An Improved Detection and Mitigation Approach of Sinkhole in Wireless Sensor Networks (original) (raw)

An Enhanced Secure Routing Algorithm Against Sinkhole Attack in Wireless Sensor Networks

2014

A wireless sensor network consists of a set of geographically distributed sensor nodes, which continuously monitor their surroundings and forward the sensing data to a base station through multi-hop routing. These networks use radio communications as a media for transmission which make them susceptible to different types of attacks. Sinkhole attack is considered as one of the severe attacks that is launched by a compromised node to divert the network traffic away from the intended route, Through this procedure sinkhole node attempts to draw all network traffic to itself. Thereafter it alters the data packets or drops the packets silently and finally destroy the network. A sinkhole attack causes a serious threat to sensor networks. In order to detect the sinkhole attack it is required to do enhancement in AODV based routing algorithm, which uses mobile agents designed for wireless sensor networks. In this proposal Mobile agents are used to collect information of all sensor nodes to make every node aware of the entire network, so that a valid node will not listen the cheating information from malicious node and detect sinkhole node based on finding difference of nodes sequence numbers using threshold value.

A Survey on Detection of Sinkhole Attack in Wireless Sensor Network

Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. It can also used to send bogus information to base station. This paper is focus on exploring and analyzing the existing solutions which used to detect and identify sinkhole attack in wireless sensor network. The analysis is based on advantages and limitation of the proposed solutions. Keywords: Wireless sensor network (WSN), sinkhole attack, detection of sinkhole attack Call for Papers: https://sites.google.com/site/ijcsis/

Detection of sinkhole attack in wireless sensor networks

2013

Generally wireless sensor networks rely of manyto-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.

Survey of Detection of Sinkhole Attack in Wireless Sensor Network

Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, jamming, sinkhole, wormhole, Sybil and hello flood attacks. Sinkhole attack is among the most destructive routing attacks for these networks. It may cause the intruder to lure all or most of the data flow that has to be captured at the base station. Once sinkhole attack has been implemented and the adversary node has started to work as network member in the data routing, it can apply some more threats such as black hole or grey hole. Ultimately this drop of some important data packets can disrupt the sensor networks completely. This paper focuses on the various methods that can be implemented to overcome this attack likeLocation Based Compromise Tolerant Security Mechanism, Hop Count Monitoring Scheme and through Non Cryptographic Method of Sinkhole Attack Detection.

Survey on Approaches to Detect Sinkhole Attacks in Wireless Sensor Networks

International Journal of Wireless Communications and Network Technologies, 2021

Due to the wide range of applications in public and military domains, wireless sensor network (WSN) is evolving as a popular technology. This WSN consists of a large number of sensors that are spread across a geographical area that are self-configuring in nature. These nodes are of low cost and resource-constrained nodes. Because these reasons the network becomes vulnerable to many network attacks. There are many types of attacks among which one of the serious attacks is the sinkhole attack, which is one of the destructive routing attacks. It causes the adversary node to attract all or most of the traffic from the neighbors by broadcasting false routing updates of having the shortest path to the central station. This paper is a survey on various methods implemented to overcome sinkhole attacks like Hop Count Monitoring scheme, Key Management Approach, Message-Digest Algorithm.

Detection of Sinkhole Attack in Wireless Sensor Network Using Ad-hoc on-demand Distance Vector

International journal of engineering research and technology, 2018

Wireless Sensor Network is a collection of the large number of small sensor node that has the capabilities to sense, collect, and disseminate information in many types of applications. This paper on exploring several types of security attack in wireless sensor network and counteragent against sinkhole attack. The Introduction sections give brief information about WSN, its components, and architecture. In next section discuss Sinkhole attack & its counteragent method and Then In Suggested Methodology Section author suggest a new technique to detect the sinkhole attack in a wireless sensor network (WSNs) which is based on the analysis of routing behaviour.

Sinkhole Attack in Wireless Sensor Networks-Performance Analysis and Detection Methods

Indian Journal of Science and Technology, 2017

Objectives: Wireless sensor networks are used, especially in military, tracking and monitoring applications. Security systems play an important role as the wireless nature is susceptible to attacks. The main idea is to analyse the performance of the network when subjected to sinkhole attack for various scenarios. Methods/Statistical Analysis: Limited energy, computational capacity and storage are some of the constraints on sensor networks which make it to analyze in a different way compared to adhoc networks. In this paper, we discuss the various attacks and attributes which are used to detect the attacks and present a simulation on the effect of sinkhole attack based on various set of parameters. The performance of the system is analyzed when the network is being subjected to sinkhole attack considering the scenarios of varying network size, number of compromised node, intruder power and the location of the sinkhole attack. The available detection methods of the sinkhole attack are tabulated. Findings: Parameters such as average energy consumption, throughput and packet delivery ratio are analyzed. It is seen that the network performance is degraded by the implementation of the attack and there is a decrease in parameters analyzed when subjected to various scenarios. Application/ Improvement: The variation of the parameters in the attack scenarios will be useful in formulating a detection algorithm. The network can be analysed for different scenarios and more number of parameters.

