Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks
Rohit Aggarwal1 , Khushboo Bansal2
Section:Research Paper, Product Type: Journal Paper
Volume-4 ,
Issue-7 , Page no. 178-182, Jul-2016
Online published on Jul 31, 2016
Copyright © Rohit Aggarwal , Khushboo Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rohit Aggarwal , Khushboo Bansal , “Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.178-182, 2016.
MLA Style Citation: Rohit Aggarwal , Khushboo Bansal "Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 4.7 (2016): 178-182.
APA Style Citation: Rohit Aggarwal , Khushboo Bansal , (2016). Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 4(7), 178-182.
BibTex Style Citation:
@article{Aggarwal_2016,
author = {Rohit Aggarwal , Khushboo Bansal },
title = {Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2016},
volume = {4},
Issue = {7},
month = {7},
year = {2016},
issn = {2347-2693},
pages = {178-182},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1021},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1021
TI - Result Based approach on Intrusion Detection System against Sinkhole Attack in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Rohit Aggarwal , Khushboo Bansal
PY - 2016
DA - 2016/07/31
PB - IJCSE, Indore, INDIA
SP - 178-182
IS - 7
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1710 | 1306 downloads | 1429 downloads |
Abstract
The main problem in the proposed work was the sinkhole attack which was detected and removed by implementing appropriate protocol such as AODV i.e. ad hoc on-demand distance vector (AODV) routing. In this paper, eliminate the sinkhole attack from network by using a novel algorithm for sinkhole detection. The algorithm first finds a list of suspected nodes through checking data consistency and then effectively identifies the intruder in the list through analyzing the network flow information. The algorithm is also robust to deal with multiple malicious nodes that cooperatively hide the real intruder.
Key-Words / Index Term
Wireless Sensor Networks, Routing Algorithm, Malicious Detection Approach
References
[1] S. Ahmad Salehi, M. A. Razzaque, Parisa Naraei, Ali Farrokhtala, “Detection of Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Space Science and Communication, 2013, pp. 361 – 365.
[2] A. Vijayalakshmi, T. Shrimathy, T. G. Palanivelu, “Mobile Agent Middleware Security for Wireless Sensor Networks”, IEEE International Conference on Communication and Signal Processing, 2014, pp. 1669 - 1673.
[3] Vandana B. Salve, Leena Ragha, Nilesh Marathe, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks”, IEEE International Conference on Electrical, Computer and Communication Technologies, 2015, pp. 1 – 7.
[4] Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem, “Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink”, IEEE International Conference on Information Technology, 2015, pp. 307- 313.
[5] D. Sheela, C. Naveen Kumar, G. Mahadevan, “A non cryptographic method of sink hole attack detection in wireless sensor networks”, IEEE International Conference on Information Technology, 2011, pp. 527 – 532.
[6] Mohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem, “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink”, IEEE International Conference on Information Technology - New Generations, 2015, pp. 307 – 313.
[7] Krishan Kant Varshney, P. Samundiswary, “Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network”, IEEE International Conference on Information Communication and Embedded Systems, 2014, pp. 1–5.
[8] Ritwik Banerjee, Chandan Kr. Bhattacharyya, “Energy efficient routing and bypassing energy-hole through mobile sink in WSN”, IEEE Conf. on Computer Communication and Informatics (ICCCI), 2014, pp. 1 – 6.
[9] Babar Nazir, Halabi Hasbullah, “Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network”, IEEE Conf. on Computer Applications and Industrial Electronics (ICCAIE), 2010, pp. 624 – 629.
[10] Pushpendu Kar, Sudip Misra, “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Tran faulty Nodes”, IEEE Conf. on IEEE Transactions on Network and Service Management, 2016, pp. 99 – 112.
[11] Siba Mitra, Ajanta De Sarkar, “Energy aware fault tolerant framework in Wireless Sensor Network”, IEEE Conf. on Applications and Innovations in Mobile Computing (AIMoC), 2014, pp. 139 – 145.
