Detection of Sinkhole Attack in Wireless Sensor Network

被引:5
|
作者
Raju, Imandi [1 ]
Parwekar, Pritee [1 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Visakhapatnam, Andhra Pradesh, India
来源
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3 | 2016年 / 381卷
关键词
Wireless sensor networks; Security; RSSI; LQI; Intrusion detection system; Sinkhole attacks;
D O I
10.1007/978-81-322-2526-3_65
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we proposed an efficient rule-based intrusion detection system for identifying sinkhole attacks in Wireless Sensor Networks (WSN). The sensor nodes in network are deployed in various hostile environments. The nature of WSNs is wireless and hence, security is the major challenging issue. Sinkhole attack is the major common internal attack on WSNs. These attacks are performed by creating a malicious node with the highest transmission range to the base station. Then this node broadcast sends fake routing message to all its neighbor nodes. We considered popular link quality-based multi-hop routing protocol named as Mint-Route protocol. To identify sinkhole attack, we have implemented an IDS system which consists of suitable rules. These rules will allow the IDS to detect the malicious node successfully. We demonstrated this method in random dissemination of sensor nodes in WSNs. We experimented to confirm the accuracy of our anticipated method.
引用
收藏
页码:629 / 636
页数:8
相关论文
共 50 条
  • [41] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Rehman, Aqeel-ur
    Rehman, Sadiq Ur
    Raheem, Haris
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2291 - 2313
  • [42] Security Against Black Hole Attack In Wireless Sensor Network-A Review
    Mishra, Binod Kumar
    Nikam, Mohan C.
    Lakkadwala, Prashant
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 615 - 620
  • [43] Recognized based on multi-hop wireless sensor network Select Forward Attack detection
    Chen, Shu-Qian
    Zhang, Li-Hong
    Li, Cun-Hua
    ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION ICMS2010, VOL 3: MODELLING AND SIMULATION IN INDUSTRIAL APPLICATION, 2010, : 385 - 388
  • [44] Attack Detection Capabilities of Intrusion Detection Systems for Wireless Sensor Networks
    Darra, Eleni
    Katsikas, Sokratis K.
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 91 - 97
  • [45] Accurate detection of selective forwarding attack in wireless sensor networks
    Zhang, Qiong
    Zhang, Wenzheng
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (01)
  • [46] Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
    P. Uma Maheswari
    P. Ganesh Kumar
    Wireless Personal Communications, 2017, 94 : 2043 - 2054
  • [47] Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks
    Maheswari, P. Uma
    Kumar, P. Ganesh
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2043 - 2054
  • [48] TinyAFD: Attack and Fault Detection Framework for Wireless Sensor Networks
    Rughinis, Razvan
    Gheorghe, Laura
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2013, 15 (01): : 33 - 44
  • [49] Routing Protocol Attack Detection Using Machine Learning Through Parallel Computing in Wireless Sensor Network
    Kumar, Mithun P. K.
    Hossain, Al Amin
    Al Majmaie, Sufian
    Amsaad, Fathi
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [50] Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network
    Hongsong, Chen
    Caixia, Meng
    Zhongchuan, Fu
    Lee, Chao-Hsien
    IET INFORMATION SECURITY, 2020, 14 (04) : 452 - 458