IJERT-How to Detect and Mitigate Sinkhole Attack in Wireless Sensor Network (WSN

International Journal of Engineering Research & Technology (IJERT), 2020

https://www.ijert.org/how-to-detect-and-mitigate-sinkhole-attack-in-wireless-sensor-network-wsn https://www.ijert.org/research/how-to-detect-and-mitigate-sinkhole-attack-in-wireless-sensor-network-wsn-IJERTV9IS050099.pdf Wireless Sensor Network (WSN) is an emerging technology due to its wide range of applications in public and military area. These sensor networks consist of thousands of diminutive sensor nodes with limited resources with a base station of low cost and low power sensor nodes that are used for the monitoring purpose. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. Data authenticity, confidentiality, Integrity, and availability are the important security goals of WSNs. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. Sinkhole attack is one of the most serious routing attacks because it attracts surrounding nodes with misleading routing path information and performs selective forwarding of data. Sinkhole attack is the kind of attack which degrades the performance of the network. It can cause an energy drain on surrounding nodes because it cause inappropriate and potentially dangerous responses based on false measurement. The aim of this Research is to detect sinkhole attack in wireless sensor network and propose technique to fostall the attack and secure the network. CHAPTER 1 INTRODUCTION 1.1 Introduction Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes with the ability to sense information from the sorrounding. The constraints of the wireless sensor node include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. These characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack wehere compromised node tries to attract network traffic by advertising its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. Generally wireless sensor networks rely on many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding of data. Sinkhole attack is among the most destructive routing attack. It causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. It can cause an energy drain on surrounding nodes and inappropriate and potentially dangerous responses based on false measurements. Wireless Sensor Network is a collection of small devices which provides the ability to operate devices such as actuators, motors and switches that control conditions, and give reliable communication of sensed data. All the messages from sensor nodes in wireless sensor network are destined to base station. This created opportunity for sinkhole to launch an attack. Sinkhole attacks normally occur when compromised node send fake routing information to other nodes in the network with aim of attracting as many traffic as possible. Based on that communication pattern the intruder will only compromised the nodes which are close to base station instead of targeting all nodes in the network. This is considered as challenges because the communication pattern itself provides opportunity for attack.

Sinkhole Attacks in Wireless Sensor Networks: A Survey

Wireless Personal Communications, 2018

Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. From a security point of view in WSN, data authenticity, confidentiality, Integrity, and availability are the important security goals. It is in common practice that a security protocol used to be created by focusing a particular attack in WSN. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. This survey focuses on one of the most challenging routing attacks, called Sinkhole attack. A Sinkhole attack is one of the sternest routing attacks because it attracts surrounding nodes with misleading routing path information and performs data forging or selective forwarding of data passing through it. It can cause an energy drain on surrounding nodes resulting in energy holes in WSNs and it can cause inappropriate and potentially dangerous responses based on false measurements. Researchers had presented several ways to detect and identify sinkhole attacks. This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks. Among many discussed techniques, fuzzy logic-based systems are considered to be good in performance in intruder detection system (IDS).

AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks

Wireless sensor Networks consist of small nodes with sensing, computation and wireless comnmnication wireless capabilities. These Networks are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information therefore security is important in WSNs. Routing attacks can have devastating effect on wireless Sensor Network and present a major challenge when designing security mechanisms. Sinkhole attack is the most destructive routing attack for these networks, it enable many other attack. In this type of attack sinkhole node tries to attract data to itself by convincing neighbors through broadcasting fake routing information. This paper present an AODV based secure routing algorithm based on mobile agent for detecting the malicious node in sinkhole attack. The algorithm detects sinkhole node by finding the difference of nodes sequence numbers using threshold value. It also shows performance evaluation of AODV with the enhanced secure routing algorithm and existing secure routing algorithm through simulations, which confirmed the effectiveness and accuracy of the algorithm by considering performance metrics as Throughput, PDR and Packet loss. Simulation is carried out using simulator NS2.