Research Article

Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network

Table 1

Summary of different techniques to detect wormholes.

Defense Basic methodProsCons

Wu et al. [1]Local neighbourhood informationLightweightLess efficient in sparse networks
Hu et al. [2]LeashesAuthentication protocol using symmetric cryptographyCommunication and processing overhead
Hu and Evans [3]Cooperative protocol using directional antennasUses one hop neighbour informationDetects partial wormholes and degrades network connectivity
Vu et al. [4]RTT calculation and encrypted message exchangeHigh detection rateHigh False positives and computation overhead
Alam and Chan [5]RTT calculation and topology comparisonTopology comparison reduces false positivesCommunication overhead
Ban et al. [6]Bipartite subgraph theoryRobust in different communication modelsHigh false positives
Lu et al. [7]Connectivity-based approachLess false positivesShort path wormholes remain undetected
Maheshwari et al. [8]Graph connectivityEfficient in UDG modelInaccurate in non-UDG models
Wang and Lu [9]Interactive visualization of wormholes (IVoW)Improves detection efficiencyRequires domain knowledge and expertise to solve visual analysis problems
Čapkun et al. [10]Distance-bounding algorithmNo additional clock synchronisationSpecial hardware needed for time measurement
Chiu and Lui [11]Hop count and delay calculationHigh detection rateMemory overhead
Tun and Maw [12]RTT and number of neighbours calculationNo hardware requiredMemory overhead
Khalil et al. [13]Local monitoring using guard nodesLightweight and suitable for resource constraint networksNot efficient in sparse networks
Khalil et al. [14]Isolate attackers by secure central authority (CA)Isolate attackers with increased scalability; low detection latencyIncreased message exchange between CA and mobile nodes
Choi et al. [15]Neighbour node monitoringTimer prevents wormhole attacks without requiring clock synchronizationDoes not support DSR optimization
Poovendran and Lazos [16]Location-based and decentralizedTime synchronization not requiredPacket transmission overhead
Zhao et al. [17]Statistical analysis of routing detect wormholesLightweightDetection rate declines in presence of multiple wormholes
Lu et al. [18]Real time secure packet marking algorithmDetects both active and passive attacksWormholes remain undetected in less traffic scenario
Wang and Bhargava [19]MDS-visualization of wormholesEfficient in case of single wormhole; less false positivesCentralized approach
Dong et al. [20]Distributed approach using network connectivity informationSuitable for contiguous and discrete geometric terrainIncreased node density affects detection performance
Chen et al. [21]DV-hop localizationRange-free localizationIntolerant to packet loss
Chen et al. [22]Mobile beacon and positioning schemeEnergy efficient and high detection probabilityRequire GPS enabled beacon node to detect wormholes