Security in Wireless Sensor Networks Using OMNET++: Literature Review
Abstract
:1. Introduction
- An analysis of the strengths and weaknesses of OMNET++ when applied to wireless sensor networks, emphasizing its role in enhancing network security and the hurdles encountered.
- A review of the current literature related to OMNET++ simulations using wireless sensor nodes, aiming to shed light on how OMNET++ has been employed across different wireless network environments.
- A demonstration of various case studies, highlighting OMNET++’s advantages, while also examining the frameworks and architectures integrated within OMNET++ simulations.
2. Literature Review
2.1. Foregoing Work
2.2. Intrusion Detection System (IDS)
2.3. Advanced Routing Protocols
- AODV: The AODV (Ad hoc On-Demand Distance Vector) protocol is used in the INET-MANET framework. It has been recognized as a foundational component in the evolution of routing strategies for MANETs. AODV has influenced modern routing developments and is frequently referenced in contemporary research, either for optimizing node configurations [23,24] or for enhancing path discovery mechanisms [25,26,27]. Designed specifically for low-bandwidth scenarios, AODV’s lightweight and adaptive nature makes it highly suitable for simulation and performance testing. As a reactive protocol, it establishes routes only when required, utilizing distance vector routing [28] to dynamically identify the most efficient path between a source and destination. Distance vector routing operates on RPL (Routing Protocol for LLNs) [29], determining both the distance and direction for network links employed in an LLN. Its ability to select the shortest route makes it ideal for networks with minimal traffic. However, under increased channel load, the protocol’s reliance on shortest path routing can lead to decreased performance, packet loss, and eventually network degradation, highlighting a trade-off between simplicity and scalability in congested environments.
- LEACH: Low-Energy Adaptive Clustering Hierarchy (LEACH) is a cluster-based approach [30], applied in the Castalia framework. The purpose is to use energy evenly, across the entire network. Logically, the network is split into segments, small areas called clusters, and each cluster has a header at its center. The header creates and manages a TDMA [31] (Time Division Multiple Access) schedule to avoid communication collisions between nodes in the region. The cluster head’s role is to collect data from surrounding nodes, aggregating it and forwarding the summarized information to the base station. The LEACH protocol has two main stages: (1) the setup phase and (2) steady phase. First, in the setup phase, each node within a defined sector shares its residual energy along with a randomly generated value with neighboring nodes. The node with the highest energy will become the cluster head. If multiple nodes exhibit equal energy levels, the random number is used to resolve the tie and finalize the CH selection. Once the CHs are determined, the steady-state phase begins. At this stage, data sensing and transmission take place. Regular nodes forward their collected data to their designated CH, which then processes and aggregates these data before transmitting to the base station. This hierarchical structure significantly reduces energy consumption and enhances communication efficiency within the network. In this stage, if the attacker is a general node, it is able to intentionally not comply with the TDMA schedule to cause a collision, such as not transmitting data or transmitting data at the same time as other nodes to interfere with the normal data collection of the header [32].
2.4. Energy Harvesting in WSNs
2.5. Challenges and Future Work Direction
3. OMNET++
3.1. Basic Concepts and Model of OMNET++
- NED files (.ned), which outline the module structure, including parameters and connections;
- C++ source files (.cc and .h) for simple modules;
- Initialization files (.ini) that set parameter values defined in the NED files.
3.2. OMNET++ Frameworks
- INET:The INET framework is the most feature-rich, enabling the simulation of both wired and wireless networks, covering protocols like TCP/IP, mobility, and routing. Simulation can be performed on both wired and wireless link-layer technologies (e.g., Ethernet and Wi-Fi). It includes network components like hosts, routers, and links. It is useful for general networking research and education. The INET framework is utilized for rapid and real-time analysis of various network scenarios. It enables the simulation of internet services while incorporating features such as malware detection. By implementing the INET framework, we can support simulation models that include both fixed and mobile network configurations.
- Veins:Veins is employed to study network and traffic scenarios, making it a valuable tool for research across various network-related applications. It is specifically designed for Vehicular Ad Hoc Networks (VANETs) and is commonly used to analyze the performance and behavior of roadside units in different scenarios. For vehicular networks, Veins works in tandem with SUMO to model vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, facilitating intelligent transportation system research. Additionally, Artery builds on Veins by incorporating ITS-G5 protocols for advanced cooperative intelligent transport systems (C-ITSs).
