Araştırma Makalesi
BibTex RIS Kaynak Göster

A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Yıl 2017, Cilt: 2 Sayı: 3, 45 - 58, 30.10.2017
https://doi.org/10.28978/nesciences.348325

Öz

Wireless Sensor Networks is consist of thousands of small and low-cost devices, which
communicate over wireless medium. Due to locating in harsh environment and having limited
resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN
is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a
centralized detection algorithm based on the remaining energies of the nodes is proposed. The
simulations were run for different values of energy thresholds and various numbers of nodes. The
performance of the system was investigated over total energy consumption in the system, the
number of packets arrived at base station and true detection rate of the sinkhole node(s). The results
showed that the proposed method is energy-efficient and detects the malicious nodes with a 100%
accuracy for all number of nodes.

Kaynakça

  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in largescale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59. Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.
Yıl 2017, Cilt: 2 Sayı: 3, 45 - 58, 30.10.2017
https://doi.org/10.28978/nesciences.348325

Öz

Kaynakça

  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in largescale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59. Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.
Toplam 17 adet kaynakça vardır.

Ayrıntılar

Konular Mühendislik
Bölüm 2
Yazarlar

Merve Nilay Aydın Bu kişi benim

Ipek Abasikeles Turgut Bu kişi benim

Yayımlanma Tarihi 30 Ekim 2017
Gönderilme Tarihi 1 Kasım 2017
Yayımlandığı Sayı Yıl 2017 Cilt: 2 Sayı: 3

Kaynak Göster

APA Aydın, M. N., & Abasikeles Turgut, I. (2017). A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks. Natural and Engineering Sciences, 2(3), 45-58. https://doi.org/10.28978/nesciences.348325

                                                                                               We welcome all your submissions

                                                                                                             Warm regards,
                                                                                                      


All published work is licensed under a Creative Commons Attribution 4.0 International License Link . Creative Commons License
                                                                                         NESciences.com © 2015