A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Wireless Sensor Networks is consist of thousands of small and low-cost devices, which communicate over wireless medium. Due to locating in harsh environment and having limited resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a centralized detection algorithm based on the remaining energies of the nodes is proposed. The simulations were run for different values of energy thresholds and various numbers of nodes. The performance of the system was investigated over total energy consumption in the system, the number of packets arrived at base station and true detection rate of the sinkhole node(s). The results showed that the proposed method is energy-efficient and detects the malicious nodes with a 100% accuracy for all number of nodes.

___

  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in largescale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59. Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.
Natural and Engineering Sciences-Cover
  • ISSN: 2458-8989
  • Başlangıç: 2015
  • Yayıncı: Cemal TURAN
Sayıdaki Diğer Makaleler

A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Merve Nilay AYDIN, Ipek Abasikeles Turgut

Maturation and Gonad Development of Yellowspotted Puffer Torquigener flavimaculosus (Osteichthyes: Tetraodontidae) from Iskenderun Bay, North-eastern Mediterranean

Şehriban ÇEK YALNIZ, Funda TURAN, Servet Ahmet DOĞDU

Length-Weight Relationships of Four Lessepsian Puffer Fish Specıes From Muğla Coasts of Turkey

Gökçen Bilge, Halit Filiz, Sercan Yapici

Multimedia Respiratory Database (RespiratoryDatabase@TR): Auscultation Sounds and Chest X-rays

Gökhan ALTAN, Yakup KUTLU, Yusuf GARBİ, Adnan Özhan PEKMEZCİ, Serkan NURAL

Bioaccumulation of nine heavy metals in some tissues of Anodontostoma chacunda (Hamilton, 1822) in the Arabian Sea coasts of Pakistan

Quratulan AHMED, Levent BAT, Qadeer MOHAMMAD ALİ

Climatic Trends in the Temperature of Çanakkale City, Turkey

Semih Kale

Catch Composition of Bottom Trawl Fisheries in Düzce Coast, southwestern Black Sea

Tuba ÖĞREDEN, Deniz YAĞLIOĞLU

The Factors Increasing of Invasiveness Potential of Five Pufferfishes in the Eastern Mediterranean, Turkey

Halit FİLİZ, Sercan YAPICI, Gökçen BİLGE

Assessing DNA Barcodes for Identification of Pufferfish Species (Tetraodontidae) in Turkish Marine Waters

Cemal Turan, Mevlüt Gürlek, Deniz Ergüden, Ali Uyan, Serpil Karan, Servet Ahmet Doğdu

Long journey of Lagocephalus sceleratus (Gmelin, 1789) throughout the Mediterranean Sea

Okan Akyol, Vahdet Ünal