- SimuLTE:SimuLTE is designed to simulate the data plane of LTE/LTE-A networks, focusing on the Radio Access Network (RAN) and Evolved Packet Core, including eNodeBs, UEs, and the core network. It supports the simulation of LTE/LTE-A in Frequency Division Duplexing (FDD) mode. It includes realistic channel models and supports MAC operations as well as resource scheduling for both uplink and downlink. It supports QoS mechanisms and mobility scenarios and is commonly used in cellular network research [45].
- Castalia:A domain-specific framework like Castalia focuses on wireless sensor networks and wireless body area networks. It is utilized to assess platform characteristics specific to various applications. Castalia is tailored for low-power wireless networks and radio models, including IoT, healthcare, and environmental monitoring applications. This simulation framework allows the definition of path loss maps but does not guarantee connectivity between nodes.
- SUMO:The SUMO framework is utilized to assess the impact of infrastructure and policy changes on vehicular networks. As an open-source simulator, SUMO enables the modeling of traffic systems, including vehicles, public transport, and other modes of transportation. It supports tasks such as visualization, network import, emission analysis, and route optimization, making it a versatile tool for traffic system evaluation. SUMO is highly customizable, allowing users to design custom road networks or import real-world maps, and is often integrated with tools like Veins and OMNET++ for vehicular network research. It is widely used for traffic management, ITS studies, autonomous vehicle development, and sustainability analysis, offering realistic traffic models and scalability for small- to large-scale simulations.
4. Why OMNET++?
5. Security Attacks in Wireless Networks
5.1. DDoS Attack
5.2. Synchronize (SYN) Flood Attack
5.3. Sinkhole Attack
6. Conclusions
Funding
Acknowledgments
Conflicts of Interest
References
- Potnis, A.; Rajeshwari, C.S. Wireless sensor network: Challenges, issues and research. In Proceedings of the 2015 International Conference on Future Computational Technologies, Singapore, 29–30 March 2015; pp. 224–228. [Google Scholar] [CrossRef]
- Farooq, U. Wireless Sensor Network Challenges and Solutions; Virtual University of Pakistan: Islamabad, Pakistan, 2019; pp. 1–6. [Google Scholar]
- Li, B.; Li, X.; Nallanathan, A.; Zhao, C. Energy detection based spectrum sensing for cognitive radios over time-frequency doubly selective fading channels. IEEE Trans. Signal Process. 2014, 63, 402–417. [Google Scholar] [CrossRef]
- Ramisetty, S.; Ghantasala, G.S.P.; Gupta, G. Prevention of Security Attacks at Wireless Network Layers using Machine Learning Techniques. In Proceedings of the 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 28 February–1 March 2024. [Google Scholar]
- Kralevska, K.; Garau, M.; Førland, M.; Gligoroski, D. Towards 5g intrusion detection scenarios with omnet++. In Proceedings of the 6th International OM 66, Hamburg, Germany, 4–6 September 2019; pp. 44–51. [Google Scholar]
- Kaur, R.; Sangal, A.L.; Kumar, K. Modeling and Simulation of DDoS Attack using Omnet++. In Proceedings of the 2014 International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 20–21 February 2014. [Google Scholar]
- Mohammed, F.A.-B.; Mekky, N.E.; Soliman, H.; Hikal, N.A. Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System. IEEE Access 2024, 12, 86985–86996. [Google Scholar] [CrossRef]
- Sula, E. A review of network layer and transport layer attacks on wireless networks. Int. J. Mod. Eng. Res. 2018, 8, 23–27. [Google Scholar]
- Nasir, M.H.; Khan, S.A.; Khan, M.M.; Fatima, M. Swarm intelligence inspired intrusion detection systems—A systematic literature review. Comput. Netw. 2022, 205, 108708. [Google Scholar] [CrossRef]
- Remya, S.; Pillai, M.J.; Arjun, C.; Ramasubbareddy, S.; Cho, Y. Enhancing security in LLNs using a hybrid trust-based intrusion detection system for rpl. IEEE Access 2024, 12, 58836–58850. [Google Scholar] [CrossRef]
- Hasan, A.; Hashem, M.M.A. A Lightweight Cryptographic Framework Based on Hybrid Cellular Automata for IoT Applications. IEEE Access 2024, 12, 192672–192688. [Google Scholar] [CrossRef]
