IJERT-How to Detect and Mitigate Sinkhole Attack in Wireless Sensor Network (WSN (original) (raw)

2020, International Journal of Engineering Research & Technology (IJERT)

https://www.ijert.org/how-to-detect-and-mitigate-sinkhole-attack-in-wireless-sensor-network-wsn https://www.ijert.org/research/how-to-detect-and-mitigate-sinkhole-attack-in-wireless-sensor-network-wsn-IJERTV9IS050099.pdf Wireless Sensor Network (WSN) is an emerging technology due to its wide range of applications in public and military area. These sensor networks consist of thousands of diminutive sensor nodes with limited resources with a base station of low cost and low power sensor nodes that are used for the monitoring purpose. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. Data authenticity, confidentiality, Integrity, and availability are the important security goals of WSNs. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. Sinkhole attack is one of the most serious routing attacks because it attracts surrounding nodes with misleading routing path information and performs selective forwarding of data. Sinkhole attack is the kind of attack which degrades the performance of the network. It can cause an energy drain on surrounding nodes because it cause inappropriate and potentially dangerous responses based on false measurement. The aim of this Research is to detect sinkhole attack in wireless sensor network and propose technique to fostall the attack and secure the network. CHAPTER 1 INTRODUCTION 1.1 Introduction Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes with the ability to sense information from the sorrounding. The constraints of the wireless sensor node include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. These characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack wehere compromised node tries to attract network traffic by advertising its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. Generally wireless sensor networks rely on many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding of data. Sinkhole attack is among the most destructive routing attack. It causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. It can cause an energy drain on surrounding nodes and inappropriate and potentially dangerous responses based on false measurements. Wireless Sensor Network is a collection of small devices which provides the ability to operate devices such as actuators, motors and switches that control conditions, and give reliable communication of sensed data. All the messages from sensor nodes in wireless sensor network are destined to base station. This created opportunity for sinkhole to launch an attack. Sinkhole attacks normally occur when compromised node send fake routing information to other nodes in the network with aim of attracting as many traffic as possible. Based on that communication pattern the intruder will only compromised the nodes which are close to base station instead of targeting all nodes in the network. This is considered as challenges because the communication pattern itself provides opportunity for attack.