wirel. Netw. doi: 10.1007/s11276-018-1734-z – ident: ref_22 doi: 10.1007/978-981-10-7901-6_92 – ident: ref_29 doi: 10.1108/IJPCC-10-2020-0162 – volume: 14 start-page: 135 year: 2022 ident: ref_33 article-title: EES-WCA: Energy-efficient and secure weighted clustering for WSN using machine learning approach publication-title: Int. J. Inf. Technol. – ident: ref_55 doi: 10.1109/ICISC.2018.8398917 – ident: ref_27 – ident: ref_8 doi: 10.3390/fi9040077 – volume: 124 start-page: 1081 year: 2021 ident: ref_64 article-title: Wormhole Attack Detection System for IoT Network: A Hybrid Approach publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-021-09395-y – volume: 121 start-page: 1 year: 2021 ident: ref_67 article-title: Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-021-08647-1 – volume: 8 start-page: e2 year: 2021 ident: ref_48 article-title: A lightweight technique for detection and prevention of wormhole attacks in MANET publication-title: EAI Endorsed Trans. Scalable Inf. Syst. – ident: ref_32 doi: 10.1007/s00500-022-06915-1 – volume: 2021 start-page: 2375702 year: 2021 ident: ref_31 article-title: Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad-Hoc Network (MANET) publication-title: Wirel. Commun. Mob. Comput. – ident: ref_35 doi: 10.1007/s11277-021-08277-7 – ident: ref_53 doi: 10.1109/ICPEDC47771.2019.9036536 – volume: 102 start-page: 107099 year: 2021 ident: ref_73 article-title: On robust asymmetric Lagrangian ν-twin support vector regression using pinball loss function publication-title: Appl. Soft. Comput. doi: 10.1016/j.asoc.2021.107099 – volume: 180 start-page: 107376 year: 2020 ident: ref_5 article-title: Clustering objectives in wireless sensor networks: A survey and research direction analysis publication-title: Comput. Netw. doi: 10.1016/j.comnet.2020.107376 – ident: ref_17 – ident: ref_61 doi: 10.1109/ICACCAF.2017.8344730 – volume: 10 start-page: 1 year: 2020 ident: ref_72 article-title: A basic review of fuzzy logic applications in hydrology and water resources publication-title: Appl. Water Sci. doi: 10.1007/s13201-020-01276-2 – volume: 92 start-page: 789 year: 2019 ident: ref_65 article-title: EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2017.10.026 – volume: 2 start-page: 33 year: 2020 ident: ref_20 article-title: Survey of wormhole attack in wireless sensor networks publication-title: Comput. Sci. Inf. Technol. doi: 10.11591/csit.v2i1.p33-42 – volume: 7 start-page: 84132 year: 2019 ident: ref_43 article-title: Energy preserving secure measure against wormhole attack in wireless sensor networks publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2924283 – ident: ref_14 doi: 10.1109/ICCWorkshops50388.2021.9473770 – ident: ref_56 doi: 10.1109/FIOT.2018.8325596 – ident: ref_1 doi: 10.3390/s20082311 – ident: ref_15 doi: 10.1109/ICoDT252288.2021.9441515 – ident: ref_30 – volume: 1 start-page: 60562730 year: 2013 ident: ref_70 article-title: Measurement-based analysis of reactive protocols in manet publication-title: Int. J. Wired Wirel. Commun. – volume: 5 start-page: 1937 year: 2019 ident: ref_58 article-title: Predication and Root Selection of Worm Hole Attack in WSN publication-title: Int. J. Sci. Res. Eng. Trends – volume: 190 start-page: 103118 year: 2021 ident: ref_11 article-title: Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2021.103118 – volume: 79 start-page: 103278 year: 2020 ident: ref_9 article-title: DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks publication-title: Microprocess. Microsyst. doi: 10.1016/j.micpro.2020.103278 – volume: 7 start-page: 356 year: 2018 ident: ref_10 article-title: Design and analysis of probing route to defense sinkhole attacks for Internet of Things security publication-title: IEEE Trans. Netw. Sci. Eng. doi: 10.1109/TNSE.2018.2881152 – volume: 21 start-page: 79 year: 2016 ident: ref_26 article-title: Defending against Wormhole Attack in MANET Using an Artificial Immune System publication-title: New Rev. Inf. Netw. doi: 10.1080/13614576.2016.1247741 – volume: 9 start-page: 2514 year: 2017 ident: ref_75 article-title: A review on energy-efficient clustering protocols of heterogeneous wireless sensor network publication-title: Int. J. Eng. Technol. doi: 10.21817/ijet/2017/v9i3/1709030342 – volume: 76 start-page: 32 year: 2018 ident: ref_46 article-title: Confirmation of wormhole attack in MANETs using honeypot publication-title: Comput. Secur. doi: 10.1016/j.cose.2018.02.004 – ident: ref_44 – ident: ref_39 doi: 10.1109/ISCISC.2018.8546943 – ident: ref_21 – ident: ref_68 doi: 10.1109/ICIRCA.2018.8597366 – volume: 12 start-page: 1 year: 2020 ident: ref_50 article-title: RTT-based wormhole detection for wireless mesh networks publication-title: Int. J. Inf. Technol. – ident: ref_71 doi: 10.3390/s19092144 – volume: 8 start-page: 63270 year: 2020 ident: ref_12 article-title: Centralized routing protocol for detecting wormhole attacks in wireless sensor networks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2983438 – volume: 12 start-page: 2763 year: 2021 ident: ref_60 article-title: Trust-Based Secure Network For Detection Of Attacks (Wormhole And Black Hole) Due To Malicious Nodes In Ad Hoc Wireless Sensor Network publication-title: Turk. J. Comput. Math. Educ. TURCOMAT – volume: 8 start-page: 65450 year: 2020 ident: ref_6 article-title: A systematic review on clone node detection in static wireless sensor networks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2983091 – ident: ref_16 doi: 10.1109/ICE348803.2020.9122944 – ident: ref_49 doi: 10.1109/ICEECCOT43722.2018.9001597 – volume: 7 start-page: 215 year: 2018 ident: ref_51 article-title: Wormhole attack detection and prevention using EIGRP protocol based on round trip time publication-title: J. Cyber Secure. Mobil. – volume: 6 start-page: 212 year: 2020 ident: ref_59 article-title: Collaborative Decision for Wormhole Attack Prevention in WSN publication-title: Int. J. Sci. Res. Eng. Trends – ident: ref_4 doi: 10.1109/ICICV50876.2021.9388540 – ident: ref_36 – volume: 70 start-page: 799 year: 2018 ident: ref_2 article-title: Self-maintenance model for wireless sensor networks publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2017.12.022 – volume: 8 start-page: 1043 year: 2020 ident: ref_74 article-title: Artificial Intelligence Based MPPT Techniques for Solar Power System: A review publication-title: J. Mod. Power Syst. Clean Energy doi: 10.35833/MPCE.2020.000159 – volume: 5 start-page: 2120 year: 2018 ident: ref_23 article-title: A Survey: Techniques and Challenges to Detect Wormhole Attack in Wireless Sensor Network publication-title: J. Appl. Sci. Comput. – volume: 22 start-page: 299 year: 2019 ident: ref_69 article-title: Design and implement a cross-layer verification framework (CLVF) for detecting and preventing black hole and wormhole attack in wireless ad-hoc networks for cloud environment publication-title: Clust. Comput. doi: 10.1007/s10586-018-1825-8 |