- Mitra, P.; Mukherjee, S. A review of trust based secure routing protocols in MANETs. In Proceedings of the International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, Canada, 15–17 October 2015; pp. 1–7. [Google Scholar] [CrossRef]
- Xia, Y.; Tang, X.; Yi, L.; Yi, Y.; Cheng, M.; Deng, X. Trust-Based Intrusion-Tolerant Coverage Reliability in Intelligent IoT Systems. IEEE Internet Things J. 2024, 11, 25637–25647. [Google Scholar] [CrossRef]
- Tulay, H.B.; Koksal, C.E. Sybil attack detection based on signal clustering in vehicular networks. IEEE Trans. Mach. Learn. Commun. Netw. 2024, 2, 753–765. [Google Scholar] [CrossRef]
- Jain, A.; Jain, V.; Tripathi, K. Trust based intrusion detection system architecture for WSN. Int. J. Recent Technol. Eng. 2020, 8, 700–703. [Google Scholar] [CrossRef]
- Sadia, H.; Farhan, S.; Haq, Y.U.; Sana, R.; Mahmood, T.; Bahaj, S.A.O. Intrusion detection system for wireless sensor networks: A machine learning based approach. IEEE Access 2024, 12, 52565–52582. [Google Scholar] [CrossRef]
- Hindy, H.; Brosset, D.; Bayne, E.; Seeam, A.; Tachtatzis, C.; Atkinson, R.; Bellekens, X. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv 2018, arXiv:1806.03517. [Google Scholar]
- Omer, K.A.A.; Awn, F.A. Performance evaluation of intrusion detection systems using ANN. Egypt. Comput. Sci. J. 2015, 39, 32–42. [Google Scholar]
- He, J.; Xu, F. Research on trust-based secure routing in wireless sensor networks. J. Phys. Conf. Ser. 2020, 1486, 2. [Google Scholar] [CrossRef]
- Ozcelik, M.M.; Irmak, E.; Ozdemir, S. A hybrid trust based intrusion detection system for wireless sensor networks. In Proceedings of the 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 16–18 May 2017. [Google Scholar]
- Singh, K.; Verma, A.K. A fuzzy-based trust model for flying ad hoc networks (FANETs). Int. J. Commun. Syst. 2018, 31, e3517. [Google Scholar] [CrossRef]
- Abdellatif, T.; Mosbah, M. Efficient monitoring for intrusion detection in wireless sensor networks. Concurr. Comput. Pract. Exp. 2020, 32, e4907. [Google Scholar] [CrossRef]
- Sunil Kumar, K.N.; Shankar, S. Improving the AODV route recovery mechanism using PSO in WSN. Int. J. Sens. Wirel. Commun. Control 2020, 10, 707–715. [Google Scholar]
- Yang, H.; Li, Z.; Liu, Z. Neural networks for MANET AODV: An optimization approach. Clust. Comput. 2017, 20, 3369–3377. [Google Scholar] [CrossRef]
- Atto, M.; Mstafa, R.J.; Alkhayyat, A. Improving AODV routing protocol for image transmission over mobile video sensor networks. IEEE Access 2020, 8, 169396–169407. [Google Scholar] [CrossRef]
- Smys, S.; Jennifer, S. Performance improvement in conventional AODV using energy efficient manifold route discovery scheme. J. IoT Soc. Mob. Anal. Cloud 2020, 2, 129–139. [Google Scholar]
- Pandey, P.; Singh, R. Efficient route selection scheme in MANET using enhanced AODV protocol. Wirel. Pers. Commun. 2022, 123, 959–974. [Google Scholar] [CrossRef]
- Leenas, T.; Shriparen, S. Comparison of proactive, reactive, and hybrid routing protocols in mobile ad hoc networks. In Proceedings of the 2021 10th International Conference on Information and Automation for Sustainability (ICIAfS), Negambo, Sri Lanka, 11–13 August 2021. [Google Scholar]
- Levis, P.; Clausen, T.; Hui, J.; Gnawali, O.; Ko, J. The Trickle Algorithm; Document RFC 6206; Internet Engineering Task Force (IETF): Fremont, CA, USA, 2011; pp. 1–13. [Google Scholar]
- Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar]
- Ali, A.S.H.M. Detection and Prevention of Distributed Denial of Service (DDoS) Attacks using Metaheuristic and Machine Learning Techniques. Int. J. Sci. Res. 2024, 13, 10. [Google Scholar]
- Lee, Y.-H.; Kang, J.-H.; Lee, S.-J. A specification-based intrusion detection mechanism for leach protocol. J. Korean Inst. Commun. Inf. Sci. 2012, 37, 138–147. [Google Scholar] [CrossRef]
- Lanzolla, A.; Spadavecchia, M. Wireless sensor networks for environmental monitoring. Sensors 2021, 21, 1172. [Google Scholar] [CrossRef] [PubMed]
- Adu-Manu, K.S.; Engmann, F.; Sarfo-Kantanka, G.; Baiden, G.E.; Dulemordzi, B.A. WSN protocols and security challenges for environmental monitoring applications: A survey. J. Sens. 2022, 2022, 1628537. [Google Scholar] [CrossRef]
