An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review
Rohit Aggarwal1 , Khushboo Bansal2
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-4 , Page no. 64-68, Apr-2016
Online published on Apr 27, 2016
Copyright © Rohit Aggarwal , Khushboo Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Rohit Aggarwal , Khushboo Bansal , “An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.64-68, 2016.
MLA Style Citation: Rohit Aggarwal , Khushboo Bansal "An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review." International Journal of Computer Sciences and Engineering 4.4 (2016): 64-68.
APA Style Citation: Rohit Aggarwal , Khushboo Bansal , (2016). An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review. International Journal of Computer Sciences and Engineering, 4(4), 64-68.
BibTex Style Citation:
@article{Aggarwal_2016,
author = {Rohit Aggarwal , Khushboo Bansal },
title = {An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {64-68},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=859},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=859
TI - An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Rohit Aggarwal , Khushboo Bansal
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 64-68
IS - 4
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1564 | 1484 downloads | 1525 downloads |
Abstract
This Wireless sensor network is deal with sensing the information from deployed area. For data transmission from source node to destination node various routing protocols is used. Due to routing the energy consumption occurred in the network. In wireless sensor network energy consumption is one of the main problems because every node is operated by battery. In wireless sensor network energy utilization is one of the primary issues in light of the fact that each node is operated by battery. In wireless sensor networks, sensors expend energy both in detecting information and transmitting the detected information to a base station. The power utilization for transmitting information is an exponential function of the separation from the sensor to the base station. Power utilization for detecting information is controlled by the kind of sensor and in addition the routing protocol. The issue in this paper is to build the life time of the sensor systems. To have expansive system life time’s everything nodes need to minimize their energy utilization.
Key-Words / Index Term
Wireless Sensor Networks, Applications of WSN, Routing in WSN, Intrusion Detection System, Sinkhole Attack
References
[1] S. Misra, P.V. Krishna, K.I. Abraham “Energy efficient learning solution for intrusion detection in Wireless Sensor Networks” Second International Conference on Communication Systems and Networks, pp. 1-6, 2010.
[2] Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016.
[3] J. Petajajarvi, H. Karvonen “Soft handover method for mobile wireless sensor networks based on 6LoWPAN” International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1 – 6, DOI: 10.1109/DCOSS.2011.5982208
[4] Qingtian Sun, Shunfu Jin, Chen Chen “Energy analysis of sensor nodes in WSN based on discrete-time queueing model with a setup” Chinese Control and Decision Conference (CCDC), 2010, pp. 4114 – 4118, DOI: 10.1109/CCDC.2010.5498425.
[5] J.M.L.P. Caldeira, J.J.P.C. Rodrigues, P. Lorenz, L. Shu “Intra-mobility handover enhancement in healthcare wireless sensor networks” 14th International Conference one-Health Networking, Applications and Services (Healthcom), 2012, pp. 261 – 266.
[6] R. Silva, J. Sa Silva, M. Simek, F. Boavida “A new approach for multi-sink environments in WSNs” International Symposium on Integrated Network Management, 2009. IM '09. IFIP/IEEE, pp. 109 – 112.
[7] X. Chen, P. Yu “Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes” IEEE 3rd International Conference on Biomedical Engineering and Informatics (BMEI), 2010, pp. 2863 – 2867.
[8] Yong-Sik Choi, Young-Jun Jeon, Sang-Hyun Park “A study on sensor nodes attestation protocol in a Wireless Sensor Network”, IEEE 12th International Conference on Advanced Communication Technology (ICACT), 2010, Volume: 1, pp. 574-579.
[9] S. Kwon, J. H. Ko, Jeong kyu Kim and Cheeha Kim, “Dynamic timeout for data aggregation in wireless sensor networks”, Elsevier Journal of Computer Networks, 21 February 2011, pp. 650-664.
[10] R. L. Balla, V. Kotoju, "Sinkhole Attack Detection And Prevention in Manet & Improving The Performance of AODV Protocol", Compusoft, An International Journal of Advanced Computer Technology, 2013, PP 210-214.
[11] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, "Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks," IEEE Conference on WSN, 2003, pp 23-32.
[12] L. Doherty, K. S. J. Pister, and L. E. Ghaoui, "Convex Position Estimation in Wireless Sensor Networks," International conference on INFOCOM, 2001, pp 230-241.
[13] T. Dimitriou, I. Krontiris, T. Giannetsos and M. Mpasoukos, “Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks”, In Algorithmic Aspects of Wireless Sensor Networks, pp. 150-161.Springer Berlin Heidelberg, 2008.
[14] E. C. H. Ngai, J. Liu, and M. R. Lyu, “An Efficient Intruder Detection Algorithm against Sinkhole Attacks in Wireless Sensor Networks,” Computer Communications, vol. 30, pp. 2353-2364, 2007.
[15] Charanpreet Kaur and Amit Chhabra, "An Energy Efficient Multihop Routing Protocol for Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, Page No (86-91), Jul -2015.
[16] Liping Teng, Yongping Zhang, "Sera: A Secure Routing Algorithm against Sinkhole Attacks For Mobile Wireless Sensor Networks", Second International Conference on Computer Modeling and Simulation 2010, PP 79-82.
[17] Nisarg Gandhewar, Rahila Patel, "Detection & Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network", Fourth International Conference on Computational Intelligence and Communication Networks, 2012, PP 714-718.
[18] I. Krontiris, T. Dimitriou, F.C. “Freiling Towards intrusion detection in wireless sensor networks”. In: Proceedings of the 13th European Wireless Conference, Paris, France (April 2007).
[19] Gisung Kim, Younggoo Han, Sehun Kim, “A cooperative-sinkhole detection method for mobile ad hoc networks”, International Journal of Electronics and Communication 64 (2010) 390–397
[20] NS-2, The ns Manual (formally known as NS Documentation) available at following link:http: //www. isi.edu/nsnam/ ns/do