Research Article
WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks
Table 7
Security comparison of various existing techniques.
| Technique | Mechanism used | Special hardware | Hidden mode | Participation mode |
| WRHT (proposed) | Probability of wormhole presence | No | Yes | Yes | WAP [36] | Neighborhood information | No | Yes | No | SPROUT [37] | Multipath routing | No | Yes | Yes | Wang et al. [35] | Neighborhood information | No | Yes | No | WRSR [38] | Connectivity information | No | Yes | Yes | Packet leashes [8] | GPS & clock | Yes | Yes | No | WARP [39] | Multiple link-disjoint paths | No | Yes | Yes | De Worm [34] | Neighborhood information | No | Yes | No | ODSBR [40] | Binary search | No | Yes | Yes |
|
|