- Abdelhamid, A.; Elsayed, M.S.; Jurcut, A.D.; Azer, M.A. A lightweight anomaly detection system for black hole attack. Electronics 2023, 12, 1294. [Google Scholar] [CrossRef]
- Li, Q.; Qi, Y.; Liu, G.; Wang, C.; Yuan, J.; Zhang, Y. A High-Precision Progressive Time Synchronization Method. IEEE Trans. Instrum. Meas. 2025, 74, 5502813. [Google Scholar] [CrossRef]
- Alzhrani, R.; Alliheedi, M. Enhancing IoT Security in 5G Networks: Mitigating DDoS Attacks with Deep Learning. J. Inf. Secur. Cybercrimes Res. 2024, 7, 156–166. [Google Scholar] [CrossRef]
- Erskine, S.K. Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks. Sensors 2024, 24, 2090. [Google Scholar] [CrossRef]
- Khashan, O.A.; Khafajah, N.M.; Alomoush, W.; Alshinwan, M.; Alomari, E. Smart energy-efficient encryption for wireless multimedia sensor networks using deep learning. IEEE Open J. Commun. Soc. 2024, 5, 5745–5763. [Google Scholar] [CrossRef]
- Wang, G.; Zhang, J.; Zhang, Y.; Liu, C.; Chang, Z. Performance Evaluation of Routing Algorithm in Satellite Self-Organizing Network on OMNeT++ Platform. Electronics 2024, 13, 3963. [Google Scholar] [CrossRef]
- Dang, Y. Research on Collaborative Positioning Algorithm of Wireless Sensor Network Security Under Strong Topology Relation. J. Cyber Secur. Mobil. 2025, 14, 25–46. [Google Scholar] [CrossRef]
- Zhang, J. WSN network node malicious intrusion detection method based on reputation score. J. Cyber Secur. Mobil. 2025, 12, 55–76. [Google Scholar] [CrossRef]
- OMNET++ Simulation Manual. Available online: https://doc.omnetpp.org/omnetpp/manual/ (accessed on 3 March 2025).
- OMNET++ Installation Guide. Available online: https://doc.omnetpp.org/omnetpp/InstallGuide.pdf (accessed on 3 March 2025).
- Virdis, A.; Stea, G.; Nardini, G. SimuLTE-A modular system-level simulator for LTE/LTE-A networks based on OMNeT++. In Proceedings of the 2014 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH), Vienna, Austria, 28–30 August 2014. [Google Scholar]
- Vishwakarma, R.; Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 2019, 73, 3–25. [Google Scholar] [CrossRef]
- Dener, M.; Okur, C.; Al, S.; Orman, A. WSN-BFSF: A new dataset for attacks detection in wireless sensor networks. IEEE Internet Things J. 2023, 11, 2109–2125. [Google Scholar] [CrossRef]
- Kandakatla, A.; Anbalagan, S. Threat Detection in VANET Communications. In Proceedings of the 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE), Rourkela, India, 19–21 July 2024. [Google Scholar]
- Riskhan, B.; Safuan, H.A.J.; Hussain, K.; Elnour, A.A.H.; Abdelmaboud, A.; Khan, F.; Kundi, M. An adaptive distributed denial of service attack prevention technique in a distributed environment. Sensors 2023, 23, 6574. [Google Scholar] [CrossRef] [PubMed]
- Mona, R.; Manoranjitham, R. Localization and Detection of Sinkhole Attacks in Wireless Sensor Networks Based on Denial of Service (DoS) Attacks. J. Electr. Syst. 2024, 20, 195–204. [Google Scholar]
- Oztoprak, A.; Hassanpour, R.; Ozkan, A.; Oztoprak, K. Security challenges, mitigation strategies, and future trends in wireless sensor networks: A review. ACM Comput. Surv. 2024, 57, 1–29. [Google Scholar] [CrossRef]
- Kibirige, G.W.; Sanga, C. A survey on detection of sinkhole attack in wireless sensor network. arXiv 2015, arXiv:1505.01941. [Google Scholar]
- Roy, S.D.; Singh, S.A.; Choudhury, S.; Debnath, N.C. Countering sinkhole and black hole attacks on sensor networks using dynamic trust management. In Proceedings of the 2008 IEEE Symposium on Computers and Communications, Marrakech, Morocco, 6–9 July 2008. [Google Scholar]
Related Paper | Key Features | Approach | Pros and Cons |
---|---|---|---|
[31] (Nov 2024) | This paper deployed a resource-efficient algorithm for DDoS attacks by combining machine learning and metaheuristic optimization models. | Uses PSO algorithm in the gateway, which will control traffic. They used two rules for allowing normal requests and abnormal requests. The simulation is performed in OMNET++. | The suggested approach offers significant benefits, including precise identification of DDoS attacks, improved system performance, and increased network efficiency. Notably, it achieves a high packet delivery ratio, demonstrating the network’s ability to maintain robust and reliable communication even when subjected to DDoS threats. |
