Investigating the Sinkhole Attack in CognitiveWireless Sensor Network

被引:0
作者
Malale, Zenzele [1 ]
Velempini, Mthulisi [1 ]
Mapunya, Sekgoari Semaka [1 ]
机构
[1] Univ Limpopo, Dept Comp Sci, Mankweng, South Africa
来源
PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL. 2 | 2023年 / 448卷
关键词
Mitigation; Selective forwarding; Sinkhole attack; Wireless sensor networks; Worm-hole attacks;
D O I
10.1007/978-981-19-1610-6_53
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor network (WSN) is a network that senses its environment, collects data, and routes data to sink node through wireless links. However, security is a challenge. Sinkhole attack is one of the main security issues that threatens the operation ofWSN. Sinkhole nodes advertise themselves as best link route to the base station for malicious reasons. Thereafter, the attacker drops packets and modifies data, enabling other attacks such as selective forwarding and worm-hole attacks to be launched. This study focusses on investigating the effectiveness of sinkhole attack mitigation schemes in cognitive WSN and designed a framework for future research. MATLAB simulation tool was utilized to simulate and evaluate the sinkhole attack mitigation schemes, and comparative results were generated. Themetrics whichwere considered in the simulation are the packet delivery ratio, probability of detection, and the probability of false alarm. The results show that the mitigation of sinkhole attacks requires further attention.
引用
收藏
页码:605 / 618
页数:14
相关论文
共 17 条
[1]  
Abdullah Md Ibrahim, 2015, International Journal of Computer Network and Information Security, V7, P50, DOI 10.5815/ijcnis.2015.03.07
[2]  
[Anonymous], 2015, INDIAN J SCI TECHNOL, DOI DOI 10.17485/ijst/2015/v8iS2/57793
[3]  
Byung GC, 2008, 2009 INT C INF NETW
[4]  
Chanatip T, 2010, 2009 7 INT C INF COM
[5]  
Chen C, 2010, IEEE INT C
[6]  
Dallas Daniel, 2007, 2007 15th IEEE International Conference on Networks, P176, DOI 10.1109/ICON.2007.4444082
[7]   Two tier secure routing protocol for heterogeneous sensor networks [J].
Du, Xiaojiang ;
Guizani, Mohsen ;
Xiao, Yang ;
Chen, Hsiao-Hwa .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (09) :3395-3401
[8]  
Jain S., 2021, Healthcare paradigms in the internet of things ecosystem, P1, DOI DOI 10.1016/B978-0-12-819664-9.00001-6
[9]   Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side [J].
Krontiris, Ioannis ;
Giannetsos, Thanassis ;
Dimitriou, Tassos .
2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, :526-531
[10]  
Luigi C, 2010, 2010 5 INT C CRIT IN