A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Wireless Sensor Networks is consist of thousands of small and low-cost devices, which communicate over wireless medium. Due to locating in harsh environment and having limited resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a centralized detection algorithm based on the remaining energies of the nodes is proposed. The simulations were run for different values of energy thresholds and various numbers of nodes. The performance of the system was investigated over total energy consumption in the system, the number of packets arrived at base station and true detection rate of the sinkhole node(s). The results showed that the proposed method is energy-efficient and detects the malicious nodes with a 100% accuracy for all number of nodes.

___

  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in largescale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59. Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.
Natural and Engineering Sciences-Cover
  • ISSN: 2458-8989
  • Başlangıç: 2015
  • Yayıncı: Cemal TURAN
Sayıdaki Diğer Makaleler

The Factors Increasing of Invasiveness Potential of Five Pufferfishes in the Eastern Mediterranean, Turkey

Halit FİLİZ, Sercan YAPICI, Gökçen BİLGE

Occurrence of the Spotted Sea Hare Aplysia dactylomela (Rang 1828, Aplysiidae) in the Yeşilovacık Bay, Norteastern Mediterranean Coast of Turkey

Deniz AYAS, Gülsemin ŞEN AĞILKAYA

Assessing DNA Barcodes for Identification of Pufferfish Species (Tetraodontidae) in Turkish Marine Waters

Cemal Turan, Mevlüt Gürlek, Deniz Ergüden, Ali Uyan, Serpil Karan, Servet Ahmet Doğdu

Bioaccumulation of nine heavy metals in some tissues of Anodontostoma chacunda (Hamilton, 1822) in the Arabian Sea coasts of Pakistan

Quratulan AHMED, Levent BAT, Qadeer MOHAMMAD ALİ

Multimedia Respiratory Database (RespiratoryDatabase@TR): Auscultation Sounds and Chest X-rays

Gökhan ALTAN, Yakup KUTLU, Yusuf GARBİ, Adnan Özhan PEKMEZCİ, Serkan NURAL

The length-weight and length-length relationships of bluefish, Pomatomus saltatrix (Linnaeus, 1766) from Samsun, middle Black Sea region

Melek ÖZPİÇAK, Semra SAYGIN, Nazmi POLAT

Haar wavelet collocation method for the approximate solutions of Emden-Fowler type equations

Sertan ALKAN

Bearing and Swelling Properties of Randomly Distributed Waste Jute Reinforced Soil

Murat Ozturk, Ali Fırat Cabalar

Age determination with alcian blue staining technique for Lagocephalus sceleratus in Mersin Bay, Turkey, northeastern Mediterranean

Asiye Başusta, Nuri Başusta, Ebru Ifakat Özcan, Hülya Girgin

New record of diamondback puffer Lagocephalus guentheri Miranda Ribeiro, 1915 from the North-Eastern Mediterranean, Turkey

Deniz ERGUDEN, Ferhat KABAKLI, Ali UYAN, Servet Ahmet DOĞDU, Serpil KARAN, Mevlut GURLEK, Cemal TURAN