SSID | ssj0000913830 |
Score | 2.473579 |
SecondaryResourceType | review_article |
Snippet | The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 2324 |
SubjectTerms | Artificial intelligence Cloning Communications systems Cryptography Denial of service attacks Energy consumption Literature reviews Machine learning Network latency Nodes Sensors Systematic review Wireless communications Wireless networks Wireless sensor networks Wormholes |
Title | AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks |
URI | https://www.proquest.com/docview/2700535733 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8JAEN4oXPRgfEYUyR48uoHtbh-cTBEQjBIjEL012-2SGElBWv-_M32AJIZTD-1eZjvzfTM7-w0ht9KTKOrNmQltzaTDFVNKQKoSShPNgCLbeYPsyBlM5dOH_VEU3JKirbKMiVmgjhYaa-RNPCC1Bar33S-_GU6NwtPVYoTGPqlyC7AWb4r3H9c1FtS89EQrFxsSkN03N7NlEnByG-nENiBtx-MMZPrH5Khgh9TPt_OE7Jn4lBz-0Qw8I0N_yDoAPRF9B7qJ022pn6ZKf9GuSbO-qphOSmHWhH7GFBtc5xDQ6BhS1sWKjvLO7-ScTPu9ycOAFfMQmAa3S5mbkS0uItc4bT3zuGs0FzJ0NWBsJCKnJRTwPeNFllKA5DLEIpEnlQXRta0ccUEq8SI2l3hTW8HeAC7ZLSFtGXohj4D4zcCduafbbo1YpVECXYiF48yKeQBJA1oy-MeSNXK3XrTMtTJ2f14vrR0UjpMEm22-2v36mhxYeBMh68Wrk0q6-jE3wA_SsJH9BA1S9bsvz2N4dnqj17df-H6-FQ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NT8JAEN0gHtSD8TOiqHvQmw1td_vBwRgUkQpyESK3ut0uiZEUpDXGP-VvdKalIInhxrkfh-nrmze7s28IueAuR1NvQ1OBJTVuG0ITgkGpEnAVDkAiW1mDbMdu9vhj3-oXyE9-FgbbKnNOTIk6HElcI6_gBqnF0L3vZvyh4dQo3F3NR2hksGip7y8o2eJrrw7f99I0G_fdu6Y2nSqgSQBvojmpZDFY6Ci7Kgeu4ShpMB44EjJVyEJbZwJUk3JDUwjIhzzApRaXCxM4qipsBu9dI-ucMYYthG7jYbamgx6bLtMzcyPGqnplPssmBlKxUL4sJsBF_k-TWmOHbE_VKK1l8NklBRXtka0_HoX7xKt52i2kupC-gLzFabq0liRCvtO6StI-roh2cyPYmL5FFBtqh0Cg9BlK5NGEdrJO8_iA9FYSqUNSjEaROsKT4QKwAHnQ0hm3eOAGRghCcwD0Ybiy6pSImQfFl1NzcpyRMfShSMFI-v9EskSuZg-NM2-O5beX82j70x819uewOl5--ZxsNLtPbb_tdVonZNPEUxBpH2CZFJPJpzoFbZIEZykgKHldNQJ_Aa_Y9oM |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT8JAEN4gJkYPxmdEUfegNxtod_vgYAyKSMUQEyF6q9vtNjGSgrTG-Nf8dc70AZIYbpzb7mH67cw3uzPfEHLGHY6i3rqmfFNq3NKFJgSDVMXnKgiBIptZgWzP6gz4_Yv5UiI_RS8MllUWPjF11MFI4hl5DS9ITYbqfbUwL4t4bLWvxh8aTpDCm9ZinEYGka76_oL0Lb50W_Cvzw2jfdu_6Wj5hAFNApATzU7pi84CW1kNGTq6raTOuG9LiFoBC6w6E8CglBMYQkBs5D4euzhcGOCvGsJisO4KWbUZ7BPsUm_fTc93UG_TYfVM6IixRr02m2sTg4MxkcrMB8P5WJAGuPYW2cyZKW1mUNomJRXtkI0_eoW7xG262jWEvYA-A9XFybq0mSRCvtOWStKaroj2C1HYmL5FFItrh-BM6ROky6MJ7WVV5_EeGSzFUvukHI0idYBd4gJwATHRrDNuct_x9QBIZwiuRHdkw64QozCKJ3OhcpyXMfQgYUFLev9YskIuph-NM52Oxa9XC2t7-aaNvRnEDhc_PiVrgD3vwe11j8i6gQ0RaUlglZSTyac6BpqS-CcpHih5XTYAfwHRvvq2 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=AI-Based+Wormhole+Attack+Detection+Techniques+in+Wireless+Sensor+Networks&rft.jtitle=Electronics+%28Basel%29&rft.au=Hanif%2C+Maria&rft.au=Ashraf%2C+Humaira&rft.au=Jalil%2C+Zakia&rft.au=Noor+Zaman+Jhanjhi&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=2079-9292&rft.volume=11&rft.issue=15&rft.spage=2324&rft_id=info:doi/10.3390%2Felectronics11152324&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-9292&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-9292&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-9292&client=summon |