[12] Priyanka Deshpande, Mangala S. Madankar, “Techniques improving throughput of wireless sensor network: A survey”, IEEE Conf. on Circuit, Power and Computing Technologies (ICCPCT), 2015, pp. 1 – 5.
[13] Imran Makhdoom, Mehreen Afzal, Imran Rashid, “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks”, IEEE Conf. on Software Engineering Conference (NSEC), 2014, pp. 1 – 6.
[14] J. Krithiga, R. C. Porselvi, “Efficient Code Guard mechanism against pollution attacks in interflow Network coding”, IEEE Conf. on Communications and Signal Processing (ICCSP), 2014, pp. 1384 – 1388.
[15] R. Geetha, S. Raj Anand, E. Kannan, “Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks”, IEEE Conf. on Information Communication and Embedded Systems (ICICES), 2014, pp - 1 – 6.
[16] Yong-Sik Choi, Young-Jun Jeon, Sang-Hyun Park, “A study on sensor nodes attestation protocol in a Wireless Sensor Network”, The 12th IEEE International Conf. on Advanced Communication Technology (ICACT), 2010, pp. 574 - 579.
[17] Yuling Lei, Yan Zhang, Yanjuan Zhao, “The Research of Coverage Problems in Wireless Sensor Network”, IEEE Conf. on Wireless Networks and Information Systems, 2009, pp. 31 – 34. DOI: 10.1109/WNIS.2009.38
[18] Ruchi Mittal, M. P. S Bhatia, “Wireless sensor networks for monitoring the environmental activities”, IEEE Conf on Computational Intelligence and Computing Research (ICCIC), 2010, pp. 1 – 5.
[19] Nikhil Marriwala, Priyanka Rathee, “An approach to increase the wireless sensor network lifetime”, IEEE Conf. on Information and Communication Technologies (WICT), 2012, pp. 495 – 499.
[20] Guanglai Chen, Shoujun Wang, Lifei Li, “Notice of Retraction the design of wireless wave height sensor network node based on Zigbee technology”, IEEE Conf. on Electric Information and Control Engineering (ICEICE), 2011, pp. 3683 – 3686. DOI: 10.1109/ICEICE.2011.5777656
[21] NS-2, The ns Manual (formally known as NS Documentation) available at following link: http: //www. isi.edu/nsnam/ ns/do
[22] Gisung Kim, Younggoo Han, Sehun Kim, “A cooperativesinkhole detection method for mobile ad hoc networks”, International Journal of Electronics and Communication 64 (2010) 390–397
[23] J.M.L.P. Caldeira, J.J.P.C. Rodrigues, P. Lorenz, L. Shu, “Intramobility handover enhancement in healthcare wireless sensor networks”, 14th International Conference one-Health Networking, Applications and Services (Healthcom), 2012, pp. 261 – 266.
[24] Charanpreet Kaur and Amit Chhabra, "An Energy Efficient Multihop Routing Protocol for Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, pp. 86 - 91, Jul -2015.
[25] R. Silva, J. Sa Silva, M. Simek, F. Boavida, “A new approach for multi-sink environments in WSNs”, International Symposium on Integrated Network Management, 2009. IM '09. IFIP/IEEE, pp. 109 – 112.
[26] Qingtian Sun, Shunfu Jin, Chen Chen, “Energy analysis of sensor nodes in WSN based on discrete-time queueing model with a setup”, Chinese Control & Decision Conference (CCDC), 2010, pp. 4114 – 4118, DOI: 10.1109/CCDC.2010.5498425.
[27] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach”, in: Proceedings of WCNC ’05, March 2005, pp.1193–1199.
[28] J. Petajajarvi, H. Karvonen, “Soft handover method for mobile wireless sensor networks based on 6LoWPAN”, International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1 – 6, DOI: 10.1109/DCOSS.2011. 5982208.
[29] Rohit Aggarwal, Er. Khushboo Bansal, “An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review”, International Journal of Computer Sciences and Engineering (IJCSE), pp. 64 – 68, Volume-4, Issue-4, April 2016,