Open Access Open Access  Restricted Access Subscription or Fee Access

Wormhole Detection Methods- A Survey

J. M. Lifna Prema, J. Immanuel John Raja, S. Sowmya


The dynamic and cooperative nature of ad hoc networks presents considerable challenges in securing and detecting attacks in these networks. A security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack, a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point. Wormhole nodes can grab the route from the source node to the destination node, then it drop, or sniff the packets. A wormhole attack poses various threats and it is difficult to prevent. Many techniques have been evolved to detect wormhole attack. This paper presents a survey of various techniques used to detect wormhole attacks. Based on the metrics like packet loss rate, Throughput and Detection rate a comparative study is also done.


Mobile Ad hoc Network; Wormhole Attack

Full Text:



Ming-Yang Su, “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,”Adhoc Networks ,2010

Hon Sun Chiu, King-Shan Lui, “DelPHI: Wormhole detection echanism for ad hoc wireless networks,” In the proceedings of the 1st international symposium on wireless pervasive computing, 2006.

Xu Su and Rajendra V. Boppana, “On mitigating in-band wormhole attacks in mobile ad hoc networks,” In the proceedings of the IEEE international conference on communications,pp. 1136–41,2007.

Ning Song, Lijun Qian, and Xiangfang Li, “Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach,” In the proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05), 2005.

Gunhee Lee, Dong-kyoo Kim, Jungtaek Seo, “An approach to mitigate wormhole attack in wireless ad hoc networks,” In the proceedings of the international conference on information security and assurance, pp. 220–5, 2008.

Marianne A. Azer, Sherif M. El-Kassas, Abdel Wahab F, Magdy S. El-Soundani, “Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme,” In the proceedings of the IEEE international conference on availability, reliability and security , pp. 636–41,2008.

Xia Wang and Johnny Wong, “An end-to-end detection of wormhole attack in wireless ad-hoc networks”. In the proceedings of the 31st annual international computer software and applications conference (COMPSAC); 2007.

Issa Khalil, Saurabh Bagchi, Ness B. Shroff, “LITEWORP: a Lightweight countermeasure for the wormhole attack in multihop wireless networks”. In the proceedings of the 2005 Iternational conference on dependable systems and networks (DSN’05); 2005.

Issa Khalil, Saurabh Bagchi, and Ness B. Shroff. “MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks, ” In the IEEE securecomm and workshops, pp. 1–12, 2006.

Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, Elizabeth Belding-Royer. “A Secure routing protocol for ad hoc networks.”In the proceedings of the 10th IEEE international conference on network protocols (ICNP); November 2002.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.