Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018
…
6 pages
1 file
The wireless sensor node characteristics which include low memory, low computation power, and they are deployed in hostile area and left unattended, small range of communication capability. Based on these characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack where compromised node tries to attract network traffic. The impacts of sinkhole attack are that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack or altered routing information. It can also use to send fake information to the base station. In this paper we are focus on exploring and analyzing the existing solutions, which are used to detect and identify of the sinkhole attack in wireless sensor network.
Wireless Sensor Network (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the wireless sensor node is their characteristics which include low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Base on those characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information. It can also used to send bogus information to base station. This paper is focus on exploring and analyzing the existing solutions which used to detect and identify sinkhole attack in wireless sensor network. The analysis is based on advantages and limitation of the proposed solutions.
Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, jamming, sinkhole, wormhole, Sybil and hello flood attacks. Sinkhole attack is among the most destructive routing attacks for these networks. It may cause the intruder to lure all or most of the data flow that has to be captured at the base station. Once sinkhole attack has been implemented and the adversary node has started to work as network member in the data routing, it can apply some more threats such as black hole or grey hole. Ultimately this drop of some important data packets can disrupt the sensor networks completely. This paper focuses on the various methods that can be implemented to overcome this attack likeLocation Based Compromise Tolerant Security Mechanism, Hop Count Monitoring Scheme and through Non Cryptographic Method of Sinkhole Attack Detection.
International Journal of Wireless Communications and Network Technologies, 2021
Due to the wide range of applications in public and military domains, wireless sensor network (WSN) is evolving as a popular technology. This WSN consists of a large number of sensors that are spread across a geographical area that are self-configuring in nature. These nodes are of low cost and resource-constrained nodes. Because these reasons the network becomes vulnerable to many network attacks. There are many types of attacks among which one of the serious attacks is the sinkhole attack, which is one of the destructive routing attacks. It causes the adversary node to attract all or most of the traffic from the neighbors by broadcasting false routing updates of having the shortest path to the central station. This paper is a survey on various methods implemented to overcome sinkhole attacks like Hop Count Monitoring scheme, Key Management Approach, Message-Digest Algorithm.
Wireless Personal Communications, 2018
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. From a security point of view in WSN, data authenticity, confidentiality, Integrity, and availability are the important security goals. It is in common practice that a security protocol used to be created by focusing a particular attack in WSN. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. This survey focuses on one of the most challenging routing attacks, called Sinkhole attack. A Sinkhole attack is one of the sternest routing attacks because it attracts surrounding nodes with misleading routing path information and performs data forging or selective forwarding of data passing through it. It can cause an energy drain on surrounding nodes resulting in energy holes in WSNs and it can cause inappropriate and potentially dangerous responses based on false measurements. Researchers had presented several ways to detect and identify sinkhole attacks. This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks. Among many discussed techniques, fuzzy logic-based systems are considered to be good in performance in intruder detection system (IDS).
IRJET, 2020
The self-configuring type of network in which the sensor nodes are deployed in such a manner that they can join or leave the network when they want is known as wireless sensor network. The nodes start communicating with each other in order to transmit important information within the network. As this type of network is decentralized in nature, there are numerous malicious nodes which might enter the network. With the advancement of this technology, one of the major concerns these days is of security. The attacks are triggered within the network due to the presence of such kind of malicious nodes in the network which is of two parts active and passive types of attacks. Due to unique properties of wireless sensor network and many to one broadcasting nature various types of network layer attacks like wormhole, sinkhole, selective forwarding, sybil, hello flood, spoofed or altered information, etc. Among that sink hole attack is a type of attack in which malicious node attracts neighbor node by providing fake routing information that it has minimum distance from base station. A lot of work has been done in the area of detection of sink hole attack in WSN. In this paper we will study about sink hole attack in WSN and various techniques to identified over the years.
Indian Journal of Science and Technology, 2017
Objectives: Wireless sensor networks are used, especially in military, tracking and monitoring applications. Security systems play an important role as the wireless nature is susceptible to attacks. The main idea is to analyse the performance of the network when subjected to sinkhole attack for various scenarios. Methods/Statistical Analysis: Limited energy, computational capacity and storage are some of the constraints on sensor networks which make it to analyze in a different way compared to adhoc networks. In this paper, we discuss the various attacks and attributes which are used to detect the attacks and present a simulation on the effect of sinkhole attack based on various set of parameters. The performance of the system is analyzed when the network is being subjected to sinkhole attack considering the scenarios of varying network size, number of compromised node, intruder power and the location of the sinkhole attack. The available detection methods of the sinkhole attack are tabulated. Findings: Parameters such as average energy consumption, throughput and packet delivery ratio are analyzed. It is seen that the network performance is degraded by the implementation of the attack and there is a decrease in parameters analyzed when subjected to various scenarios. Application/ Improvement: The variation of the parameters in the attack scenarios will be useful in formulating a detection algorithm. The network can be analysed for different scenarios and more number of parameters.
WSN is one of the modern networks that use technologies and applications in public places. It consists of hundreds and thousands of tiny sensor nodes scattered in the network and has limited scope and range resources connected to the base stations. The specifications of these nodes are low cost and low energy and used for monitoring purposes. Since the sensors are small and many, it is easy to attack these networks. Therefore, there will be many potential attacks on the network of sensors, and among these attacks are jamming, sinkhole, eavesdropping, and other attacks. The sinkhole attack is the most attack that works to destroy paths by announcing the update of the fake routing related to it; the attack occurs through the compromised node (the malicious node) So that it announces a file containing the routing information and works to attract the rest of the nodes to do this routing the data towards it and then operating the sphere of influence. One of the effects of this attack is to reduce the overall network performance, and it can also be used to make another attack, such as a selective redirection attack and a spoofing attack. This paper aims to analyze and detect sinkhole attacks in wireless sensor networks.
ASTL Sectech, 2013
Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as sinkhole attacks. Sinkhole attacks occur when a compromised node attracts network traffic by advertising fake routing updates. This paper first describes the challenges in detecting sinkhole attacks in WSNs. This is followed by analyzing methods to detect and neutralize sinkholes.
2013
Generally wireless sensor networks rely of manyto-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
2013
Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we discuss security issues in WSNs. In this paper we are discussing a vulnerable sinkhole attack, its implementation and correction.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International journal of engineering research and technology, 2018
Algorithmic Aspects of …, 2008
International Journal of Security and Its Applications, 2014
Computer Communications, 2007
International Journal of Science and Research (IJSR), 2015
International Journal of Information System Modeling and Design
Jurnal Teknologi, 2016
Wireless Personal Communications
International Journal of Advanced Research in Computer Science, 2017
Global Transitions Proceedings, 2022
2015 12th International Conference on Information Technology - New Generations, 2015