[35] (Mar 2023) | In this paper, they proposed a lightweight anomaly detection system for black hole attacks. A data set was developed for analyzing the traffic and studying node behavior. | Using a support vector machine, they classified patterns of attacker nodes and separated the normal-behaving nodes and malicious nodes. The simulation was carried out in OMNET++. | A new data set was generated using a machine learning model and OMNET++. But the limitation of this paper is that the simulation was performed on seven nodes only and there was only one attacker node. |
[36] (Mar 2025) | This paper introduces a high-accuracy time synchronization algorithm that integrates the SharkNet protocol with the IEEE 1588 standard to enhance both synchronization precision and overall network performance. The synchronization process works by exchanging timestamp data between parent and child clocks to calculate the time offset. | The model uses a parent clock that transmits messages containing timestamp information to the child clock. These messages are sent at predefined intervals set by the network. When the next scheduled interval is reached, a new round of time synchronization is initiated. OMNET++ is used for the simulation model. | Even though this shows high accuracy and better network performance, if the parent clock has a problem all the child clocks can become inaccurate. |
[37] (Dec 2024) | A data set is generated using OMNET++ along with applying deep learning and machine learning algorithms. | Two scenarios with normal data traffic and DDoS attack traffic are created, by generating a big size of packets and transmitting them at high speed. They generate a data set with 512,666 samples along with 16 features. | Using various deep learning and machine learning models, a new data set is created that can be used for research work. |
[38] (Mar 2024) | This article introduces a security process based on identifying and verifying each sensor node individually, ensuring that only verified nodes are permitted to exchange data and contribute sensed information within the network. | In the proposed network model, SDAAA employs the base station to verify and grant access to nodes, enabling the data aggregator to reject aggregated data from any node that has not been officially tagged as part of the network. | This approach is novel, maintains data validity, uses multi-attribute authenticity, and is also energy-efficient. |
[39] (Aug 2024) | This article proposes an energy-efficient encryption for WSNs that uses hybrid lightweight methods for object detection. | The methodology has two phases: object detection and lightweight encryption. To strengthen security, the model integrates multiple lightweight encryption techniques. It uses a symmetric encryption algorithm to protect key objects, while also applying a pixel scrambling technique that rearranges the entire image’s pixel structure through permutation and shuffling. | This approach improves security by using lightweight encryption and image scrambling to protect data while being efficient on devices with limited resources. However, it may slow down the system, reduce image quality, and could still be vulnerable to advanced attacks. Additionally, it may not work well in all types of systems. |
[40] (Oct 2024) | The article proposes a shortest queue length cluster-based routing protocol for a self-sustaining network. This platform supports functions like the initial setup of satellite self-organizing networks and the ongoing maintenance of clusters. | This paper’s simulation is carried out on the satellite self-organizing network platform, concentrating on the performance of packet delay and packet loss rate when routing decisions are made using SQL-CBRP. The results are compared to the Dijkstra algorithm, which minimizes hops, and the GPSR algorithm, which focuses on the shortest path distance. | The advantages of this approach include improved routing performance with reduced packet delay and loss. However, it may face limitations in highly dynamic networks, where frequent changes in topology could affect routing accuracy and stability. |
