International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Sinkhole Attacks in Wireless Sensor Network Routing: A Survey

Author Affiliations

  • 1Department of Computer Science and Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Res. J. Computer & IT Sci., Volume 4, Issue (8), Pages 4-7, August,20 (2016)

Abstract

The capacity of Wireless Sensor Network (WSN) is often limited by many factors like communication range, memory, battery but security is the measure concern as wireless networks are most vulnerable to the attacks. Because of inherent resource and computing constraints in unattended environments, the risk of secure transmission over the network has increased. There are many attacks possible on WSN like selective forwarding, denial of service attack, Sybil attack, jamming, black hole attack, sinkhole, wormhole and hello flood attacks. One of the most notably routing attacks is Sinkhole attack in which attacker lure the network by advertising the high quality routes to the base station. It is very likely that these nodes prevent the arrival of information to the base station. When these achieve their objective, the attack will be launched along with the invitation to the dangerous threats like black hole or gray hole. In this paper, we have described various strategies for detecting sinkhole attacks and methods to neutralize them.

References

  1. Bhaskar Krishnamachari (2005)., An Introduction to Wireless Sensor Networks., Second International Conference on Intelligent Sensing and Information Processing (ICISIP), Chennai, India.
  2. Soni Vinay, Modi Pratik and Chaudhri Vishvash (2013)., Detecting Sinkhole Attack in Wireless Sensor Network., International Journal of Application or Innovation in Engineering & Management, 2(2), 29-32
  3. Christian Cervantes, Poplade Diego, Nogueira Michele and Santos Aldri (2015)., Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things., IM, IFIP/IEEE, 606-611.
  4. Choi Byung Goo, Cho Eung Jun, Kim Jin Ho, Hong Choong Seon and Kim Jin Hyoung (2009)., A sinkhole attack detection mechanism for LQI based mesh routing in WSN., Information Networking, International Conference, ICOIN, IEEE. 1-5.
  5. Chaudhry J.A., Tariq U., Amin M.A. and Rittenhouse R.G. (2013)., Dealing with sinkhole attacks in wireless sensor networks., Advanced Science and Technology Letters, 29(2), 7-12.
  6. Sharma K. and Ghose M.K. (2010)., Wireless sensor networks: An overview on its security threats., IJCA, Mobile Ad-hoc Networks, 42-45.
  7. Ngai E.C., Liu J. and Lyu M.R. (2006)., On the intruder detection for sinkhole attack in wireless sensor networks., In 2006 IEEE International Conference on Communications IEEE. 8, 3383-3389.
  8. Dallas D., Leckie C. and Ramamohanarao K. (2007)., Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks., In 2007 15th IEEE International Conference on Networks, 176-181.
  9. Tumrongwittayapak C. and Varakulsiripunth R. (2009)., Detecting Sinkhole attacks in wireless sensor networks., In ICCAS-SICE, IEEE. 1966-1971.
  10. Chen C., Song M. and Hsieh G. (2010)., Intrusion detection of sinkhole attacks in large-scale wireless sensor networks., Wireless Communications, Networking and Information Security (WCNIS), 2010.
  11. Sheela D., Kumar C.N. and Mahadevan G. (2011)., A non cryptographic method of sink hole attack detection in wireless sensor networks., Recent Trends in Information Technology, 2011 International Conference on. 527-532.
  12. Sharmila S. and Umamaheswari G. (2011)., Detection of sinkhole attack in wireless sensor networks using message digest algorithms., Automation, Control and Computing (PACC), 2011 International Conference, 1-6.