[41] (Jan 2025) | This paper introduces a security positioning technique that can withstand three types of attacks. It identifies attack nodes by analyzing the physical characteristics of each node. | The analysis reveals that the average positioning error of the witch attack algorithm grows rapidly as the number of virtual nodes increases, reaching approximately 80 when four attack nodes are present. | While this method promotes consistency, it may experience slower convergence rates and reduced precision when compared to centralized synchronization approaches. |
[42] (Mar 2025) | Proposes a malicious node intrusion detection method for WSNs, which is based on the genetic algorithm optimization of the LEACH hierarchical routing protocol. By optimizing the LEACH protocol with the genetic algorithm, the method incorporates a reputation evaluation mechanism to identify and eliminate malicious nodes. | The genetic algorithm is employed to optimize the LEACH protocol, with the introduction of a hierarchical energy-saving method. This approach focuses on observing and evaluating the behavior of nodes during communication. The study leverages Bayes decision theory, using the beta distribution, to construct a reputation model for WSNs. | The advantages of this approach include improved energy efficiency and enhanced security with a reputation-based node evaluation. However, the method may face limitations in terms of increased computational complexity due to the use of genetic algorithms and the need for continuous monitoring, which could strain network resources. |
[10] (Apr 2024) | A trust-based IDS is proposed to incorporate a security mechanism into routing protocols in LLNs. | The methodology employs a distributed and a central approach. A trust-based strategy is used, which calculates trust status values, and based on the threshold the node will be categorized as normal or attacker. | This approach reduces the computation complexity and power consumption issues. But there might be too much work on the root node because of the centralized system. |
Features | OMNET++ | NS-3 | MATLAB |
---|---|---|---|
Application Areas | WSNs, IoT, VANETs, MANETs | Internet Protocols, 5G/6G, SDN, IoT, LTE networks | Control systems, robotics, signal processing, power systems, AI modeling |
Primary Use | Discrete event network simulation, modular design | Packet-level simulation, protocol evaluation | Numerical computing, system modeling, control design |
Programming Language | C++ with NED configuration | C++ and Python | C/C++ and MATLAB |
Frameworks | INET, Veins etc. | IPv4/IPv6, LTE, etc. | Extensive Libraries |
GUI | It offers a graphical runtime interface like Eclipse-based IDE and host of other tools. | Does not have built-in GUI, depends on external tools like Wireshark, PyViz. | Has its own built-in GUI tool App Designer. |
Cost | Open-source and free | Open-source and free | Paid (license required) |
Ref No. | Method Used | Number of Nodes | Attack Type | Reliability | Throughput | Efficiency | Accuracy |
---|---|---|---|---|---|---|---|
[7] Jun 2024 | ABC Optimization Method | 150 | Sinkhole Attack | Not Given | Not Given | 98% | 97% |
[31] Nov 2024 | PSO-ML model | 20 | DDoS Attack | 99.65% | 23,446.861 KB | 41.651 s (Processing time) | Not Given |
[35] Mar 2023 | LADS model | 7 | Blackhole Attack | Not Given | Not Given | Not Given | 99% |
[38] Mar 2024 | SDAAA Method | 540 | Sybil and Sinkhole Attack | 99.5% | 444 kbs | 98.5% | Not Given |
[39] Aug 2024 | Energy-Efficient Encryption model | 100 | Object Detection and Encryption | High | Not Given | 89.71 ms | 84% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Shaik, M.; Kim, S.W. Security in Wireless Sensor Networks Using OMNET++: Literature Review. Sensors 2025, 25, 2972. https://doi.org/10.3390/s25102972
Shaik M, Kim SW. Security in Wireless Sensor Networks Using OMNET++: Literature Review. Sensors. 2025; 25(10):2972. https://doi.org/10.3390/s25102972
Chicago/Turabian StyleShaik, Maahiya, and Sung Won Kim. 2025. "Security in Wireless Sensor Networks Using OMNET++: Literature Review" Sensors 25, no. 10: 2972. https://doi.org/10.3390/s25102972
APA StyleShaik, M., & Kim, S. W. (2025). Security in Wireless Sensor Networks Using OMNET++: Literature Review. Sensors, 25(10), 2972. https://doi.org/10.3390/s25102972